AS Computer Mock P1 April 17
AS Computer Mock P1 April 17
* 1 9 4 9 4 4 2 0 6 4 *
COMPUTER SCIENCE
Paper 1 Theory Fundamentals
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
[Turn over
2
1 (a) Draw one line from each binary value to its equivalent (same) value on the right.
Binary value
1 kibibyte
8 bits
1 gigabyte
8000 bits
1 byte
1000 kilobytes
1 kilobyte
1024 mebibytes
1 gibibyte
8192 bits
1 megabyte
1 mebibyte
[5]
(b) (i) Perform the following binary addition. Show your working.
10101010
+ 00110111
[2]
(ii) State how an overflow can occur when adding two binary integers.
...........................................................................................................................................
..................................................................................................................................... [1]
...................................................................................................................................................
............................................................................................................................................. [1]
3
2 Xanthe wants to maintain the integrity and security of data stored on her computer.
(a) Explain the difference between data security and data integrity.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Xanthe uses both data validation and data verification when entering data on her computer.
(i) Describe how data validation helps to protect the integrity of the data. Give an example
in your answer.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
[2]
(ii) Describe how data verification helps to protect the integrity of the data. Give an example
in your answer.
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Example ............................................................................................................................
[2]
Give two similarities and one difference between spyware and a virus.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
[3]
[Turn over
4
A
B X
............................................................................................................................................. [3]
(b) Complete the truth table for the given logic circuit.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
5
(c) Identify one logic gate not used in the given logic circuit. Draw the symbol for the logic gate
and complete its truth table.
NAND
Logic gate: ………………………………
Symbol:
Truth table:
A B Output
0 0
0 1
1 0
1 1
[3]
[Turn over
6
4 Francis is starting his first job as a software developer for a multinational company.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Francis is shown the software he will be working on. He is unfamiliar with the Integrated
Development Environment (IDE) he is required to use.
(i) Describe the ways in which Francis can act ethically in this situation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) A typical IDE provides debugging tools to support the testing of a program.
Identify three other tools or features found in a typical IDE to support the writing of the
program.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(c) Francis is part of a team writing a program. He finds an error in part of the program that
has already been tested. He decides not to tell anyone because he is worried about the
consequences.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
7
Compiler
............................................... are usually used when a high-level language program is
complete. They translate all the code at the same time and then run the program.
Executable
They produce ............................................... files that can be run without the source code.
and then run that line of code. They are most useful while developing the programs because
errors can be corrected and then the program continues from that line.
Machine Code
Assemblers are used to translate assembly code into ............................................... .
[4]
[Turn over
8
5 Javier owns many shops that sell cars. He employs several managers who are each in charge of
one or more shops. He uses the relational database CARS to store the data about his business.
(a) Tick ( ) one box in each row to identify whether each field is a primary key or a foreign key.
MANAGER ManagerID
SHOP ManagerID
CAR RegistrationNumber
CAR ShopID
[2]
(b) Describe the ways in which access rights can be used to protect the data in Javier’s database
from unauthorised access.
...................................................................................................................................................
employees can be given user names and passwords
each user can be given different access rights
...................................................................................................................................................
this prevents/hides confedntial data in the database from them
...................................................................................................................................................
without a valid username and id system cannot be accessed
...................................................................................................................................................
and confidential data can only be seen by authorized personel only
...................................................................................................................................................
............................................................................................................................................. [3]
9
(c) Javier uses Data Definition Language (DDL) and Data Manipulation Language (DML)
statements in his database.
(i) Complete the following DML statements to return the number of cars for sale in each
shop.
RegistrationNumber
SELECT COUNT(.........................................................)
CAR
FROM .........................................................
GROUPBY
......................................................... ShopID
[3]
(ii) Complete the DML statement to include the following car in the table CAR.
Field Data
RegistrationNumber 123AA
Make Tiger
Model Lioness
NumberOfMiles 10500
ShopID 12BSTREET
INSERT
........................ INTO
........................ CAR
VALUES ("123AA","Tiger","Lioness",10500,"12BSTREET")
............................
[2]
[Turn over
11
6 (a) There are two errors in the following register transfer notation for the fetch-execute cycle.
1 MAR [PC]
2 PC [PC] − 1
3 MDR [MAR]
4 CIR [MDR]
Line
Description of the error Correct statement
number
PC should increment by
one not decerement PC<-- [PC]+1
[Turn over
12
(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
STO <address> Store the contents of ACC at the given address
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
Address Data
100 00001111
101 11110000
102 01010101
103 11111111
104 00000000
13
Each row of the following table shows the current contents of ACC in binary and the instruction
that will be performed on those contents.
Complete the table by writing the new contents of the ACC after the execution of each
instruction.
[4]
[Turn over
14
(a) He repeats the recording of the sound several times, with a different sample rate each time.
(i) Describe the reasons why the sound is closer to the original when a higher sample rate
is used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Describe the reasons why the sound file size increases when a higher sample rate is
used.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) Bobby wants to email the sound file to his school email address. He compresses the file
before sending the email.
(i) Explain the reasons why Bobby compresses the sound file.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
15
(a) State whether the network will be a LAN (local area network) or a WAN (wide area network).
Justify your choice.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) One classroom in the building has 30 computers. The computers need to be connected to the
network. Each computer has a network interface card (NIC).
Identify two possible devices that can be used to physically connect the 30 computers to the
rest of the network.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(c) The school has several laptops. Each laptop has a Wireless Network Interface Card (WNIC).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]