0% found this document useful (0 votes)
179 views194 pages

Past Paper Questions (Paper 1 Complete)

This document is a table of contents for past paper questions organized by chapter for various exam periods between Summer 2015 and Summer 2019. It lists the chapter number and title for 6 chapters and indicates that for each chapter there are past paper questions listed for exam periods between Summer 2015 and Summer 2019. However, it does not provide any of the actual past paper questions or details about them. The document appears to be solely a table of contents for compiling and indexing past paper questions by chapter and exam period.

Uploaded by

Hadi Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
179 views194 pages

Past Paper Questions (Paper 1 Complete)

This document is a table of contents for past paper questions organized by chapter for various exam periods between Summer 2015 and Summer 2019. It lists the chapter number and title for 6 chapters and indicates that for each chapter there are past paper questions listed for exam periods between Summer 2015 and Summer 2019. However, it does not provide any of the actual past paper questions or details about them. The document appears to be solely a table of contents for compiling and indexing past paper questions by chapter and exam period.

Uploaded by

Hadi Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 194

Teacher’s Name: Akhtab Hussain Past Paper Questions

Contents
Past Paper Questions...........................................................................................................................................4
Chapter No. 1......................................................................................................................................................4
Summer 2015..................................................................................................................................................4
Winter 2015.....................................................................................................................................................5
Summer 2016..................................................................................................................................................5
WINTER 2016...................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 2......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
WINTER 2015...................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 3......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5

1
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2019..................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 4......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2015.....................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 5......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2015.....................................................................................................................................................5
WINTER 2015...................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
SUMMER 2017.................................................................................................................................................5
WINTER 2017...................................................................................................................................................5
SUMMER 2018.................................................................................................................................................5
WINTER 2018...................................................................................................................................................5
SUMMER 2019.................................................................................................................................................5
Past Paper Questions...........................................................................................................................................5
Chapter No. 6......................................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2015.....................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5

2
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2019..................................................................................................................................................5
CHAPTER No. 7....................................................................................................................................................5
PAST PAPER QUESTIONS......................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5
CHAPTER No. 8....................................................................................................................................................5
PAST PAPER QUESTIONS......................................................................................................................................5
Summer 2015..................................................................................................................................................5
Winter 2015.....................................................................................................................................................5
Summer 2016..................................................................................................................................................5
Winter 2016.....................................................................................................................................................5
Summer 2017..................................................................................................................................................5
Winter 2017.....................................................................................................................................................5
Summer 2018..................................................................................................................................................5
Winter 2018.....................................................................................................................................................5
Summer 2019..................................................................................................................................................5

3
Teacher’s Name: Akhtab Hussain Past Paper Questions
Past Paper Questions
Chapter No. 1
Summer 2015
8 An alarm clock is controlled by a microprocessor. It uses the 24 hour
clock. The hour is represented by an 8-bit register, A, and the number of
minutes is represented by another 8-bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.
[2]

b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to
represent the hours and minutes of the alarm time. Show how 07:30 would
be represented by these two registers:
[2]

(c) Describe how the microprocessor can determine when to sound the clock
alarm. [3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

(c) Give the denary (base 10) value of the byte: 10111110
[1]

________________________________________________________________________________
________________________________________________________________________________

4
Teacher’s Name: Akhtab Hussain Past Paper Questions

10 Draw a line to connect each question to the correct answer. [5]

10 Letters from the alphabet are represented in a computer by the following


denary (base 10) values:
A = 97 G = 103 I = 105 L = 108 N = 110
The word “A L I G N” is stored as: 97 108 105 103 110
(a) Convert each of the five values to binary. The first one has been done for
you. [2]

5
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) An encryption system works by shifting the binary value for a letter one
place to the left. “A” then becomes:

This binary value is then converted to hexadecimal; the hexadecimal value


for “A” will be: C2
For the two letters “L” and “G”, shift the binary values one place to the left
and convert these values into hexadecimal:
[4]

Winter 2015
4 (a) (i) Convert the following two hexadecimal numbers into binary: [4]

(ii) Now perform the AND (logic) operation on each corresponding pair of binary bits in the two numbers
from part (i). [2]

(iii) Convert your answer in part (ii) into hexadecimal. [2]

6
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
(b) (i) The following code shows HTML ‘tag’ pairs on either side of the text stating the colour that each
creates.
<font color “ # F F 0 0 0 0 “ > RED </font>
<font color “ # 0 0 F F 0 0 “ > GREEN </font>
<font color “ # 0 0 0 0 F F “ > BLUE </font>
<font color “ # X “ > YELLOW </font>
<font color “ # Y “ > MAGENTA </font>
<font color “ # Z “ > CYAN </font>
Yellow is a combination of red and green, magenta a combination of red and blue and cyan a
combination of green and blue. State what 6-digit hexadecimal values should replace X, Y and Z in the
above code. [3]
X ____________________________________________________________________
Y ____________________________________________________________________
Z ____________________________________________________________________
(ii) Describe how other colours, such as a darker shade of blue, are created. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) 1A – 16 – C5 – 22 – FF – FF is an example of a MAC address.
(i) Identify what the first six and last six hexadecimal digits represent. [2]
First six digits: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Last six digits: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

(ii) State why MAC addresses are used. [1]


________________________________________________________________________________
________________________________________________________________________________

(b) The information from seven sensors is sent to an engine management system in the car. The status of
each sensor is stored in an 8-bit register; a value of 1 indicates a fault condition:

7
Teacher’s Name: Akhtab Hussain Past Paper Questions
For example, a register showing 0 1 0 1 1 0 0 0 indicates:
• Temperature too high • Fuel pressure too low • Voltage too low
(i) Identify the fault condition(s) that the following register indicates:

________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]

(iii) A car has a faulty airbag and the CO level is too high. Write what should be contained in the 8-bit
register. [2]

(iv) Give the hexadecimal value of the binary number shown in part (iii). [1]

________________________________________________________________________________
________________________________________________________________________________

Summer 2016

2 Hexadecimal codes are used in MAC addresses.


(a) State what is meant by the term MAC.
[1]
________________________________________________________________________________
(b) Explain what the hexadecimal code in a MAC address represents.

[3]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7 Each seat on a flight is uniquely identified on an LCD above the seat. For
example, seat 035C is shown as:

8
Teacher’s Name: Akhtab Hussain Past Paper Questions

The first three characters are digits that represent the row.
The fourth character is the seat position in that row. This is a single letter,
A to F, that is stored as a hexadecimal value. Each of the four display
characters can be stored in a 4-bit register. For example, 0 and C would be
represented as:

(a) Show how the 4-bit registers would store the remaining two characters, 3
and 5. [2]

(b) Identify which seat is stored in the following 4-bit registers.


[2]

3 (a) Convert the following hexadecimal number into 12-bit binary:


[3]
4AF

(b) The 2016 Olympic Games will be held in Rio de Janeiro. A timer that
counts down to the opening of the Games is shown on a microprocessor-
controlled display.
The number of hours, minutes and seconds until the Games open are held
in three 8-bit registers. The present register values are:

9
Teacher’s Name: Akhtab Hussain Past Paper Questions

The timer will count down in seconds.


(i) Show the values in each 8-bit register 30 seconds after the time shown above:
[3]

(ii) Write the hexadecimal value of the minutes register from part (b)(i).

[1]

________________________________________________________________________________

WINTER 2016
5 A computer uses an 8-bit register. The 8-bit register contains binary
integers.
(a) Write the denary (base 10) value represented by:
[1]

________________________________________________________________________________

(b) All the bits in the register are shifted one place to the right as shown below.

10
Teacher’s Name: Akhtab Hussain Past Paper Questions
Write the denary number that is represented after this shift.
[1]
________________________________________________________________________________
(c) State the effect the shift to the right had on the original denary number
from part (a). [1]
________________________________________________________________________________
(d) The original number in part (a) is shifted three places to the right.
(i) Show the new binary number:

(ii) Write the equivalent denary number.


[1]
________________________________________________________________________________
(e) Describe the problems that could be caused if the original binary number in
part (a) is shifted five places to the right.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
11 A security system is installed in a house. A hexadecimal number is entered
to activate or deactivate the alarm.
(a) The alarm code is set to hexadecimal number 2 A F
Show how this number would be stored in a 12-bit binary register.

(c) A microprocessor regularly samples the output, X. Each sample value is


stored in an 8-bit register as shown below. One bit of this register is
reserved as a parity bit.
Five consecutive output values of 1 indicate a fault condition. Identify
which of the following registers shows a fault condition.

Parity bit

1 1 1 1 1 0 0 1 Register Y

11
Teacher’s Name: Akhtab Hussain Past Paper Questions

0 1 0 1 1 1 1 1 Register Z

Register______________________________________________________________ [1]
10 (a) A manufacturer of aero plane’s engine assigns a denary identification
number (ID) to each engine. One engine has the ID: 0431
(i) Convert this denary number to a 12-bit binary format.
[2]

(ii) Show how this number would be represented in hexadecimal.


[3]
________________________________________________________________________________
________________________________________________________________________________
(b) The current status of the engine is sent to a computer in the aeroplane.
Each piece of data collected is 8 bytes in size. Data collection occurs
every 30 seconds. Calculate the number of kilobytes that would be needed
to store the data collected during a 10-hour flight. Show your working.
[3]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________ Kilobytes
(c) At the end of the flight, all of the data are sent to the aeroplane engine
manufacturer using the Internet. The computer in the aeroplane has a MAC
address and an IP address. State what is meant by these two terms.
[2]

MAC address: ____________________________________________________________________


________________________________________________________________________________
________________________________________________________________________________
IP address: ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

12
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2017
1 The memory of a computer contains data and instructions in binary. The
following instruction is stored in a location of the memory.

(a) Convert the instruction into hexadecimal.


[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Explain why a programmer might prefer to read the instruction in
hexadecimal rather than in binary.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Give two other uses of hexadecimal.
[2]
Use 1 ___________________________________________________________________________
________________________________________________________________________________
Use 2 ___________________________________________________________________________
________________________________________________________________________________
3 Steffi has a number of files of different sizes that contain her work.
Tick () to show whether each statement is true or false.
[4]

13
Teacher’s Name: Akhtab Hussain Past Paper Questions
5 (a) The denary number 57 is to be stored in two different computer registers.
Convert 57 from denary to binary and show your working.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Show the binary number from part (a) as it would be stored in the following
registers.

(c) A binary number stored in a register can have many different uses, for
example an address in main memory.
Give two other uses for a binary number stored in a register. [2]
Use 1 ___________________________________________________________________________
________________________________________________________________________________
Use 2___________________________________________________________________________
________________________________________________________________________________ (d) A
register in a computer contains binary digits.

The contents of the register represent a binary integer.


Convert the binary integer to hexadecimal.
[1]
________________________________________________________________________________
________________________________________________________________________________

Winter 2017
1 A robot arm in a factory is programmed to move products.
The binary instructions to operate the robot arm are:

14
Teacher’s Name: Akhtab Hussain Past Paper Questions

The instructions are entered as hexadecimal values.


An operator enters the values:
91C3F
Convert the values and write down the operation (e.g. RIGHT) carried out
by the robot arm.
9 ________________________________________
1 ________________________________________
C ________________________________________
3 ________________________________________
F ________________________________________ [5]
(a) Explain the differences between the binary number system and the denary
number system.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [4]
(b) Explain the process of converting the binary number 1010 into a denary
number.
________________________________________________________________________________
________________________________________________________________________________

15
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [5]
4. A washing machine has a small display screen built into it. One use of the
display screen is to show an error code when a problem has occurred with
a washing cycle.
(b) The display screen shows a hexadecimal error code: E04
This error code means that the water will not empty out of the washing
machine.
Convert this error code to binary.
[3]

(c) State why hexadecimal is used to display the error code.


[1]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 Jane answers an examination question about computers and data
correctly. Six different words or numbers have been removed from her
answer. Complete the sentences in Jane’s answer, using the list given. Not
all items in the list need to be used.
•2 • 10 • 16 • Analogue
• Binary • Denary • Digital • Hexadecimal
As humans, we process …………………………………… data, but a computer
cannot process this type of data. For a computer to be able to process
data it needs to be converted to …………………………………… data.
As humans, we mostly use a …………………………………… number system;
this is a base …………………………………… number system. Computers use a

16
Teacher’s Name: Akhtab Hussain Past Paper Questions
……………………… number system; this is a base ……………………………………
number system. [6]

2 Dheeraj identifies three hexadecimal numbers.


Write the denary number for each of the three hexadecimal numbers:
[3]
2A ___________________________________________________
101 ___________________________________________________
21E ___________________________________________________
Working Space
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Summer 2018
1 Different units of data can be used to represent the size of a file, as it
changes in size.
Fill in the missing units of data, using the list given:
• Byte • Gigabyte (GB) • Megabyte (MB) • Nibble
The units of data increase in size from smallest to largest.
bit
__________________________________
__________________________________
kilobyte (kB)

17
Teacher’s Name: Akhtab Hussain Past Paper Questions
__________________________________
__________________________________
Terabyte (TB) [4]

3 A stopwatch uses six digits to display hours, minutes and seconds.


The stopwatch is stopped at:

An 8-bit register is used to store each pair of digits.

(a) Write the 8-bit binary numbers that are currently stored for the Hours,
Minutes and Seconds.
[3]

(b) The stopwatch is started again and then stopped.


When the watch is stopped, the 8-bit binary registers show:

Write the denary values that will now be shown on the stopwatch.
[3]

4 Jafar is using the Internet when he gets the message:


“D03, page is not available”
Jafar remembers that hexadecimal is often used to represent binary values
in error codes.
Convert the hexadecimal number in the error message into 12-bit binary.
[3]

18
Teacher’s Name: Akhtab Hussain Past Paper Questions

19
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2018
2 (a) Six binary or hexadecimal numbers and six denary conversions are given.
Draw a line to connect each binary or hexadecimal number to the correct
denary conversion. [5]

(b) Hexadecimal is often used by computer programmers to represent binary


values.
Explain why computer programmers may choose to use hexadecimal.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 Computers use a character set to convert text into binary. One character
set that can be used is ASCII. Each letter in ASCII can also be represented
as a denary value.
(a) The word BUS has the denary values:

Convert the denary values into 8-bit binary.


[3]

20
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Each letter in ASCII can also be represented as a hexadecimal value.


The word KEY has the 8-bit binary values:
[3]

01001011 _______________________________
01000101 _______________________________
01011001 _______________________________
ii) Give three other uses of hexadecimal notation in computer science.
[3]
1 __________________________________________________________________________
2 __________________________________________________________________________
3 __________________________________________________________________________
(iii) State two benefits of using hexadecimal notation to represent binary

values. [2]

Benefit 1 __________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

Benefit 1 __________________________________________________________________

________________________________________________________________________________

________________________________________________________________________________

21
Teacher’s Name: Akhtab Hussain Past Paper Questions
4 The MAC address of a device is represented using hexadecimal. A section
of a MAC address is shown. Each pair of hexadecimal digits is stored using
8-bit binary.
(a) Complete the table to show the 8-bit binary equivalents for the section of
MAC address. The first number has already been converted.
[3]

(b) Explain why data is stored as binary in computers.


[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Summer 2019
(a) Elle has a file stored on her computer that is 20 MB in size. Jordan has a
file that is 10 GB in size. Tick () to show which is the larger file.
[1]

(b) Bob has a file stored on his computer that is 3500 kB in size. Gerty has a
file that is 3 MB in size. Tick () to show which is the larger file.
[1]

3 (a) A long distance running race uses an electronic counter that counts each
competitor who finishes the race. The count is stored as binary in a 12-bit
register. A denary value of the count is displayed on a screen above the
finish line.

22
Teacher’s Name: Akhtab Hussain Past Paper Questions
(i) The screen currently displays:
0039
State the binary value that is currently stored to display the count shown.
[2]
________________________________________________________________________________
________________________________________________________________________________
(ii) More competitors cross the finish line and the screen now displays:
0350
State the binary value that is currently stored to display the count shown.
[2]
________________________________________________________________________________
________________________________________________________________________________
(iii) At the end of the race the binary value stored is:
011011000111
Give the denary value that would be displayed on the screen at the end of
the race.
Show your working.

[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Screen display:

1 Hexadecimal is used for MAC addresses. Part of a MAC address is given:


97 – 5C – E1
Each pair of digits is stored as binary in an 8-bit register.
(a) Show what the binary register stores for each pair of the given digits.
[6]

23
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Explain what is meant by a MAC address.


[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Give two other examples where hexadecimal can be used.
[2]
Example 1
________________________________________________________________________________
________________________________________________________________________________
Example 2
________________________________________________________________________________
________________________________________________________________________________
1 Victoria is building a website for her cake design business.
(a) She uses the hexadecimal colour code #D2E3F5 as the background colour
for her website. The colour code is stored in two 12-bit binary registers.
Show how the code would be stored in the registers.
[6]

(b) Victoria uses HTML to create her website.

24
Teacher’s Name: Akhtab Hussain Past Paper Questions
State what is meant by HTML.
[1]
________________________________________________________________________________
________________________________________________________________________________

Past Paper Questions


Chapter No. 2
Summer 2015
1 (a) State what is meant by the terms:
[2]
Parallel data transmission
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Serial data transmission
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

(b) Give one benefit of each type of data transmission.


[2]
Parallel data transmission
Benefit
________________________________________________________________________________
________________________________________________________________________________
Serial data transmission
Benefit
________________________________________________________________________________
________________________________________________________________________________

(c) Give one application of each type of data transmission. Each application
must be different.
Parallel data transmission
[1]
Application

25
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
Serial data transmission
[1]
Application
________________________________________________________________________________
________________________________________________________________________________
2 (a) State what is meant by the term USB.
[1]
________________________________________________________________________________
________________________________________________________________________________

(b) Describe two benefits of using USB connections between a computer and a
device. [2]
1. __________________________________________________________________________
__________________________________________________________________________
2. __________________________________________________________________________
__________________________________________________________________________
5 Parity checks are often used to check for errors that may occur during
data transmission.
(a) A system uses even parity. Tick (✓) to show whether the following three
bytes have been transmitted correctly or incorrectly.
[3]

(b) A parity byte is used to identify which bit has been transmitted incorrectly
in a block of data. The word “F L O W C H A R T” was transmitted using
nine bytes of data (one byte per character). A tenth byte, the parity byte,
was also transmitted.

26
Teacher’s Name: Akhtab Hussain Past Paper Questions
The following block of data shows all ten bytes received after
transmission. The system uses even parity and column 1 is the parity bit.

(i) One of the bits has been transmitted incorrectly.


Write the byte number and column number of this bit:
[2]
Byte number: ________________________________________________________
Column number: ________________________________________________________
(ii) Explain how you arrived at your answer for part (b)(i).
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

(d) A parity check may not identify that a bit has been transmitted incorrectly.
Describe one situation in which this could occur.
[1]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

WINTER 2015
(c) The shopping mall has over 100 cameras. At the end of each day all these cameras send their images,
captured over the last 24 hours, to a central computer.
Explain why the mall uses dedicated fibre optic cable rather than transmitting the data over the local
broadband network. [2]

27
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) When data are transmitted from one device to another, a parity check is often carried out on each byte
of data. The parity bit is often the leftmost bit in the byte.
(i) If a system uses even parity, give the parity bit for each of the following bytes: [2]

(ii) A parity check can often detect corruption of a byte.


Describe a situation in which it cannot detect corruption of a byte. [1]
________________________________________________________________________________
________________________________________________________________________________
2 b (ii) The system uses odd parity.
Write the correct parity bit in each register. [2]

28
Teacher’s Name: Akhtab Hussain Past Paper Questions

Summer 2016
4 (a) Nikita wishes to print out some documents and connects her printer to the
computer using one of the USB ports.
(i) Identify what type of data transmission is being used.
[1]
________________________________________________________________________________
(ii) Give three reasons for using a USB port.
[3]
1. __________________________________________________________________________
________________________________________________________________________________
2. __________________________________________________________________________
________________________________________________________________________________
3. __________________________________________________________________________
________________________________________________________________________________
6 (a) Three descriptions of data transmission are given below.
Tick (✓) the appropriate box in each table to show the:
• Type of transmission
• Method of transmission

Description 1:
Data is transmitted several bits at a time down several wires in both directions
simultaneously.

Description 2:
Data is transmitted in one direction only, one bit at a time, down a single wire.

Description 3:

29
Teacher’s Name: Akhtab Hussain Past Paper Questions
Data is transmitted one bit at a time down a single wire; the data is transmitted
in both directions but not at the same time.

(b) Give two reasons why serial transmission, rather than parallel transmission,
is used to connect devices to a computer.
[2]
1.______________________________________________________________________________
________________________________________________________________________________
2.______________________________________________________________________________
________________________________________________________________________________
11 Describe the use of structure and presentation in a HTML document.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 Check digits are used to ensure the accuracy of entered data.
A 7-digit number has an extra digit on the right, called the check digit.
Digit position: 1 2 3 4 5 6 7 8
digit: – – – – – – – –
check digit
The check digit is calculated as follows:
• Each digit in the number is multiplied by its digit position
• The seven results are then added together
• This total is divided by 11
• The remainder gives the check digit (if the remainder = 10, the check
digit is X)
(a) Calculate the check digit for the following number. Show all your working.
4241508…
30
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Check digit ____________________________________________________________________ [2]
(b) An operator has just keyed in the following number:
3240045X
Circle below correct if the check digit is correct OR incorrect if the check digit
is incorrect.
correct incorrect
Explain your answer.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4 Nigel wants to send a large text file electronically to Mashuda.
(b) This file will be transmitted to Mashuda as an email attachment. Mashuda
then stores it on her computer.
Explain how checksums can be used to verify that the file has not been
corrupted during transmission or data storage.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Winter 2016
3 (a) Explain what is meant by:
(i) Serial data transmission
[2]
________________________________________________________________________________

31
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Parallel data transmission
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) A computer in a factory is connected to a printer. The printer is located in
an office 1 km away from the factory. Identify which data transmission
method would be most suitable for this connection.
[1]
________________________________________________________________________________
Give two reasons for your choice.
[2]
1.______________________________________________________________________________
________________________________________________________________________________
2.______________________________________________________________________________
________________________________________________________________________________

4 Nine bytes of data are transmitted from one computer to another. Even
parity is used. An additional parity byte is also sent. The ten bytes arrive at
the destination computer as follows:

32
Teacher’s Name: Akhtab Hussain Past Paper Questions

One of the bits was corrupted during the data transmission.


(a) Circle the corrupt bit in the corrupt byte in the table above.
[1]
(b) Explain how the corrupted bit was found.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
10 (a) Describe what is meant by HTML.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The following URL is typed in:
http://www.cie.org.uk/ComputerSciencePapers

33
Teacher’s Name: Akhtab Hussain Past Paper Questions
This URL is composed of three parts.
State the part of this URL that is the:
[3]
File name ______________________________________________________________
Protocol ______________________________________________________________
Web server name ___________________________________________________________
3 Five computer terms and seven descriptions are shown below. Draw a line to
connect each computer term to its correct description.
[5]

34
Teacher’s Name: Akhtab Hussain Past Paper Questions

(d) When eight bytes of data have been collected, they are transmitted to a
computer 100 km away. Parity checks are carried out to identify if the data
has been transmitted correctly. The system uses even parity and column 1 is

35
Teacher’s Name: Akhtab Hussain Past Paper Questions
the parity bit. The eight bytes of data are sent together with a ninth parity
byte:

(i) Identify which of the eight bytes contains an error.


Byte _____________________________________________________________ [1]
(ii) Identify which column contains an error.
Column _____________________________________________________________[1]
(iii) The incorrect bit is indicated where the byte number and column cross.
Give the corrected byte.

c) At the end of the flight, all of the data are sent to the aero plane engine
manufacturer using the Internet. The computer in the aero plane has a
MAC address and an IP address. State what is meant by these two terms.
[2]
MAC address ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

IP address _________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

36
Teacher’s Name: Akhtab Hussain Past Paper Questions

Summer 2017
4 Five statements about serial half-duplex data transmission are shown in the
table below. Tick () to show whether each statement is true or false.
[5]

5 (a) Parity checks are often used to detect errors that may occur during data
transmission. The received bytes in the table below were transmitted
using odd parity.
Tick () to show whether each byte has been corrupted during transmission or not
corrupted during transmission. [3]

(b) Another method of error detection is Automatic Repeat reQuest (ARQ).


Explain how ARQ is used in error detection.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

37
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4 There are various methods used to detect errors that can occur during
data transmission and storage.
Describe each of the following error detection methods.
[8]
Parity check
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Check digit
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Checksum
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Automatic Repeat request (ARQ)
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7 Computer A is communicating with computer B.
(a) Draw an arrow or arrows to show simplex, duplex and half-duplex data
transmission. The direction of the data transmission must be fully labelled.

Simplex data transmission

38
Teacher’s Name: Akhtab Hussain Past Paper Questions

Duplex data transmission

Half-duplex data transmission

(b) State a use for the following data transmission methods. The use must be
different for each data transmission method.
[2]
Simplex
________________________________________________________________________________
________________________________________________________________________________
Duplex ________________________________________________________________________________
________________________________________________________________________________
(c) A computer includes an Integrated Circuit (IC) and a Universal Serial Bus
(USB) for data transmission. Describe how the computer uses these for data

39
Teacher’s Name: Akhtab Hussain Past Paper Questions
transmission, including the type of data transmission used.
[4]
IC _____________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
USB ____________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

4 A file server is used as a central data store for a network of computers.


Rory sends data from his computer to a file server that is approximately
100 metres away. It is important that the data is transmitted accurately.
Rory needs to be able to read data from and write data to the file server at
the same time.
(a) (i) Use ticks () to identify the most suitable data transmission methods for
this application. [2]

(ii) Explain why your answer to part (a)(i) is the most suitable data transmission.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

40
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
(b) Identify and describe two methods of error checking that can be used to
make sure that the data stored after transmission is accurate.
[6]
Method 1
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Method 2
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

3 (a) An example of a Uniform Resource Locator (URL) is:

http://www.cie.org.uk/index.htm
Part 1 Part 2 Part 3
Identify the three parts that make up this URL.
[3]
Part 1: ____________________________________________________________________
Part 2: ____________________________________________________________________
Part 3: ____________________________________________________________________
(b) Describe what is meant by an Internet Protocol (IP) address.
[4]
________________________________________________________________________________
________________________________________________________________________________

41
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6 Selma writes the following four answers in her Computer Science
examination.
State which computer terms she is describing.
“When data is transmitted, if an error is detected in the data received a
signal is sent to ask for the data to be retransmitted. This continues until
the data received is correct.”

Selma is describing __________________________________________________________

Summer 2018
3 The three binary numbers in the registers A, B and C have been
transmitted from one computer to another.
[4]

One binary number has been transmitted incorrectly. This is identified through the
use of a parity bit. Identify which register contains the binary number that has
been transmitted incorrectly. Explain the reason for your choice.
The binary number that has been transmitted incorrectly is in Register
_______________________
Explanation:
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

42
Teacher’s Name: Akhtab Hussain Past Paper Questions
10 RockICT is a music business that has a website to allow customers to
view and buy the products it sells.
The website consists of web pages.
(a) Describe what is meant by HTML structure and presentation for a web
page. [4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The URL for the music company’s website is:

(i) Identify what Part 1 and Part 2 represent in this URL.


[2]
Part 1 __________________________________________________________________________
Part 2 __________________________________________________________________________

12 Selma wants to make sure that the information received is correct.


A parity check can be used to detect errors. Describe another error
detection method that can be used to check the information received is
correct. [3]

Error detection method:________________________________________________________


Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

43
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

13 Describe the role of an Internet Service Provider (ISP).


[6]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Winter 2018
7 Computers can use different methods of transmission to send data from
one computer to another. Parallel data transmission is one method that
can be used.
(a) Explain what is meant by parallel data transmission.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Give one benefit and one drawback of parallel data transmission, compared
to serial data transmission, over short distances.
[2]
Benefit
________________________________________________________________________________

44
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
Drawback
________________________________________________________________________________
________________________________________________________________________________
(c) Give one example where parallel data transmission is used.
[1]
________________________________________________________________________________
________________________________________________________________________________

8 Kamil correctly answers an examination question about a number of


internet terms. Six different terms have been removed from Kamil’s answer.
Complete the sentences in Kamil’s answer, using the list given. Not all
terms in the list need to be used.
• Browser • connection • domain name
server (DNS)
• Internet • Internet Service Provider (ISP) • IP address
• MAC address • network • protocol
• Uniform resource locator (URL) • webpages • hypertext mark-up
language (HTML)
A ___________________________________ is a program that allows a user to view
___________________________________. An ___________________________________ is a
company that provides a connection to access the
__________________________________.
The main ___________________________________ that governs the transmission of
data using the Internet is http. The ___________________________________ is
provided by the network, and given to each device on the network.
[6]

7 Six internet terms and six definitions are listed.


Draw a line to connect each term to a correct definition.
[5]

45
Teacher’s Name: Akhtab Hussain Past Paper Questions

9 (a) Computers can transmit data using different methods.


Describe the three data transmission methods given.
(i) Serial data transmission
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Parallel data transmission
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

46
Teacher’s Name: Akhtab Hussain Past Paper Questions
(iii) Duplex data transmission
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Data can sometimes be corrupted when it is transmitted from one
computer to another, causing errors to be present in the data. Identify and
describe three methods of error detection that could be used to see if an
error has occurred. [9]
Error detection method 1: _____________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Error detection method 2:_____________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Error detection method 3: _____________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check
for errors during data transmission and storage.
(a) A system uses even parity. Write the appropriate parity bit for each byte.
[2]

47
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Explain how Automatic Repeat reQuests (ARQ) are used in data
transmission and storage.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
(c) State one other method that could be used to check for transmission errors.
[1]
________________________________________________________________________________
5 Data can be transferred using half-duplex serial transmission.
(a) Describe serial transmission.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Give one application of serial data transmission.
[1]
________________________________________________________________________________
________________________________________________________________________________
(c) Describe half-duplex data transmission.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
8 Alice enters a URL into a web browser to access a webpage.

48
Teacher’s Name: Akhtab Hussain Past Paper Questions
(a) State what URL represents.
[1]
U ____________________ R ____________________ L ____________________
(b) Explain how the web browser uses the URL to access the webpage.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Summer 2019
5 (d) Errors can occur when data is transmitted, stored or entered into a
system. Darius could use an error detection method to find whether errors
have occurred. One error detection method he could use is a checksum.
(i) Describe how a checksum detects errors.
[5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) State three other error detection methods that Darius could use.
[3]

49
Teacher’s Name: Akhtab Hussain Past Paper Questions
Method 1 _________________________________________________________________
Method 2 _________________________________________________________________
Method 3 _________________________________________________________________
6 Nadia purchases a printer to print out her homework. She connects the
printer to her computer using USB.
(a) Explain what is meant by USB.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6 Priya creates a website to sell her old comic books and superhero figures.
(a) She uses HTML to create her website. The HTML she produces has both
structure and presentation. Explain what is meant by HTML structure and
presentation. Include an example of each.
[4]
Structure
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Presentation
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Priya stores her website on a webserver. To transmit the website data to
the webserver she uses parallel duplex data transmission. Describe how

50
Teacher’s Name: Akhtab Hussain Past Paper Questions
data is transmitted using parallel duplex data transmission.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) Priya has a URL for her website. State what is meant by a URL
[1].
________________________________________________________________________________
________________________________________________________________________________
9 The contents of three binary registers have been transmitted from one
computer to another. Even parity has been used as an error detection
method. The outcome after transmission is:
Register A and Register C have been transmitted correctly. Register B has been
transmitted incorrectly. Complete the Parity bit for each register to show the
given outcome.
[3]

(b) Victoria uses HTML to create her website.


State what is meant by HTML.
[1]
________________________________________________________________________________
________________________________________________________________________________
(c) The HTML Victoria writes has both structure and presentation.
Five examples are given of structure and presentation.
Tick (✓) to show which example is Structure and which is Presentation. [5]

51
Teacher’s Name: Akhtab Hussain Past Paper Questions

(d) Customers will use a web browser to access Victoria’s website. Victoria
writes a paragraph of text to explain how the website will be displayed on
a customer’s computer. Use the list given to complete Victoria’s paragraph
by inserting the correct six missing terms. (Not all terms will be used).
• browser • domain name • firewall
• hexadecimal • HTML • https
• MAC address • search engine • web server
• Uniform Resource Locator (URL)

The user enters the website __________________________into the address bar. The
protocol that is used is __________________________. The URL contains the
____________________ for the website. This is used to look up the IP address of the
company. A DNS server stores an index of IP addresses. The browser sends a
request to the __________________________ as this is where the files for the website
are stored. The files are sent back to the __________________________ as
__________________________ files. This is interpreted by the browser and the web
page is displayed.
[6]

2 (a) A computer can have both a MAC address and an IP address

52
Teacher’s Name: Akhtab Hussain Past Paper Questions
Four statements are given about MAC addresses and IP addresses.
Tick (✓) to show whether each statement is True or False.
[4]

5 The three binary numbers in the registers given have been transmitted
from one computer to another.
One binary number has been transmitted incorrectly. This can be identified
by the use of a Parity bit. Identify the binary number that has been
transmitted incorrectly. Explain how you identified the incorrect binary
number. [4]

The binary number that has been transmitted incorrectly is in Register


___________________
Explanation
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

53
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

54
Teacher’s Name: Akhtab Hussain Past Paper Questions

Past Paper Questions


Chapter No. 3
Summer 2015

3 (a) Complete the truth table for the following logic circuit:
[4]

55
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Draw a logic circuit which corresponds to the following logic statement:
X = 1 if ((A is NOT 1 OR B is 1) AND C is 1) OR (B is NOT 1 AND C is 1)
[3]

(c) Write a logic statement which corresponds to the following logic circuit:
[3]

________________________________________________________________________________
________________________________________________________________________________

56
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________

6 A gas fire has a safety circuit made up of logic gates. It generates an


alarm (X = 1) in response to certain conditions.

The output X = 1 is generated under the following conditions:


Gas pressure is correct AND carbon monoxide level is too high
OR
Carbon monoxide level is correct AND gas leak is detected
(a) Draw a logic circuit for this safety system.
[5]

57
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Complete the truth table for the safety system.
[4]

(c) Complete the truth table for the XOR gate:


[1]

58
Teacher’s Name: Akhtab Hussain Past Paper Questions

Summer 2016
5 A computer-controlled machine produces plastic sheets. The thickness of
each sheet must be within a certain tolerance. The sheets are kept below
50 °C as they move over rollers at 10 metres per second. Three parameters
need to be monitored all the time.

An alarm, X, will sound if:


Thickness is in tolerance AND (roller speed <> 10 metres/second OR temperature
>= 50 °C)
OR
Roller speed = 10 metres/second AND temperature >= 50 °C
(a) Draw a logic circuit to represent the above monitoring system.
[6]

59
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Complete the truth table for the monitoring system.


[4]

60
Teacher’s Name: Akhtab Hussain Past Paper Questions
7 (a)

Complete the truth table for this logic circuit.


[4]

(b) Draw a logic circuit corresponding to the following logic statement:


X = 1 if (( A is 1 OR B is 1 ) AND ( A is 1 AND B is 1 ) ) OR ( C is NOT 1 )
[5]

61
Teacher’s Name: Akhtab Hussain Past Paper Questions

(c) Re-draw the following logic circuit using NAND gates only.
[4]

Logic circuit re-drawn:

62
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2016
7 (a) Complete the truth tables and name the single logic gate that could
replace each logic circuit:

i)

Single logic gate ___________________________________________________ [3]

ii)

Single logic gate ___________________________________________________ [3]

(b) (i) Draw a logic circuit to represent the following logic statement:
X = 1 if (A = 1 AND B = 1) OR ( (B = NOT 1) AND C = 1) [4]

63
Teacher’s Name: Akhtab Hussain Past Paper Questions

ii. Complete the truth table for this logic circuit.


[4]

5 Three switches, A, B and C, each send values of 0 or 1 to a logic circuit.


Value X is output from the logic circuit.

Output X has a value of 1 depending on the following conditions:


Switch A sends value 1 AND Switch B sends value 0 OR
Switch B sends value 1 AND Switch C sends value 0
(a) Draw a logic circuit to represent the conditions above.
[4]

64
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Complete the truth table for this logic circuit.


[4]

Summer 2017
10 (a) Complete the truth table for the NOR gate.
[1]

65
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Write a logic statement that corresponds with the following logic circuit.
[3]

X = __________________________________________________________________________________

10 For this logic statement:


X = 1 if (( A is 1 AND B is 1 ) OR ( B is 1 AND C is NOT 1 ))
(a) Draw the logic circuit. [4]

66
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Complete the truth table for the given logic statement.
[4]

67
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2017
7 Draw a logic circuit to represent the logic statement: [7]
X = 1 if (A is NOT 1 AND B is 1) AND (A is NOT 1 AND C is NOT 1) OR (B is 1 AND
C is 1)

5 (a) Draw a logic circuit for the logic statement:


X = 1 if ((A is 1 AND B is 1) OR (A is NOT 1 AND C is 1))
[4]

68
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Draw the symbol for an XOR gate and explain the function of this logic
gate.

Symbol [1]

Explanation [4]
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Summer 2018
6 Consider the logic statement:
X = 1 if ((A is NOT 1 OR B is 1) NOR C is 1) NAND ((A is 1 AND C is 1) NOR B
is 1)
(a) Draw a logic circuit to represent the given logic statement.
[6]

69
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Complete the truth table for the given logic statement.
[4]

7 Consider the logic statement:

70
Teacher’s Name: Akhtab Hussain Past Paper Questions
X = 1 if ((A is 1 AND B is NOT 1) NAND C is 1) XOR ((A is 1 AND C is 1) OR B
is 1)
(a) Draw a logic circuit to represent the given logic statement.
[4]

(b) Complete the truth table for the given logic statement.
[4]

71
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2018
3 A logic circuit is shown:

(a) Complete the truth table for the given logic circuit.
[4]

72
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Explain the difference between the functions of an AND gate and an OR
gate. [3]
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

3 A greenhouse uses a system to monitor the conditions that plants need to


grow.
The inputs to the system are:

The system will sound an alarm when certain conditions are detected.
Alarm (X) will sound (=1) when:
Window is closed and temperature >=26 °C OR
Temperature <26 °C and humidity >=50%
Draw a logic circuit to represent the system.
[5]

73
Teacher’s Name: Akhtab Hussain Past Paper Questions

10 A logic circuit is shown:

(a) Complete the truth table for the given logic circuit.
[4]

74
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Draw a logic circuit corresponding to the logic statement:
[6]
X = 1 if ((A is 1 AND B is 1) AND (A is 1 OR C is NOT 1)) OR (B is 1 AND C is
NOT 1)

Summer 2019
2 Rajesh creates a logic circuit.
He uses three different logic gates in his circuit. Each logic gate has a
maximum of two inputs.
He describes the logic of each gate.

(a) “The only time the output will be 1 is when both inputs are 1.”
State the single logic gate: _________________________________________

Draw the single logic gate:


[2]

(b) “The only time the output will be 1 is when both inputs are 0.”

State the single logic gate: _________________________________________

75
Teacher’s Name: Akhtab Hussain Past Paper Questions

Draw the single logic gate: [2]

(c) “The only time the output will be 0 is when both inputs are 1.”
State the single logic gate: _________________________________________

Draw the single logic gate: [2]

8 Consider the logic statement:


X = 1 if ((A is 1 NOR C is 1) AND (B is NOT 1 NOR C is 1)) OR (A is 1 AND B
is 1)
(a) Draw a logic circuit to match the given logic statement. Each logic gate
used must have a maximum of two inputs. Do not attempt to simplify the
logic statement. [6]

(b) Complete the truth table for the given logic statement.
[4]

76
Teacher’s Name: Akhtab Hussain Past Paper Questions

4 Consider the given logic circuit:

(a) Redraw the logic circuit using only 4 logic gates. Each logic gate used
must have a maximum of two inputs
[4]

77
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Complete the truth table for the given logic circuit.
[4]

(c) Describe the purpose of a logic gate in a logic circuit. [2]

____________________________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

78
Teacher’s Name: Akhtab Hussain Past Paper Questions
Past Paper Questions
Chapter No. 4
Summer 2015
7 (a) One of the key features of von Neumann computer architecture is the use of buses. Three
buses and three descriptions are shown below. Draw a line to connect each bus to its correct
description. [3]

(b) The seven stages in a von Neumann fetch-execute cycle are shown in the table below. Put
each stage in the correct sequence by writing the numbers 1 to 7 in the right hand column.
The first one has been done for you. [6]

79
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2015
3 A section of computer memory is shown below:

(a) (i) The contents of memory location 1000 0001 are to be read. Show the contents of the Memory Address
Register (MAR) and the Memory Data Register (MDR) during this read operation:
[2]

MAR

MDR
(ii) The value 0111 1001 is to be written into memory location 1000 1110.
Show the contents of the MAR and MDR during this write operation: [2]

MAR

MDR

(b) Name three other registers used in computers. [3]

1 ___________________________________________________________________
2 ___________________________________________________________________
3 ___________________________________________________________________

80
Teacher’s Name: Akhtab Hussain Past Paper Questions
(iii) Show any changes to the computer memory following the read and write operations in
part (a)(i) and part (a)(ii). [3]

(c) The control unit is part of a computer system. What is the function of the control unit? [3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Winter 2016

2 State four functions of an operating system.


[4]

1 __________________________________________________________________________
2 __________________________________________________________________________
3 __________________________________________________________________________
4 __________________________________________________________________________

81
Teacher’s Name: Akhtab Hussain Past Paper Questions

6 Four computer terms and eight descriptions are shown below.


Draw lines to connect each computer term to the correct description(s).
[4]

1 To process an instruction, a central processing unit (CPU) goes through a


cycle that has three main stages.
Name each stage in this cycle. [3]

Stage 1 ____________________________________________________________________
Stage 2 ____________________________________________________________________
Stage 3 ____________________________________________________________________

Summer 2017

6 Signals are sent to and from the components of a processor using buses.

82
Teacher’s Name: Akhtab Hussain Past Paper Questions
Identify and describe the purpose of two different buses.
Bus 1 ____________________________________________________________________
Purpose
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [3]

Bus 2 ____________________________________________________________________
Purpose
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [3]
11 State three functions provided by an operating system.
[3]
Function 1 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Function 2 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Function 3 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 Name three different buses that are used in the fetch-execute cycle.
[3]
Bus 1: ____________________________________________________________________
Bus 2: ____________________________________________________________________

83
Teacher’s Name: Akhtab Hussain Past Paper Questions
Bus 3: ____________________________________________________________________

84
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2017

6 Selma writes the following four answers in her Computer Science


examination.
State which computer terms she is describing.
[2]
“It is a signal. When the signal is received it tells the operating system that
an event has occurred.”
Selma is describing
__________________________________________________________________________
“The part of the central processing unit (CPU) that carries out
calculations.”
Selma is describing
__________________________________________________________________________
4 Six components of a computer system and six descriptions are shown.
Draw a line to match each component with the most suitable description.
[5]

85
Teacher’s Name: Akhtab Hussain Past Paper Questions

86
Teacher’s Name: Akhtab Hussain Past Paper Questions

Summer 2018

5 Six components of the Von Neumann model for a computer system and six
descriptions are given. Draw a line to match each component to the most
suitable description. [5]

6 Kelvin correctly answers an examination question about the Von Neumann


model. Eight different terms have been removed from his answer. Complete
the sentences in Kelvin’s answer, using the list given. Not all items in the
list need to be used.
• accumulator (ACC) • address bus • arithmetic logic unit
(ALU)
• control unit (CU) • data bus • executed
• fetches • immediate access store (IAS)
• memory address register (MAR) • memory data register (MDR)
• program counter (PC) • saved • transmits
The central processing unit (CPU) ___________________________ the data and
instructions needed and stores them in the ___________________________ to wait to
be processed. The ___________________________ holds the address of the next
instruction. This address is sent to the___________________________.

87
Teacher’s Name: Akhtab Hussain Past Paper Questions
The data from this address is sent to the ___________________________. The
instruction can then be decoded and ___________________________. Any calculations
that are carried out on the data are done by the___________________________. During
calculations, the data is temporarily held in a register called the
___________________________. [8]

6 One of the roles of an operating system is to deal with interrupts.


(a) Explain the term interrupt.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Identify three devices that make use of interrupts.
[3]
Device 1: ____________________________________________________________________
Device 2: ____________________________________________________________________
Device 3: ____________________________________________________________________
10 Explain how an instruction is fetched in a computer based on the Von
Neumann model.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [6]

88
Teacher’s Name: Akhtab Hussain Past Paper Questions
10 Personal computers (PCs) use an operating system. Explain why this type
of computer needs an operating system.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

89
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2018

8 Describe the purpose of an interrupt in a computer system.


[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
11 The fetch-execute cycle make use of registers.
(a) Describe the role of the Program Counter (PC).
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Describe the role of the Memory Data Register (MDR).
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Summer 2019

3 Vanessa writes a paragraph as an answer to an examination question


about the central processing unit (CPU). Use the list given to complete
Vanessa’s answer by inserting the correct six missing terms. Not all terms
will be used. [6]
• Components • Data • Decoded
• Executed • Fetched • Instructions

90
Teacher’s Name: Akhtab Hussain Past Paper Questions
• RAM • ROM • Secondary storage
The CPU processes ___________________ and ___________________. An instruction is
___________________ from ___________________ into the CPU where it is then
___________________. Once this has taken place the instruction is then
_________________.

(b) A computer uses the Von Neumann model and the stored program concept.
(i) Explain what is meant by the stored program concept.
[2]
________________________________________________________________________________
________________________________________________________________________________
(ii) The Von Neumann model has several components that are used in the
fetch-execute cycle. One component is the Arithmetic Logic Unit (ALU).
Describe the role of the ALU. [4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) The computer has an operating system.
(i) A signal causes the operating system to stop and assess what to do next.
Identify the name of this signal.
[1]
________________________________________________________________________________
(ii) State two functions of an operating system.
[2]
1 __________________________________________________________________________
2 __________________________________________________________________________

91
Teacher’s Name: Akhtab Hussain Past Paper Questions
Past Paper Questions
Chapter No. 5
Summer 2015

(d) The LCD (liquid crystal display) on the clock face is back-lit using blue
LEDs (light emitting diodes). The brightness of the clock face is
determined by the level of light in the room. The amount of light given out
by the LEDs is controlled by a control circuit. Describe how the sensor,
microprocessor and LEDs are used to maintain the correct brightness of
the clock face.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(e) Modern LCD monitors and televisions use LED back-lit technology. Give two
advantages of using this new technology compared to the older cold
cathode fluorescent lamp (CCFL) method.
[2]
1. __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2. __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 The majority of mobile phones use touch screens. Three common
technologies are used by different mobile phone manufacturers. Choose
one of the following mobile phone technologies:
• Resistive
• Capacitive
• Infrared
Chosen Technology: _________________________________________________________
(i) Describe how your chosen technology works to allow a user to make
selections by touching the screen.
[2]
________________________________________________________________________________

92
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Give one benefit and one drawback of your chosen technology when used on
mobile phone touch screens.
[2]
Benefit
________________________________________________________________________________
________________________________________________________________________________
Drawback
________________________________________________________________________________
________________________________________________________________________________
3 Four input devices, four descriptions and four applications are shown
below. Draw a line to connect each input device to its correct description.
Then connect each description to its correct application.
[6]

7 (a) Street lighting is controlled automatically. A light sensor and a


microprocessor are used to decide when to switch each street light on or
off.

93
Teacher’s Name: Akhtab Hussain Past Paper Questions
Describe how the sensor, microprocessor and light interact to switch the
street light on or off Include in your answer how the microprocessor stops
the street lights being frequently switched on and off due to brief changes
in the light intensity. [5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Name three different sensors (other than light and pH) and describe an
application for each of these sensors.
A different application is needed for each sensor.
[6]
Sensor 1: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
Sensor 2: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
Sensor 3: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
8. The flowchart on the opposite page shows what happens when the barcode on a product is scanned at
the checkout in a supermarket. The barcodes are used in an automatic stock control system.
Several of the statements in the flowchart are missing. Complete the flowchart using item number
only from the list below. [4]

94
Teacher’s Name: Akhtab Hussain Past Paper Questions

95
Teacher’s Name: Akhtab Hussain Past Paper Questions

96
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2015

5 A security system uses sensors, a camera and a microprocessor to capture images of each person
entering a large shopping mall.
(a) Describe how the sensors, camera and microprocessor interact to identify certain people entering the
mall. [5]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
8 The steps to print a document using a laser printer are shown in the table below. Put each step in the
correct order. The first step has been done for you. [8]

97
Teacher’s Name: Akhtab Hussain Past Paper Questions

9(b) The owner needs to be able to enter their own sequence of movements for the model car. Name a
suitable input device. [2]
Input device: ______________________________________________________________
Give a reason for your choice of device.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 (a) Name an application which makes use of the following sensors. A different application should be used
in each case. [3]

Temperature ____________________________________________________________________
________________________________________________________________________________
Magnetic field ____________________________________________________________________
________________________________________________________________________________
Motion ____________________________________________________________________
________________________________________________________________________________
(b) The flowchart on the opposite page shows how a light sensor and microprocessor are used to switch a
street lamp on or off. When the sensor reading is <= 50 light units, the lamp is turned on automatically.
Several of the instructions have been omitted from the flowchart. Using item numbers only from the
list below, complete the flowchart:

98
Teacher’s Name: Akhtab Hussain Past Paper Questions

99
Teacher’s Name: Akhtab Hussain Past Paper Questions

[5]

100
Teacher’s Name: Akhtab Hussain Past Paper Questions
2 Sensors and a microprocessor monitor a car exhaust for high temperature and high carbon monoxide
(CO) levels.
(a) Describe how the sensors and microprocessor are used to monitor the temperature and CO levels and
warn the driver if either is out of range. [5]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

WINTER 2015

6 Passengers fly into an airport from other countries. The airport has a security system that uses:
• Computers
• Scanners
• Digital cameras
To gain entry to the country, each passenger must have a passport or identification (ID) card. This
must contain a recent photograph and other personal data. The passenger must:
• Place their passport or ID card on a scanner that reads machine-readable characters and scans
the photograph
• Look towards a camera that takes an image of the passenger’s face
Describe how a computer checks whether the image just taken by the camera matches the scanned
photograph. [2]
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

101
Teacher’s Name: Akhtab Hussain Past Paper Questions
7 Name a suitable output device for each of the following applications. A different device should be
used for each application. [5]

8 Four input devices are shown in the table below.


Give an application which makes use of each device and state a reason why the device is appropriate
for that application.
Your application must be different in each case. [8]

102
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2016
3 (a) Five sensors and five applications are shown below.
Draw a line to link each sensor to its most appropriate application.
[4]

(b) Automatic doors in a building are controlled by the use of infrared sensors
and a microprocessor. Describe how the sensors and the microprocessor
are used to automatically open a door as a person approaches.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4 (a) Nikita wish to print out some documents and connects her printer to the
computer using one of the USB ports.

103
Teacher’s Name: Akhtab Hussain Past Paper Questions
(iii) The printer runs out of paper while it is printing the documents. A signal is
sent to the processor to request that the problem is dealt with.
Name this type of signal.
[1]
________________________________________________________________________________
(b) State one suitable application for each printer below. A different application
must be given for each printer.
[2]
Inkjet printer: ______________________________________________________________
________________________________________________________________________________
3D printer: ______________________________________________________________
________________________________________________________________________________
(c) Name another type of printer and describe one way in which it is different
from the printers named in part (b). Give an application for this printer.
[3]
Type of printer: _____________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
12 (a) Name the following type of barcode:
[1]

________________________________________________________________________________

104
Teacher’s Name: Akhtab Hussain Past Paper Questions
(c) An airport uses the type of barcode shown in part (a) to advertise local
places of interest. Describe how a visitor landing at the airport could use
these barcodes to help plan their visit.

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [3]
2 Motion sensors are used in a security system to detect intruders. Name
three other sensors that could be used in the following applications. Give a
different type of sensor for each application.
[3]
Application Sensor
Controlling street lights ___________________________________________
Monitoring a river for pollution ___________________________________________
Controlling traffic lights ____________________________________________
9 In the following barcode, each binary number is made up of seven bars.
Each bar is black or grey. A black bar is interpreted as a “1” and a grey bar
is interpreted as a “0”.
(a) Write the binary numbers that would be produced from this barcode:

Winter 2016

11 A security system is installed in a house. A hexadecimal number is entered


to activate or deactivate the alarm.
(b) Identify two sensors that the security system could use to detect intruders.
Describe how each sensor could be used in the security system.
[6]

105
Teacher’s Name: Akhtab Hussain Past Paper Questions
Sensor 1 __________________________________________________________
Description
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Sensor 2 __________________________________________________________
Description
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
4 The Henslows Diner is a local restaurant.
(a) Staff currently use a keyboard to input a customer food order into a
computer. The food order is then sent to the kitchen. State two
disadvantages of using a keyboard to input a customer food order
[2]

1. __________________________________________________________________________
____________________________________________________________________________
2. __________________________________________________________________________
____________________________________________________________________________

5 Six descriptions and six devices are shown below.


Draw a line to link each description to the correct device.
[6]

106
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) A concept keyboard has a flat surface that is overlaid with images of food
items available from the restaurant menu. Staff can click on an image to
add the food item to a customer food order. The Henslows Diner wants to
change to a concept keyboard to input customer food orders.

107
Teacher’s Name: Akhtab Hussain Past Paper Questions
Explain two benefits of making this change.
[4]
1. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7 Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode
(LED) backlit technology.
Give four benefits of using LED technology.
[4]
1. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3. ______________________________________________________________________________
________________________________________________________________________________
4. ______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 A security light is controlled by sensors and a microprocessor. Describe
how the sensors and microprocessor interact to switch on the security
light when an intruder is detected. [6]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

108
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

SUMMER 2017

9 A supermarket has a system that allows customers to check out their own
shopping. Identify and describe the purpose of two input devices and one
output device used in this system.
Input device 1: ________________________________________________________
Purpose
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
Input device 2: ________________________________________________________
Purpose
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Output device: _____________________________________________________ [2]
Purpose
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
12 The processes in a chemical factory are monitored by sensors connected
to a microprocessor.
(a) Identify two different sensors used in this application. Give an example of
how each sensor could be used in the chemical factory.
[4]

109
Teacher’s Name: Akhtab Hussain Past Paper Questions
Sensor 1: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
Sensor 2: ______________________________________________________________
Application
________________________________________________________________________________
________________________________________________________________________________
(b) Describe how the sensors and a microprocessor are used to monitor a
process. [5]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 The diagram shows five output devices and five descriptions.
Draw a line between each output device and its description.

110
Teacher’s Name: Akhtab Hussain Past Paper Questions

6 Airline boarding passes can be read from a Smartphone instead of a


printout.

Identify what type of barcode A is an example of. Explain how the data stored in
this type of barcode is read.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

111
Teacher’s Name: Akhtab Hussain Past Paper Questions
9 A cold store is kept at a constant low temperature using a sensor, a
microprocessor and a cooling unit. Explain how the sensor and
microprocessor will maintain a constant low temperature.
[6]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

WINTER 2017

9 Anna has a farm that grows fruit. She has a system that monitors the
conditions for growing the fruit. Sensors are used in this system.
(a) Explain what is meant by the term sensor.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) State two sensors that could be used in this system and describe how they
could be used.
[6]
Sensor 1: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

112
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
Sensor 2: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 A washing machine has a small display screen built into it. One use of the
display screen is to show an error code when a problem has occurred with
a washing cycle.
(a) State whether the display screen is an input, output or storage device.
[1]
________________________________________________________________________________
(d) Identify three sensors that could be used in the washing machine.
State what each sensor could be used for.
[6]
Sensor 1: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
Sensor 2: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
Sensor 3: ______________________________________________________________
Use:
________________________________________________________________________________
________________________________________________________________________________
6 Describe the operation of a 2D scanner and a 3D scanner.
[6]
2D Scanner

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

113
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
3D Scanner
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

SUMMER 2018

8 A supermarket uses a barcode scanner to read the barcodes on its


products.
(a) Describe how the barcode scanner reads the barcode.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Explain how the barcode system could help the supermarket manage its
stock. [3]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

114
Teacher’s Name: Akhtab Hussain Past Paper Questions
(c) An infrared touch screen is used to view and navigate the supermarket
stock system.
Explain how the infrared touch screen detects a user’s touch.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 (a) Nancy has captured images of her holiday with her camera. The captured
images are stored as digital photo files on her camera. Explain how the
captured images are converted to digital photo files.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 An advertisement in a magazine displays this barcode:

(a) Identify this type of barcode.


[1]
________________________________________________________________________________
(b) Explain how the data stored in this barcode is read.
[4]

115
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
10 Alexandra has a new mobile device. It has a touch screen that uses
capacitive technology.
(a) Describe how a capacitive touch screen registers Alexandra’s touch.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
____________________________________________________________________________
(b) Alexandra is wearing gloves because it is cold. She presses an icon on her
touch screen but her action is not registered.
(i) Explain why the touch screen will not register her touch.
[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

116
Teacher’s Name: Akhtab Hussain Past Paper Questions
(ii) Alexandra does not want to remove her gloves. Explain how Alexandra
could use her mobile device whilst still wearing gloves.
[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 State five sensors that could be used in the following applications. Give a
different type of sensor for each application.
[5]

7 A train stations use large touch screens to allow passengers to search for
train information and buy tickets.
(a) State three benefits of using a touch screen in the train station.
[3]
Benefit 1: ____________________________________________________________________
________________________________________________________________________________
Benefit 2: ___________________________________________________________________
________________________________________________________________________________
Benefit 3: ____________________________________________________________________
________________________________________________________________________________

117
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) The touch screens at the station use resistive touch technology. Describe
how resistive touch technology works.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

WINTER 2018

6 Two examples of output devices are a 3D printer and a 3D cutter.


(a) The table contains four statements about 3D printers and 3D cutters. Tick
() to show which statements apply to each output device, some
statements may apply to both output devices.

(b) Identify the software used to create the computerised designs for 3D
printing. [1]

________________________________________________________________________________
(c) A Digital Light Projector (DLP) is another example of an output device.
Describe how a DLP displays an image.
[3]

118
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 A sports stadium uses a pressure sensor and a microprocessor to monitor
the number of people entering the sports stadium. For the counter to
increment the weight on the pressure sensor must exceed 5 kg. Explain
how the system uses the pressure sensor and the microprocessor to
monitor the number of people entering. [5]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
5 (a ) Karina is taking her Computer Science examination. She has three
questions to answer about output devices.
(i) For the first question she writes the answer:
“It is a high powered laser that cuts materials such as thin metals or
wood.”
Identify the output device that Karina is describing.
[1]
________________________________________________________________________________
(ii) For the second question she writes the answer:
“The screen is made up of blocks of red, green and blue pixels. The screen
uses layers of different types of liquid.”
Identify the output device that Karina is describing.
[1]

119
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(iii) For the third question she writes the answer:
“It is responsible for powering and moving a motor in machinery, such as a
robot arm in a factory.”
Identify the output device that Karina is describing.
[1]
________________________________________________________________________________
(b) Karina correctly answers another examination question about some more
output devices.
Five different terms have been removed from her answer.
Complete the sentences in Karina’s answer, using the list given. Not all
terms in the list need to be used.
[5]
• 3D • digital light projector • inkjet
• Interactive whiteboard • laser • rotating
• Scanning • sliding • speaker
• Thermal bubble

An _____________________ allows a user to write on a surface using a pen, the


text and drawings can then be captured and stored for later use.
An _____________________ printer produces a hard copy of a document using
_____________________ and piezoelectric technology. A _____________________
printer uses a _____________________ drum, and positive and negative charges,
to produce a hard copy of a document.
10 A system uses pH sensors and a microprocessor to help monitor pollution
in a river. The pH of the water should be between 6 and 8. The system
outputs an alert if the pH of the water is not in this range.
Explain how the system uses the pH sensors and the microprocessor to
help monitor the pollution.
[5]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

120
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 An elevator (lift) has a maximum weight limit of 2400 kg. The weight
carried is monitored by a sensor and a microprocessor.
Describe how the sensor and the microprocessor are used to make sure
the maximum weight limit is not exceeded.
[6]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 There are six output devices and six descriptions shown.
Draw a line to connect each output device to the most appropriate
description [5].

121
Teacher’s Name: Akhtab Hussain Past Paper Questions

122
Teacher’s Name: Akhtab Hussain Past Paper Questions

SUMMER 2019

(b) Sensors are used at the finish line to identify the number of competitors
who finish the race.
(i) Identify two different sensors that could be used to identify the number of
competitors.
Sensor 1 ___________________________________________________________ [1]
Sensor 2 ___________________________________________________________ [1]
(ii) The sensors are used with a microprocessor to count how many
competitors finish the race. Explain how the sensor and the
microprocessor are used. [6]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Nadia’s printer uses powdered toner rather than liquid ink.
(i) State the type of printer Nadia has purchased.
[1]

________________________________________________________________________________
(ii) Give two benefits of using this type of printer.
[2]

Benefit 1 ________________________________________________________________________
________________________________________________________________________________
Benefit 2 ________________________________________________________________________

123
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(iii) Give one drawback of using this type of printer.
[1]

Drawback1 ______________________________________________________________________
________________________________________________________________________________

3 Five descriptions of different input or output devices are given in the table.
Complete the table by stating the name of each input or output device.
[5]

1 Input and output devices are often connected to a personal computer.

124
Teacher’s Name: Akhtab Hussain Past Paper Questions
(a) Identify three input devices that can be connected to a personal computer.
[3]
1. ______________________________________________________________________________
2. ______________________________________________________________________________
3. _____________________________________________________________________________
(b) Identify three output devices that can be connected to a personal computer.
[3]
1. ______________________________________________________________________________
2. ______________________________________________________________________________
3. _____________________________________________________________________________
(ii) Marley prints the images for his project using an inkjet printer.
Describe how the inkjet printer prints an image.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7 (a)An office has an automated lighting system. When movement is detected
in the office the lights are switched on. If movement is not detected for a
period of 2 minutes the lights are switched off. The system uses a sensor
and a microprocessor.
Describe how the automated lighting system uses a sensor and a
microprocessor. [6]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

125
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
10 Remy has a mobile device that has a capacitive touch screen.
Describe how the capacitive touch screen registers Remy’s touch.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

6 A museum has an information point. Visitors to the museum can use the
information point to plan their visit to the museum. The information point
allows visitors to access the information using a resistive touch screen.
Visitors can either listen to the information or read it on the screen. They
can also select to output a paper copy of the information they require.
(a) Describe how the resistive touch screen registers the visitor’s touch.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

126
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(b) The information point has a screen to allow visitors to read information.
Identify two other output devices that are present in the information point.
[2]
Output device 1: ________________________________________________________
Output device 2: ________________________________________________________

127
Teacher’s Name: Akhtab Hussain Past Paper Questions
Past Paper Questions
Chapter No. 6
Summer 2015
5 Five storage devices are described in the table below. In column 2, name
the storage device being described. In columns 3, 4, or 5, tick () to show
the appropriate category of storage.

128
Teacher’s Name: Akhtab Hussain Past Paper Questions

2 Seven computer terms and seven descriptions are shown below.


Draw a line to link each computer term to its most appropriate description. [6]

129
Teacher’s Name: Akhtab Hussain Past Paper Questions

(b) Each image taken requires 1 MB of storage. If the camera captures an image every 5 seconds over a 24
hour period, how much storage is required?
Give your answer in gigabytes and show all your working. [2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

9 A remote-controlled model car contains RAM, ROM and a solid state drive. The car receives radio
signals from its remote control. It can only receive radio signals of a certain frequency. The

130
Teacher’s Name: Akhtab Hussain Past Paper Questions
manufacturer sets this frequency and the owner cannot change it. The owner of the model car can input
their own sequence of movements from an interface underneath the car.
(a) Describe the purpose of each of the three types of memory supplied with the car. [3]
RAM __________________________________________________________________________
________________________________________________________________________________
ROM __________________________________________________________________________
________________________________________________________________________________
Solid state drive ______________________________________________________________
________________________________________________________________________________
(c) Explain why the model car uses a solid state drive rather than another type of secondary storage.
[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Winter 2015
5 A security system records video footage. One minute of video requires 180 MB of storage. The
recording system can store several hours of video footage.
(a) Name and describe a suitable storage device for this recording system. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Calculate how much storage would be needed for 2 hours of video footage. Show your working and
give the answer in Gigabytes (GB). [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 MP3 file compression reduces the size of a music file by 90%.
(a) A music track is 80 MB in size.
Calculate the file size after compression. [1]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
How many MP3 files of the size calculated above could be stored on an 800 MB CD? [1]
________________________________________________________________________________

131
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________

(b) (i) Explain how MP3 files retain most of the original music quality. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) State the type of file compression used in MP3 files. [1]
________________________________________________________________________________
(iii) Name another file compression format. [1]
________________________________________________________________________________

Summer 2016
11 (a) Four examples of optical storage media are:
• DVD-RW • DVD-RAM • CD-ROM • Blu-ray disc
The table below shows four features of optical storage media.
Tick (✓) the appropriate boxes in the table to indicate which of the
features apply to each example of optical storage media.
[4]

(b) Solid state drives (SSD) are replacing hard disc drives (HDD) in some
computers.
(i) Give three reasons why this is happening.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________

132
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(ii) Explain why many web servers still use hard disc drive (HDD) technology.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
4 Nigel wants to send a large text file electronically to Mashuda.
(a) Describe how the size of the text file can be reduced.
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
10 There are six descriptions in the table below.
Complete the table below by writing the correct storage device or media in
the box next to each Description
[6]

133
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2016

8 Identify whether the four statements about file compression are correct by
writing TRUE or FALSE in the following table.
[4]

10 (a) A manufacturer of aeroplane engines assigns a denary identification


number (ID) to each engine. The current status of the engine is sent to a
computer in the aeroplane. Each piece of data collected is 8 bytes in size.
Data collection occurs every 30 seconds. Calculate the number of
kilobytes that would be needed to store the data collected during a 10-
hour flight. Show your working.
[3]
________________________________________________________________________________

134
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________kilobytes

Summer 2017
8 Complete the paragraph by choosing six correct terms from the list.
• Optical • On-line • RAM • HDD
• Primary • SSD • Secondary • ROM
• Off-line
A computer has two different types of memory _____________________memory is not
directly accessed by the CPU, but it allows a user to store data that can easily
be accessed by applications.
Two examples of this type of memory are _____________________and
_____________________. The second type of memory is _____________________ memory.
This memory is directly accessed by the CPU. It allows the processor to access
data and instructions that are stored in this memory. Two examples of this
memory are _____________________and _____________________. [6]
13 (a) Gurdeep wants to send a large file to Jennifer over the Internet.
State two benefits of compressing the file to send it
[2]
Benefit 1 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Benefit 2 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Two types of compression are lossy and lossless.
Choose the most suitable type of compression for the following and
explain your choice.
(i) Downloading the code for a computer program:
Type of compression: ________________________________________________________
Explanation: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

135
Teacher’s Name: Akhtab Hussain Past Paper Questions
_____________________________________________________________________________ [3]
(ii) Streaming a video file:
Type of compression: ________________________________________________________
Explanation: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [3]
2 Give two examples of primary, secondary and off-line storage.
[6]
Primary
Example 1: ______________________________________________________________
Example 2: ______________________________________________________________
Secondary
Example 1: ______________________________________________________________
Example 2: ______________________________________________________________
Off-line
Example 1: ______________________________________________________________
Example 2: ______________________________________________________________

Winter 2017

2 Storage devices and storage media can be categorised as primary,


secondary or off-line.
Write primary, secondary or off-line next to each storage device or medium to
indicate its most suitable category.
[6]
HDD ______________________________________________________________
RAM ______________________________________________________________
ROM ______________________________________________________________
CD-ROM ______________________________________________________________
SSD ______________________________________________________________
DVD-RAM ______________________________________________________________
8 (a) A computer has 2048 MB of RAM.
How many GBs of RAM does the computer have?
Show your working.
[2]

136
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
____________________________________________________________________________ GB (b)
Describe one item that is stored in RAM.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Explain three ways that RAM is different to ROM.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 Data files are stored in different file formats.
Complete the table by providing a suitable file format for each file type.
The first one has been done for you.
[3]

9 (a) Optical storage media can be used to store data.


Describe how the data is read from a Compact Disc (CD).
[4]

137
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

(b) Kamil wants to store a 16-bit colour image file. The image size is 1000
pixels.
Calculate the size of the file.
Give your answer in bytes. Show your working.
[2]
Working ___________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Answer ________________ bytes
(c) Describe the differences between primary and secondary storage.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Summer 2018

4 Michele wants to email a file to Elsa. The file is too large so it must be
compressed.

138
Teacher’s Name: Akhtab Hussain Past Paper Questions
(a) Name two types of compression that Michele could use.
[2]
Compression type 1 ________________________________________________________
Compression type 2 ________________________________________________________
(b) The file Michele is sending contains the source code for a large computer
program.
Identify which type of compression would be most suitable for Michele to
use.
Explain your choice.
[4]
Compression type ________________________________________________________
Explanation ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) The supermarket uses secondary storage and off-line storage to store data
about its stock.
Explain what is meant by secondary storage and off-line storage.
Secondary storage
__________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
Off-line storage ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [2]
(b) Nancy wants to email the photos to Nadia.
Many of the photos are very large files, so Nancy needs to reduce their file
size as much as possible. Identify which type of compression would be

139
Teacher’s Name: Akhtab Hussain Past Paper Questions
most suitable for Nancy to use. Explain your choice.
[4]
Compression type ________________________________________________________
Explanation ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
11 Identify three similarities between CDs and DVDs.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
12 An image is to be stored electronically.

The image is 256 pixels high by 200 pixels wide with a 16-bit colour depth.
Calculate the file size of the image. You must show all of your working.
[3]
________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

File size ____________________________________________ KB

140
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2018
1 (a) Computer files can be saved in different file formats.
Four file formats and four file types are given.
Draw a line to match each file format to the most suitable file type.
[3]

(b) Jamelia wants to store an image file. The image has an 8-bit resolution and
is 150 pixels by 100 pixels in size. Calculate the file size of the image. Give
your answer in kilobytes (kB). Show all of your working.
[3]
________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

File size _____________________________________________________ kB


(c) Large files can be compressed to reduce their file size.
Two types of compression that can be used are lossy and lossless.
Explain how a file is compressed using lossless compression.
[3]
________________________________________________________________________________

141
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

(d) The table contains four different file formats that use compression.
Tick () to show whether each file format uses lossy or lossless compression.
[4]

5 (a) Five storage devices or media are listed in the table.


Tick () to show whether each storage device or media is an example of
primary, secondary or off-line storage
[5]

(b) Users can store their data on optical storage media.


Explain how data is written to optical storage media.
[4]

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

142
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

(c) A sports events company uses a digital camera attached to a drone (small
flying system), to video their events from the sky.
The video is stored as it is captured, on a device that is attached to the
drone.
(i) Circle the most suitable type of storage to store the video.
Optical Magnetic Solid state [1]

(ii) Explain the reasons for your choice in part (c)(i).


[2]

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

2 A computer uses RAM and ROM to store data.


(a) The table contains three statements about RAM or ROM.
Tick (✓) to show whether each statement describes RAM or ROM.
[3]

(b) Circle the storage category that includes both RAM and ROM.
Primary Secondary Off-line
[1]
(c) Explain what is meant by off-line storage.
[2]

________________________________________________________________________________

143
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

(c) David needs to send a large section of the programming code as an email
attachment.
He uses lossless compression to reduce the file size.
Explain how the file size is reduced.
[3]
________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

9 Describe two differences between Read Only Memory (ROM) and Random
Access Memory
(RAM)
[4]
Difference 1

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

Difference 2
________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

144
Teacher’s Name: Akhtab Hussain Past Paper Questions
12 Explain the difference between a Musical Instrument Digital Interface
(MIDI) file and a MP3 file.
[4]

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

13 State which types of storage device or media would be most suitable for
these scenarios.
For each device or media, justify your choice.
(a) Creating a backup of 150 GB of data.
[2]

________________________________________________________________________________
Justification ________________________________________________________________
________________________________________________________________________________

(b) Storing applications on a tablet device.


[2]

________________________________________________________________________________
Justification ______________________________________________________________________
________________________________________________________________________________

(c) Storing a 1200 MB high-definition promotional movie about a new car. The
movie is to be given to people who are interested in buying a new car.
[2]

________________________________________________________________________________
Justification ____________________________________________________________________
________________________________________________________________________________

145
Teacher’s Name: Akhtab Hussain Past Paper Questions
Summer 2019

Darius is sending several programs that he has created to his friend Selma.
(c) He wants to compress the files to send them as he needs to attach them
to an email.
Darius tells Selma he is going to use lossy compression. Selma tells him
that he should use lossless instead.
Explain why Selma tells Darius to use lossless compression instead of
lossy. [4]
________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

(c) Nadia uses several types of computer storage for her homework and other
projects.
(i) Five examples of computer storage are given.
Tick () to show if the computer storage is Primary, Secondary or Off-line.
[5]

(ii) Nadia is considering purchasing a magnetic storage device.


Describe how a magnetic storage device stores data.
[6]

146
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________

_______________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

(iii) Give two advantages of using a magnetic storage device rather than a solid
state storage device.
[2]
Advantage 1 ____________________________________________________________________
________________________________________________________________________________
Advantage 2: ____________________________________________________________________
________________________________________________________________________________

5 The following text is stored as a text file:

She sells sea shells on the seashore. The shells that she sells are sea shells
I am sure.
Explain how lossless compression would compress this file.

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________

147
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

(b) The law company wants to purchase a new file server.


The company can purchase a server with either solid state storage or
magnetic storage. After discussion, it decides to purchase a file server
with magnetic storage.
Explain why the company chose magnetic storage rather than solid state
storage. [4]

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

________________________________________________________________________________
________________________________________________________________________________

(c) The law company also uses optical storage.


Give three different examples of optical storage.
[3]
1 __________________________________________________________________________
2 __________________________________________________________________________
3 __________________________________________________________________________
2 A finance company uses off-line storage to archive their accounts.
(a) Explain what is meant by off-line storage.
[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

148
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________ (b)
The computers in the finance company use both primary and secondary
storage.
(i) Give one example of primary storage.
[1]

________________________________________________________________________________ (ii)
Give two examples of secondary storage.
[2]

1 __________________________________________________________________________
2 __________________________________________________________________________
4 (a) Marley wants to store a video he has created for his school project. He
considers using a DVD or a Blu-ray to store the video. Explain two
differences between a DVD and a Blu-ray.
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________________________________________ [4]

(b) (i) Marley also needs to store ten 8-bit colour images in a file for his project.
Each image is 500 pixels wide and 300 pixels high. Calculate the total file
size in megabytes (MB) for all Marley’s images.
Show all your working. [3]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

149
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
File size _____________________________ MB
(b) A microprocessor uses ROM.
Explain what is meant by ROM.
[3]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) The information point uses both primary and secondary storage.
Explain what is meant by primary and secondary storage.
[4]
Primary ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Secondary ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

CHAPTER No. 7
PAST PAPER QUESTIONS
Summer 2015

1. Five statements about interpreters and compilers are shown in the table below.
Study each statement.
Tick () to show whether the statement refers to an interpreter or to a compiler. [5]

150
Teacher’s Name: Akhtab Hussain Past Paper Questions

9 (a) Five statements about interpreters and compilers are shown in the table
below.
Study each statement.
Tick (✓) to show whether the statement refers to an interpreter or to a
compiler. [5]

(b) State why a compiler or an interpreter is needed when running a high-level


program on a computer.
[1]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

(c) Give one benefit of writing a program in a high-level language.


[1]

151
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) Give one benefit of writing a program in a low-level language.
[1]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(e) Study the following three sections of code.
A: 10101101
11001110
10110111
B: LDA X
INC X
STA Y
C: FOR x ← 1 TO 10
READ n
END FOR

Identify, using the letters A, B or C, which of the above codes is an


example of assembly code, high-level language code or machine code:
[2]
Assembly code __________________________________________________
High-level language code
__________________________________________________
Machine code
__________________________________________________
2. Complete the following by writing either compiler, interpreter or assembler in the
spaces provided.
[3]

__________________________________ – translates source code into object code.


__________________________________ – translates low-level language into machine
code.
__________________________________ – stops the execution of a program as soon as it
encounters an error.

152
Teacher’s Name: Akhtab Hussain Past Paper Questions
Winter 2016

1 (a) Give two reasons why a programmer would choose to write code in a low-
level language.
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________

(b) High-level languages require either an interpreter or a compiler to


translate the program.
The table below lists a number of statements about language translators.
Tick () to show which statements refer to interpreters and which refer to
compilers. [5]

6 High-level or low-level languages can be used when writing a computer


program.
State two advantages of using a high-level language and two advantages of
using a low level language.
[4]
High-level language advantage 1:
__________________________________________________
________________________________________________________________________________
High-level language advantage 2
__________________________________________________
________________________________________________________________________________
Low-level language advantage 1
__________________________________________________

153
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
Low-level language advantage 2
__________________________________________________
________________________________________________________________________________
8 Four descriptions about compilers and interpreters are shown below.
Draw lines to indicate which descriptions refer to a compiler and which
descriptions refer to an interpreter.
[4]

Summer 2017

2 Programmers can use a high-level language to write a computer program.


(a) Explain what is meant by the term ‘high-level language’.
[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) A program written in a high-level language is translated into machine code.
This is so that it can be processed by a computer.
Name one type of translator that can be used.
[1]

________________________________________________________________________________
(c) Describe how your answer to part (b) translates this program.
[3]

154
Teacher’s Name: Akhtab Hussain Past Paper Questions

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Selma writes the following four answers in her Computer Science examination.
State which computer terms she is describing.
“It takes source code written in a high level language and translates it into
machine code. It translates the whole of the source code at once.”

Selma is describing ______________________________________________________________

155
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2017

10 Six statements about assembly language are shown.


Tick () whether the statement is true or false.
[6]

Summer 2018

7 Translators, such as a compiler and an interpreter, are used when writing


and running computer programs.
Describe how a compiler and an interpreter translate a computer program.
[6]
Compiler: ______________________________________________________________

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Interpreter: ______________________________________________________________

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
8 Dimitri is writing a computer program in a high-level language.

156
Teacher’s Name: Akhtab Hussain Past Paper Questions
He needs to send just the machine code for the program to his friend,
electronically. It is important that the program is executed as quickly as
possible.
Identify which translator will be most suitable for Dimitri to use. Explain
your choice. [4]

Type of translator: ________________________________________________________

Explanation
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
9 Three types of translators are assemblers, compilers and interpreters.
Tick (✓) the appropriate boxes to show which statements apply to each
type of translator. [4]

Winter 2018

6 (a) Many programmers write computer programs in high-level languages. The


programs need to be translated into machine code to be read by the
computer.
State two types of translator that can be used:
[2]
Translator 1: ______________________________________________________________
Translator 2: ______________________________________________________________

157
Teacher’s Name: Akhtab Hussain Past Paper Questions
(b) Explain two reasons why a computer programmer may choose to write a
program in a high-level language, rather than a low-level language
[4]
Reason 1 ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Reason 2 ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

(c) Three examples of computer code are given in the table.


Tick (✓) to show whether each example of computer code is High-level
language, Assembly language or Machine code.
[3]

7 David is writing a program using a high-level language. The program will be


published and sold for profit.
(a) David uses an interpreter when creating the computer program.
State three features of an interpreter.
[3]
Feature 1: ______________________________________________________________
________________________________________________________________________________
Feature 2: ______________________________________________________________
________________________________________________________________________________

158
Teacher’s Name: Akhtab Hussain Past Paper Questions
Feature 3: ______________________________________________________________
________________________________________________________________________________
(b) David compiles the program when he has completed it.
Explain two benefits of compiling the program.
[4]
Benefit 1: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Benefit 2: ______________________________________________________________

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

159
Teacher’s Name: Akhtab Hussain Past Paper Questions

Summer 2019

4 Darius is writing a computer program that allows binary values to be


calculated.
Darius chooses to write the program in a high-level language rather than a
low-level language.
(a) Explain why Darius chooses to write the program in a high-level language.
[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Darius will use a translator to translate the program. He could use a
compiler or an interpreter.
Five statements are given about compilers and interpreters.
Tick () to show if the statement applies to a Compiler or an Interpreter.
Statements may apply to both.
[5]

7 Annie writes a paragraph of text as an answer to an examination question


about programming languages.
Using the list given, complete Annie’s answer by inserting the correct six
missing terms. Not all terms will be used.
[6]
• Assembly • Converter • Denary
• Hexadecimal • High-level language • Low-level
language
• Machine Code • Source Code • Syntax
• Translator

160
Teacher’s Name: Akhtab Hussain Past Paper Questions
The structure of language statements in a computer program is called the
_______________________________. A programming language that uses natural
language statements is called a _______________________________. When programs
are written in this type of language they need a _______________________________ to
convert them into _______________________________.
A programming language that is written using mnemonic codes is called a
_______________________________. An example of this type of language is
_______________________________ language.

CHAPTER No. 8
PAST PAPER QUESTIONS
Summer 2015

4 Choose six correct terms from the following list to complete the spaces in
the paragraphs below:
[6]
• Encryption • File name • Firewall
• HTML tags/text • IP address • Protocol
• Proxy server • SSL certificate • Web server name
A user enters a URL. The web browser breaks up the URL into three
components:
1 _________________________
2 _________________________
3 _________________________
The web server returns the selected web page. The web browser reads the
_________________________ from the selected page and shows the correctly
formatted page on the user’s screen.
A _________________________ is used between the user’s computer and the network
to examine the data traffic to make sure it meets certain criteria.
To speed up the access to the web pages next time, a _________________________ is
used between the computer and web server; this device uses a cache to store
the website home page after it has been accessed for the first time.

161
Teacher’s Name: Akhtab Hussain Past Paper Questions
6 (a) Viruses, pharming and phishing are all examples of potential Internet
security issues.
Explain what is meant by each of these three terms.
[6]
Virus ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Pharming __________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Phishing __________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

8 Five computing terms are described below.


Write the name of the term being described.
[5]

Software that anyone can download for free from the Internet and then use
without having to pay any fees. The usual copyright laws apply and a user
license is important.
____________________________
Software that gives the user the chance to try it out free of charge before
actually buying it. The software is subject to the usual copyright laws. As a
rule, not all the features found in the full version are available at this
stage.
____________________________
Software where users have freedom to run, copy, change and adapt it. This
is an issue of liberty and not of price since the software guarantees
freedom and the right to study and modify the software by having access
to the actual source code.
____________________________

162
Teacher’s Name: Akhtab Hussain Past Paper Questions
Set of principles that regulate the use of computers in everyday life. This
covers intellectual property rights, privacy issues and the effects of
computers on society in general.

____________________________
The taking of somebody’s idea or software and claim that the idea or
software code were created by the “taker”.

____________________________

8. An online bank requires a client to supply an 8-digit code each time they wish to access their
account on the bank’s website.
Rather than ask the client to use a keyboard, they are requested to use an on-screen keypad
(shown on the right) to input the 8-digit code.
The position of the digits on the keypad can change each time the website is visited.
The client uses a mouse or touch screen to select each of the 8 digits.

(i) Explain why the bank has chosen to use this method of entering the 8 digits. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Name and describe another measure that the bank could introduce to improve the security
of their website. [3]
Name: ______________________________________________________________
Description ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
1 (a) Four statements about cookies are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement is true or false.
[4]

163
Teacher’s Name: Akhtab Hussain Past Paper Questions

4 (a) State what is meant by the term SSL.


[1]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The following stages take place when a user wishes to access a secure
website.
Put each stage in sequence by writing the numbers 1 to 6 in the column on
the right. The first one has been done for you.
[5]

(b) Five descriptions and five security issues are shown below.
Draw a line to connect each description to the correct security issue.
[4]

164
Teacher’s Name: Akhtab Hussain Past Paper Questions

1 There are a number of security risks associated with using the Internet.
Name three of these risks. For each, state why it is a risk and describe how the risk can be minimised.
[9]
Security risk 1: ________________________________________________________
Why it is a risk? ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
How to minimise the risk? __________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security risk 2: ________________________________________________________
Why it is a risk? ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

165
Teacher’s Name: Akhtab Hussain Past Paper Questions
How to minimise the risk? __________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security risk 3: ________________________________________________________
Why it is a risk? ________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
How to minimise the risk? __________________________________________________
________________________________________________________________________________
________________________________________________________________________________

7 (a) Check digits are used to ensure the accuracy of input data.
A 7-digit code number has an extra digit on the right, called the check digit.
Digit position 1 2 3 4 5 6 7 8
Digit – – – – – – – –
The check digit is calculated as follows:
• Each digit in the number is multiplied by its digit position
• The seven results are then added together
• This total is divided by 11
• The remainder gives the check digit (if the remainder = 10, the check digit is X)
(i) Calculate the check digit for the following code number. Show all your working.
4241508… [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Check digit ______________________________________________________________
(ii) An operator has just keyed in the following code number:
3240045X
Has the operator correctly keyed in the code number? [1]
________________________________________________________________________________
Give a reason for your answer. [2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

166
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2015
4 (a) Computer ethics involves a number of different topics.
(i) A student made the following statement on an examination paper:
“It allows a user to have the freedom to run, copy, change and adapt the software and then pass it on to
a colleague, friend or family member.”
Identify which computer term the student was describing. [1]
________________________________________________________________________________
(ii) Explain what is meant by computer ethics. [3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The four statements below refer to firewalls and proxy servers.
Study each statement. Tick () the appropriate column(s) to indicate whether the statement refers to a
firewall and/or a proxy server [4]

(c) Explain three ways of preventing accidental loss or corruption of data.


1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

167
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
10 Choose five correct terms from the following list to complete the spaces in the sentences below:
[5]

• Cypher text • Encryption algorithm • Encryption key


• Firewall • Plain text • Proxy server
• Symmetric encryption
__________________________________________ is a security system. It uses the same
__________________________________________ to encrypt and decrypt a message. Before encryption, the
message is called __________________________________________. The
__________________________________________ processes the original message. The output is known as
__________________________________________.

Summer 2016

1 Some software can be described as free, freeware or shareware.


Tick (✓) the appropriate boxes in the table below to show which features
apply to these three types of software.
[3]

6 Secure socket layer (SSL) is used in the security of information on Internet


websites.
(a) State how it is possible for a user to know that a website is secure by
looking at the web address.
[1]
________________________________________________________________________________
________________________________________________________________________________
(b) Describe three of the stages a web browser goes through to detect whether
a website is secure.
[3]

168
Teacher’s Name: Akhtab Hussain Past Paper Questions
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
8 (a) Five statements and three types of software are shown below.
Draw lines to connect each statement with the correct type of software.
[5]

Statement Type of Software

169
Teacher’s Name: Akhtab Hussain Past Paper Questions

8 A bank offers an online service to its customers. The bank has developed a
“SafeToUse” system that asks each customer to enter four randomly chosen
characters from their password each time they log in.
The customer selects these four characters from drop-down boxes. For
example:

170
Teacher’s Name: Akhtab Hussain Past Paper Questions

(a) (i) Explain why it is more secure to use drop-down boxes rather than entering
characters using a keyboard.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Give a reason why the system asks for four characters chosen at random.
[1]
________________________________________________________________________________
________________________________________________________________________________
(b) Biometrics is an additional form of security.
Give two examples of biometrics.
[2]
1 __________________________________________________________________________
2 __________________________________________________________________________
(b) Describe three ethical issues that should be considered when using
computers. [3]
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) Security of data is very important.
Three security issues are viruses, pharming and spyware.

171
Teacher’s Name: Akhtab Hussain Past Paper Questions
Explain what is meant by each issue.
[6]
Viruses: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Pharming: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Spyware: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) Describe three tasks carried out by a firewall.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

172
Teacher’s Name: Akhtab Hussain Past Paper Questions

10 Six security issues and six descriptions are shown below.


Draw a line to link each security issue to its correct description.
[5]

173
Teacher’s Name: Akhtab Hussain Past Paper Questions

174
Teacher’s Name: Akhtab Hussain Past Paper Questions

Winter 2016

9 (a) Explain what is meant by a denial of service attack.


[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Name and describe two other potential security threats when using the
Internet. [4]
Security threat 1 ______________________________________________________________
Description ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security threat 2 ______________________________________________________________
Description ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
2 Name each of the potential security issues described in the five statements
below: [5]
Statement Security issue
The act of gaining unauthorised access to
a computer system
__________________________
Program code that can replicate itself with
the intention of deleting or corrupting files
stored in a computer
__________________________
A small file sent by a web server to a web
browser; every time the user visits the
website, data about user preferences is
collected __________________________
The act of illegally changing the source
code of a program so that it can be
exploited for another use
__________________________
Malicious code installed on a user’s hard

175
Teacher’s Name: Akhtab Hussain Past Paper Questions
drive or a web server which redirects
the user to a fake website without their
knowledge __________________________

(c) The Henslows Diner stores personal data on a computer. This computer is
connected to the Internet to allow the data to be backed up. There is
currently one security method in place to protect the data on the computer
from unauthorised access. This is a password.
Give two other security methods that could be added to improve the
security of the data. Describe how each method will keep the data safe.
[4]
Security method 1 ________________________________________________________

Description ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security method 2 ________________________________________________________

Description ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) During data transmission, security is very important. Data are sent over
the Internet using Transport Layer Security (TLS) protocol.
Name the two layers that make up TLS.
[2]
1 __________________________________________________________________________
2 __________________________________________________________________________
11 Explain why ethics are important when using computers.
[6]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

176
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
12 Explain the differences between freeware and free software.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

177
Teacher’s Name: Akhtab Hussain Past Paper Questions

Summer 2017

7 Six security terms and six statements are listed below.


Draw a line to match the security term with the most appropriate
statement. [6]

8 A company has a number of offices around the world.


(a) Data is transmitted between the offices over the Internet. In order to keep
the data safe the company is using Secure Socket Layer (SSL) protocol
and a firewall at each office.

178
Teacher’s Name: Akhtab Hussain Past Paper Questions
Explain how SSL protocol and a firewall will keep the company’s data safe.
[4]
SSL protocol
________________________________________________________________________________
________________________________________________________________________________

Firewall
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) A company stores personal details of its customers on a computer system
behind a firewall.
Explain, with reasons, what else the company should do to keep this data
safe. [6]

________________________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
11 A company sells smartphones over the Internet.
Explain how the information stored on the company’s website is requested
by the customer, sent to the customer’s computer and displayed on the
screen. [7]
________________________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________

179
Teacher’s Name: Akhtab Hussain Past Paper Questions
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
_________________________________________________________________________________________
_______________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Winter 2017

5 Raj is using the Internet to do some online shopping. He visits a website


that tells him that it uses cookies.
(a) Explain what is meant by the term cookies.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Give two examples of the use of cookies.
[2]

Example 1 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Example 2 ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
10 (a) Describe what is meant by Transport Layer Security (TLS).
[3]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

180
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Name three different applications of TLS.
[3]
1 __________________________________________________________________________
2 __________________________________________________________________________
3 __________________________________________________________________________
11 Complete the paragraphs choosing the correct five terms from the list.
Each term can only be used once:
[5]
• Ethics • Freeware • Free Software • Hacking
• Malware • Plagiarism • Shareware • Virus
Taking another person’s work from the Internet and claiming it as your own is
called ______________________. It is possible to protect your work online with
copyright. One product that people may want to protect is software.
______________________ does allow a person to share copy and change software
freely, but ______________________ does not allow a person to do this legally.
Software that has a license allowing free use for a trial period is called
______________________. The name given to this area of Computer Science is
______________________.
7 Six statements about firewalls are shown.
Tick () to show whether each statement is true or false
[6]

181
Teacher’s Name: Akhtab Hussain Past Paper Questions

8 (a) Data is valuable. It needs to be kept secure and it can easily be damaged.
Give three different ways that data can be accidentally damaged.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
(b) The Secure Socket Layer (SSL) protocol can be used to securely transmit
data in online banking. State three other different applications that use SSL.
[3]
Application 1 ____________________________________________________________________
Application 2 ____________________________________________________________________
Application 3 ____________________________________________________________________
(c) Online banking is increasing in popularity.
Online banking can be a risk as it can raise a number of security issues.
SSL can be used as a security method to make online banking safer.
Identify and describe three other security methods that could be used to
make online banking safer.
[6]
Security method 1: ______________________________________________________________
________________________________________________________________________________

182
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
Security method 2: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security method 3: ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Summer 2018

9 A business wants to use a biometric security system to control entry to


the office.
The system will use a biometric device and a microprocessor.
Explain how the biometric security system will make use of the biometric
device and the microprocessor to control entry to the office.
[6]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Describe what is meant by https.
[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

183
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
(c) When a customer enters the website, a message is displayed:
“RockICT makes use of cookies. By continuing to browse you are agreeing
to our use of cookies.” Explain why the music company uses cookies.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(d) The music company is concerned about the security of its website. The
company uses a proxy server as part of its security system. Describe the
role of a proxy server in the security system.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
11 A factory uses a security system to control a security light. The system
uses a sensor and a microprocessor. Explain how the security system
makes use of the sensor and the microprocessor to control the security
light. [6]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

184
Teacher’s Name: Akhtab Hussain Past Paper Questions
12 (a) Selma has some important personal information that she needs to email to
her employer.
She wants to make sure that if the personal information is intercepted, it
cannot be understood.
(i) State how Selma could email her personal data more securely.
[1]

________________________________________________________________________________
(ii) Describe how your chosen solution works.
[5]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
3 Three security issues that could affect users online are phishing, pharming
and spam.
Explain what is meant by each security issue.
[6]
Phishing
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Pharming
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Spam
________________________________________________________________________________
________________________________________________________________________________

185
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
(c) Data transferred over a network is encrypted to improve data security.
The system uses 64-bit symmetric encryption.
(i) Explain how encryption improves data security.
[2]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

(ii) Explain one method that could be used to increase the level of security
provided by the encryption.
[2]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Winter 2018

4 Phishing and pharming are two examples of online security threats to a


computer system.
(a) Explain what is meant by phishing and pharming.
[4]
Phishing
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Pharming
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Identify two other online security threats to a computer system.
[2]

186
Teacher’s Name: Akhtab Hussain Past Paper Questions
Security threat 1 ________________________________________________________
Security threat 2 ________________________________________________________
(c) Give two security measures that can help to protect a computer system
from online security threats.
[2]
Security measure 1 ________________________________________________________
Security measure 2 ________________________________________________________
4 (a) Identify three security issues that can put a computer system at risk.
[3]
Security issue 1 ________________________________________________________
Security issue 2 ________________________________________________________
Security issue 3 ________________________________________________________
(b) Explain how a firewall can help to protect a computer system from
security issues. [4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
6 Sarah stores data electronically.
Describe three methods that she could use to avoid loss of stored data.
[6]
Method 1
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Method 2
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

187
Teacher’s Name: Akhtab Hussain Past Paper Questions
Method 3
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Summer 2019

7 Arya regularly uses the Internet as a research tool for her school projects.
Identify and describe three risks to Arya’s computer when she is using the
Internet for research.
[6]
Risk 1: ____________________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
Risk 2: ____________________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
Risk 3: ____________________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________

4 (a) Fatima is concerned about the risks to her computer when using the
Internet.
She wants to use some security methods to help protect her computer
from the risks. Identify a security method she could use for each of the
following risks. Each security method must be different.
Describe how each security method will help protect Fatima’s computer.
(i) Computer virus [3]
Security method ________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Hacking [3]
Security method ________________________________________________________

188
Teacher’s Name: Akhtab Hussain Past Paper Questions
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(iii) Spyware [3]
Security method ________________________________________________________
Description
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) Fatima is also concerned that the data she stores could be subject to
accidental damage or accidental loss.
(i) State three ways that the data Lola stores could be accidentally damaged or
accidentally lost.
[3]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________
3 __________________________________________________________________________
________________________________________________________________________________
(ii) Give two methods that Lola could use to help keep her data safe from
accidental damage or accidental loss.
[2]
1 __________________________________________________________________________
________________________________________________________________________________
2 __________________________________________________________________________
________________________________________________________________________________

6 A law company holds a lot of sensitive data about its clients.


(a) It currently requires employees to enter a username and a password to log-
in to an account. Each password must be 8 letters. The company wants to
increase the security of the log-in system.
Identify two improvements the company could use to make the log-in
system more secure. Explain how each improvement increases security.
[4]

189
Teacher’s Name: Akhtab Hussain Past Paper Questions
Improvement 1 ________________________________________________________
________________________________________________________________________________
Explanation ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Improvement 2 ________________________________________________________
________________________________________________________________________________
Explanation ______________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

8 An art gallery has a website that is used to display and sell art.
(a) The gallery uses Secure Socket Layer (SSL) to provide a secure connection
when selling art.
Describe the process of SSL and how it provides a secure connection.
[6]
________________________________________________________________________________
________________________________________________________________________________
_______________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The art gallery also uses a firewall.
Six statements are given about firewalls.
Tick () to show if the statement is True or False.
[6]

190
Teacher’s Name: Akhtab Hussain Past Paper Questions

(c) The art gallery is concerned about computer ethics relating to its website.
Explain what is meant by computer ethics and why the art gallery is
concerned about computer ethics [4].

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
5 A music company wants to send a new music file to many radio stations. It
will send the music file the day before the release date so that the radio
stations can store the file ready for release.
The music company does not want the radio stations to be able to open
the music file until 09:00 on the release date.
Identify two security measures and describe how each measure can be used
to make sure the music file cannot be opened until the release date.
[4]
Security measure 1: ______________________________________________________________
Description: ____________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Security measure 2: ______________________________________________________________
Description: ____________________________________________________________________
________________________________________________________________________________

191
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________

(b) Priya uses cookies in her website.


Five statements are given about cookies.
Tick (✓) to show if the statement is True or False.
[5]

(e) Priya is concerned about a denial of service attack (DoS) occurring on her
webserver.
(i) Explain what is meant by a denial of service attack.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Give one security device that can be used to help prevent a denial of
service attack. [1]

________________________________________________________________________________(e)
When customers access Victoria’s website they will be given the message:

This website uses cookies. An explanation of their purpose can be found in


our cookies policy.
(i) Explain what is meant by cookies.
[2]

192
Teacher’s Name: Akhtab Hussain Past Paper Questions

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(ii) Explain why Victoria would use cookies as part of her website.
[4]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
7. A finance company is concerned that its employees are being distracted
by using gaming websites at work.
(a) Explain how a firewall could help prevent this distraction.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(b) The finance company is also worried about the security of the data stored
on its servers.
The company has decided to encrypt the data to improve the security.
Describe how the data are encrypted.
[4]
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

193
Teacher’s Name: Akhtab Hussain Past Paper Questions
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
(c) The finance company realises that its computer systems have been
hacked. The company thinks that spyware was used to obtain a user’s
password.
Explain how spyware could have been used to obtain the user’s password.
[6]

________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

194

You might also like