CSc9618(as)- Mock 5 - Paper 1
CSc9618(as)- Mock 5 - Paper 1
AS Level
Exam Topic: Full Syllabus
Paper 1 Duration: 2 hours Total Marks: 75
(a) Tick (✓) one box in each row to identify the effect of each action on the accuracy of the
recording.
(b) The audio message is recorded with a sampling rate of 50 kHz and a sampling resolution of
16 bits.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Explain the purpose of a buffer in a computer system using one other example.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
2 The relational database ASTRONOMY is used to store data about telescopes, the companies that
own the telescopes and the photographs taken by the telescopes.
(a) Complete the following table by writing the correct answer for each item.
Item Answer
[3]
Identify the feature that describes the relationship between data and its structure.
............................................................................................................................................. [1]
(c) Complete the SQL script to return the total number of telescopes owned by the company
whose ID begins with HW.
FROM TELESCOPE
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Complete the statements about bitmap images by writing the missing words.
of the file.
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3 Draw one line from each Operating System (OS) management task to its most appropriate
description.
security management
memory management
process management
[4]
4 (a) A Central Processing Unit (CPU) contains several special purpose registers and other
components.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(ii) State when interrupts are detected during the Fetch-Execute (F-E) cycle.
...........................................................................................................................................
..................................................................................................................................... [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Upgrading secondary storage to solid state typically improves the performance of computer
systems.
Identify one other upgrade to the hardware and explain why it improves the performance of
a computer system.
Upgrade ....................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
5 (a) Draw a logic circuit for the logic expression:
B X
[3]
Working space
P Q R Y
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[2]
Question 6 begins on page 10.
6 The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).
Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given
address to ACC
LDX <address> Indexed addressing. Form the address from <address> + the contents
of the index register. Copy the contents of this calculated address to
ACC
LDR #n Immediate addressing. Load the number n to IX
MOV <register> Moves the contents of the accumulator to the given register (IX)
STO <address> Store contents of ACC at the given address
ADD <address> Add the contents of the given address to the ACC
ADD #n Add the denary number n to the ACC
SUB #n Subtract the denary number n from the ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
JMP <address> Jump to the given address
CMP #n Compare the contents of ACC with number n
CMI <address> Indirect addressing. The address to be used is at the given address.
Compare the contents of ACC with the contents of this second
address
JPE <address> Following a compare instruction, jump to <address> if the compare
was True
JPN <address> Following a compare instruction, jump to <address> if the compare
was False
OUT Output to the screen the character whose ASCII value is stored in
ACC
END Return control to the operating system
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
(a) The current contents of main memory and selected values from the ASCII character set are
given.
(i) Trace the program currently in memory using the trace table.
100 1
101 0
110 97
111 98
112 97
ASCII Character
value
49 1
50 2
51 3
52 4
65 A
66 B
67 C
68 D
[4]
(ii) Explain the purpose of relative addressing in an assembly language program.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) The following table shows another part of the instruction set for the processor.
Instruction
Explanation
Opcode Operand
AND #n Bitwise AND operation of the contents of ACC with the operand
AND Bn Bitwise AND operation of the contents of ACC with the binary number n
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR Bn Bitwise OR operation of the contents of ACC with the binary number n
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right-hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left-hand end
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101
0 0 1 1 0 1 1 0
Show the contents of the ACC after the execution of the following instruction.
AND B01001100
...........................................................................................................................................
...........................................................................................................................................
[1]
(ii) The current contents of the ACC are:
1 0 0 1 0 1 0 1
Show the contents of the ACC after the execution of the following instruction.
OR B01001111
...........................................................................................................................................
...........................................................................................................................................
[1]
1 0 0 1 1 1 0 1
Show the contents of the ACC after the execution of the following instruction.
LSR #2
...........................................................................................................................................
...........................................................................................................................................
[1]
...................................................................................................................................................
............................................................................................................................................. [1]
7 (a) The diagram shows the hardware and software used to retrieve files stored on the cloud.
Internet
Laptop Firewall A Service X
Provider
Complete the following table by writing the answer for each row.
Answer
A type of cloud, X
(b) Give one advantage and two disadvantages of transmitting data using satellites instead of
copper cables.
Advantage 1 .............................................................................................................................
...................................................................................................................................................
Disadvantage 1 .........................................................................................................................
...................................................................................................................................................
Disadvantage 2 .........................................................................................................................
...................................................................................................................................................
[3]
(c) Local Area Networks (LANs) can be made up of several subnetworks.
(i) Give two benefits of dividing a network into subnetworks by subnetting the LAN.
1 ............................................................................................................................. ...........
...........................................................................................................................................
2 ............................................................................................................................. ...........
...........................................................................................................................................
[2]
10.10.12.1 255.0.0.0
192.168.12.4 255.255.255.0
...........................................................................................................................................
...........................................................................................................................................
[2]
8 (a) (i) Explain why some programs are distributed under an open source licence.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Explain how a programmer benefits from distributing a program under a commercial
licence.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) A commercial program for a vehicle repair garage includes an Artificial Intelligence (AI)
module that can diagnose faults and suggest repairs.
Describe one economic impact the AI module may have on the garage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
9 (a) (i) Convert the unsigned binary value into hexadecimal.
10010011
10010011
(b) State two benefits of using Binary Coded Decimal (BCD) to represent values.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
[2]
10 (a) Explain the importance of feedback in a control system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) (i) Identify one sensor that could be used in a car alarm system.
Sensor ............................................................................................................................. ..
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]