MFSS 2020 P1
MFSS 2020 P1
Secondary 4 Express
COMPUTING 7155/01
Paper 1 Written 16 Sep 2020 (Wed)
8.15 am 2 hours
Write your name, index number and class in the spaces provided at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Approved calculators are allowed.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part
question.
You should show all your working.
The total marks for this paper is 80.
Total 80
2
(a) State the type of data that is held in each of the following cells.
A1................................................................................................................
A8................................................................................................................
B1................................................................................................................ [3]
(b)
(i) The cell B4 shows the monthly payment amount.
Identify the most appropriate function to use in cell B4, if the interest
rate and monthly payment amount remain the same.
[1]
…......................................................................................................
(ii) The cell E1 shows the total amount that Amanda has paid to date.
The payments are entered in cells B8 to B68.
(iv) Cell E2 shows the amount owed to the nearest whole number.
2
(a)
(i) Convert the denary number 232 into a hexadecimal number. Show
your working.
…......................................................................................................
…...................................................................................................... [2]
…......................................................................................................
(ii) Convert the binary number 10100110 into a denary number. Show
your working.
…......................................................................................................
…...................................................................................................... [2]
…......................................................................................................
…......................................................................................................
…...................................................................................................... [2]
…......................................................................................................
4
2 .................................................................................................................
5
y=1
INPUT
a, b, c, d
x=0
y=a
a=b
is a > b? Yes
b=y
No x=1
y=b
b=c
is b > c?
Yes
No c=y
x=1
y=c
c=d
is c > d? Yes
No d=y
x=1
Yes is x = 1? No OUTPUT
a, b, c, d
START
END
6
(a) Complete the trace table for the following set of data.
a = 3, b = 4, c = 2, d = 1
Trace table
a b c d x y Output
[7]
7
….................................................................................................................
y .................................................................................................................
4 The following diagram shows five network terms and six descriptions.
Term Description
[5]
The average number of bits of data
that can be transmitted from a source
to a destination over the network
Wide Area
Network Network of devices connected by a
(WAN) physical medium such as cables
5 Insert five of the following words/phrases in the correct place in the text below.
The type of computer memory used depends on how the data is meant to be used.
used. The …………………...….. is used for data that starts up computers or data
due to its small size and resistance to drops and mechanical shock. [5]
1...................................................................................................................
….................................................................................................................
2...................................................................................................................
…................................................................................................................. [2]
1...................................................................................................................
….................................................................................................................
2...................................................................................................................
…................................................................................................................. [2]
(c) State one ethical issue with the use of technology in finance.
….................................................................................................................
[1]
….................................................................................................................
7 Data stored on a computer is valuable and needs to be kept safe and secure.
10
(a) Identify two methods of keeping computer-based data safe from power
failure.
1...................................................................................................................
….................................................................................................................
….................................................................................................................
2...................................................................................................................
….................................................................................................................
…................................................................................................................. [2]
(b) Describe the following terms and how they could be used in cyberattacks.
Trojan horse.................................................................................................
….................................................................................................................
…................................................................................................................. [4]
Pharming......................................................................................................
….................................................................................................................
…................................................................................................................. [1]
….................................................................................................................
11
8
(a) Identify the logic gates represented by the following truth tables.
(i)
A B X
0 0 1
0 1 1
1 0 1
1 1 0
[1]
…......................................................................................................
(ii)
A B X
0 0 0
0 1 1
1 0 1
1 1 1
[1]
…......................................................................................................
(b) Draw a logic circuit to represent the following Boolean statement. Do not
simplify the statement.
B X
C
[5]
12
A B C Working Space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0 [4]
1 1 1
9 A pseudo-code algorithm:
● allows a user to input 20 numbers and store them in a list
● allows the user to input a target number to search for
● outputs the number of times the target number is found in the list.
1 For Index = 0 to 20
2 OUTPUT "Input a number"
3 INPUT Numbers[x]
4 NEXT Index
5 OUTPUT "Input the number to search for"
6 INPUT Search
7 Count = 1
8 FOR Index = 0 to 19
9 IF Search == Numbers[Index] THEN
10 Count = Count + 1
11 ENDIF
12 NEXT Count
13 OUTPUT Index
13
Error 1.....................................................................................................................
Correction................................................................................................................
Error 2.....................................................................................................................
Correction................................................................................................................
Error 3.....................................................................................................................
Correction................................................................................................................
Error 4.....................................................................................................................
[8]
Correction................................................................................................................
14
10 A program needs to reverse the letters of a string and then prints the result. You
may assume that the input string only contains lower case alphabet characters.
So the reverse of input string “abcde” is “edcba”.
[7]
15
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
….............................................................................................................................
…............................................................................................................................. [7]
End of Paper