Download as pdf or txt
Download as pdf or txt
You are on page 1of 400

Muhammad Qadeer (0333-8136280)

www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 6 2 7 1 1 1 7 6 8 3 *

COMPUTER SCIENCE 2210/13


Paper 1 Theory October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 11 printed pages and 1 blank page.

DC (NH/SW) 171198
© UCLES 2018 [Turn over

Page 1 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 There are six output devices and six descriptions shown.

Draw a line to connect each output device to the most appropriate description.

Device Description

Uses a high-intensity beam


of light shone through three layers
of changing pixels
Laser Printer

Uses millions of micro mirrors to


reflect light through a lens
LCD Projector

Uses plastic, resin or


Digital Light Projector powdered metal to generate a
(DLP) physical output

Uses a static electric charge


Inkjet Printer on a rotating drum to
generate a physical output

3D Printer
Uses liquid ink to generate
a physical output

2D Cutter
Uses a high-power laser to
generate a physical output

[5]

© UCLES 2018 2210/13/O/N/18

Page 2 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

2 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check for errors during data
transmission and storage.

(a) A system uses even parity. Write the appropriate parity bit for each byte.

Parity Bit
1 0 1 0 0 1 1
1 0 1 1 1 1 1
1 0 1 0 0 0 1
[2]

(b) Explain how Automatic Repeat reQuests (ARQ) are used in data transmission and storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) State one other method that could be used to check for transmission errors.

...............................................................................................................................................[1]

3 An elevator (lift) has a maximum weight limit of 2400 kg. The weight carried is monitored by a
sensor and a microprocessor.

Describe how the sensor and the microprocessor are used to make sure the maximum weight
limit is not exceeded.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]
© UCLES 2018 2210/13/O/N/18 [Turn over
Page 3 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 The MAC address of a device is represented using hexadecimal.

A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary.

(a) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The
first number has already been converted.

6A FF 08 93
01101010
[3]

(b) Explain why data is stored as binary in computers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

5 Data can be transferred using half-duplex serial transmission.

(a) Describe serial transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Give one application of serial data transmission.

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Describe half-duplex data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 2210/13/O/N/18

Page 4 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

6 Sarah stores data electronically.

Describe three methods that she could use to avoid loss of stored data.

Method 1 ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Method 2 ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Method 3 ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2018 2210/13/O/N/18 [Turn over


Page 5 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

7 David is writing a program using a high-level language. The program will be published and sold for
profit.

(a) David uses an interpreter when creating the computer program.

State three features of an interpreter.

Feature 1 ..................................................................................................................................

...................................................................................................................................................

Feature 2 ..................................................................................................................................

...................................................................................................................................................

Feature 3 ..................................................................................................................................

...................................................................................................................................................
[3]

(b) David compiles the program when he has completed it.

Explain two benefits of compiling the program.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 2210/13/O/N/18

Page 6 of 400
Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

(c) David needs to send a large section of the programming code as an email attachment.

He uses lossless compression to reduce the file size.

Explain how the file size is reduced.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 2210/13/O/N/18 [Turn over


Page 7 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

8 Alice enters a URL into a web browser to access a webpage.

(a) State what URL represents.

U ........................................... R ........................................... L ........................................... [1]

(b) Explain how the web browser uses the URL to access the webpage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

9 Describe two differences between Read Only Memory (ROM) and Random Access Memory
(RAM).

Difference 1 .......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Difference 2 ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2018 2210/13/O/N/18

Page 8 of 400
Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

10 A logic circuit is shown:

(a) Complete the truth table for the given logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2018 2210/13/O/N/18 [Turn over


Page 9 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

(b) Draw a logic circuit corresponding to the logic statement:

X = 1 if ((A is 1 AND B is 1) AND (A is 1 OR C is NOT 1)) OR (B is 1 AND C is NOT 1)

B X

[6]

11 The fetch-execute cycle make use of registers.

(a) Describe the role of the Program Counter (PC).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe the role of the Memory Data Register (MDR).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 2210/13/O/N/18

Page 10 of 400
Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

12 Explain the difference between a Musical Instrument Digital Interface (MIDI) file and a MP3 file.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

13 State which types of storage device or media would be most suitable for these scenarios.

For each device or media, justify your choice.

(a) Creating a backup of 150 GB of data.

...................................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................
[2]

(b) Storing applications on a tablet device.

...................................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................
[2]

(c) Storing a 1200 MB high-definition promotional movie about a new car. The movie is to be
given to people who are interested in buying a new car.

...................................................................................................................................................

Justification ...............................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2018 2210/13/O/N/18

Page 11 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 2210/13/O/N/18

Page 12 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge Assessment International Education


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/13


Paper 1 October/November 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 13 printed pages.

© UCLES 2018 [Turn over

Page 13 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2018 Page 2 of 13

Page 14 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2018 Page 3 of 13

Page 15 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

1 1 mark for each correct line, maximum 5 marks 5

Device Description

Uses a high-intensity beam


Laser Printer of light shone through three
layers of changing pixels

LCD Projector Uses millions of micro


mirrors to reflect light
through a lens

Uses plastic, resin or


Digital Light Projector
powdered metal to generate
(DLP)
a physical output

Uses a static electric charge


Inkjet Printer on a rotating drum to
generate a physical output

Uses liquid ink to generate a


3D Printer
physical output

Uses a high-power laser to


2D Cutter
generate a physical output

© UCLES 2018 Page 4 of 13

Page 16 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

2(a) 2 marks for 3 correct bits, 1 mark for 2 correct bits 2

Parity Bit

0 1 0 1 0 0 1 1

0 1 0 1 1 1 1 1

1 1 0 1 0 0 0 1

2(b) Two from: 2


• Set of rules for controlling error checking/detection // it’s an error detection method // used to detect errors
• Uses acknowledgement and timeout
• Request is sent (with data) requiring acknowledgement
• If no response/acknowledgment within certain time frame data package is resent
• When data received contains an error a request is sent (automatically) to resend the data
• The resend request is repeatedly sent until packet is received error free/limit is reached/acknowledgement received

2(c) Checksum 1

Question Answer Marks

3 Six from: 6
• A pressure sensor is used
• The sensor sends data/signals to the microprocessor
• Data is converted to digital format
• Microprocessor compares data value against set value
• If value <= 2400 Kg/under weight limit lift is permitted to operate
• If value > 2400 Kg/over weight limit signal is sent from the microprocessor to deliver warning message to
passengers
• If value > 2400 Kg signal is sent from the microprocessor to lift mechanism to stop lift operating
• Weight continuously monitored

© UCLES 2018 Page 5 of 13

Page 17 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

4(a) 1 mark for each correct conversion 3


01101010 11111111 00001000 10010011

4(b) • Computers use switches / logic gates 2


• Only uses 2 states / On or Off / 1 or 0

Question Answer Marks

5(a) • Bits sent one at a time 2


• Uses a single wire

5(b) USB / SATA / Wifi /PCI Express / Any appropriate serial device 1

5(c) • Data is transferred in two directions 2


• Data is sent in only one direction at a time

© UCLES 2018 Page 6 of 13

Page 18 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

6 1 mark for method name, 1 mark for description e.g. 6

Backups
• Make a copy of the data
• Copy stored away from main computer
• Data can be restored from backup

Anti-virus
• Scans computer for viruses
• Software to detect/remove viruses
• Can prevent data being corrupted by viruses

Firewall
• Hardware or software that monitors network traffic
• To help prevent hackers gaining access / deleting data

Password/Biometrics
• To help protect files / computer from unauthorised access

Restricted access
• To stop users downloading/installing software that could harm

Verification
• Message e.g. to ask if definitely want to delete

Physical methods
• Locks/alarms/CCTV to alert/deter unauthorised access

© UCLES 2018 Page 7 of 13

Page 19 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

7(a) Three from: 3


• It is a translator
• Translates (high level language) to low level language
• Executes one line at a time
• Translates source code line by line
• Runs error diagnostic
• Produces error messages to tell user location of error
• Stops execution when encounters errors
• Continues translating when an error is fixed

7(b) Four from (Max three per benefit): 4

• Produces executable file


• this creates a smaller file size
• more saleable

• Program will be machine independent / portable


• this means it can be used on any hardware

• No need for compiler to run executable file


• this means it will be quicker to run
• customers can just execute the program

• Source code cannot be accessed


• therefore, code cannot be stolen / plagiarised

7(c) Three from: 3


• Uses compression algorithm / by example e.g. RLE
• Repeating words / phrases / patterns identified
• replaced with value
• File / dictionary / index of phrases created
• Index will store word/phrase with value

© UCLES 2018 Page 8 of 13

Page 20 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

8(a) Uniform Resource Locator 1

8(b) Four from: 4


• The web browser sends URL to DNS
• DNS stores an index of URL and matching IP address
• DNS searches for URL to obtain the IP address
• IP address sent to web browser, (if found)
• Web browser sends request to IP of webserver
• Webserver sends web page to web browser
• Web browser interprets HTML to display web page
• If URL not found DNS returns error

Question Answer Marks

9 Four from: 4

• ROM is permanent
• RAM is temporary

• ROM is non-volatile
• RAM is volatile

• ROM is read only


• RAM can have read/write operations

• ROM holds instructions for boot up


• RAM holds files / instructions in use

© UCLES 2018 Page 9 of 13

Page 21 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

10(a) 4 marks for 8 correct outputs 4


3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs
A B C X

0 0 0 0

0 0 1 0

0 1 0 1

0 1 1 1

1 0 0 0

1 0 1 1

1 1 0 0

1 1 1 0

© UCLES 2018 Page 10 of 13

Page 22 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

10(b) 1 mark per correct gate with correct inputs. 6

Question Answer Marks

11(a) • Holds address of next/current instruction 2


• to be fetched/processed/executed

11(b) • Stores data/instruction that is in use « 2


• from address in MAR

© UCLES 2018 Page 11 of 13

Page 23 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

12 Four from (Max three from each): 4


MP3
• Digital recording of sound
• Produced by recording software / microphone
• Used when distributing sound files
• Compressed file format

MIDI
• Instructions of how to make sound
• Non-audio recording
• File created using digital musical instruments
• Produced by synthesizer
• Used when composing music
• Individual notes/instruments can be changed

Question Answer Marks

13(a) 1 mark for storage, 1 mark for justification 2

• External/Removable HDD // External/Removable SSD // Large capacity USB Flash Drive

• Backups must be stored separately


• Will hold sufficient data
• Faster write abilities (SSD/USB drive only)

© UCLES 2018 Page 12 of 13

Page 24 of 400
2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

13(b) 1 mark for storage, 1 mark for justification 2

• SSD // SD card // Flash memory

• Small physical size


• Lightweight
• Low heat production
• Low power consumption
• It’s quiet
• Fast read/write times

13(c) 1 mark for storage, 1 mark for justification 2

• DVD // Blu-ray // USB Flash Drive // SD card

• Easy to distribute
• Small in size
• Cheap to buy
• Universal storage therefore compatible with many devices

© UCLES 2018 Page 13 of 13

Page 25 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 7 2 5 2 4 7 4 5 5 8 *

COMPUTER SCIENCE 2210/12


Paper 1 Theory October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 11 printed pages and 1 blank page.

DC (KS) 171196
© UCLES 2018 [Turn over

Page 26 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 Computers use a character set to convert text into binary.

One character set that can be used is ASCII.

Each letter in ASCII can also be represented as a denary value.

(a) The word BUS has the denary values:

B U S

66 85 83

Convert the denary values into 8-bit binary.

66

85

83
[3]

(b) Each letter in ASCII can also be represented as a hexadecimal value.

The word KEY has the 8-bit binary values:

K E Y

01001011 01000101 01011001

(i) Convert the three 8-bit binary values into hexadecimal.

01001011 ...............................................

01000101 ...............................................

01011001 ...............................................
[3]

© UCLES 2018 2210/12/O/N/18

Page 27 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

(ii) Give three other uses of hexadecimal notation in computer science.

1 .........................................................................................................................................

2 .........................................................................................................................................

3 .........................................................................................................................................
[3]

(iii) State two benefits of using hexadecimal notation to represent binary values.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

2 A computer uses RAM and ROM to store data.

(a) The table contains three statements about RAM or ROM.

Tick (✓) to show whether each statement describes RAM or ROM.

RAM ROM
Statement
(✓) (✓)

Stores the programs and data that are currently in use

Used to boot up the computer when power is turned on

Contents are retained when power is turned off


[3]

(b) Circle the storage category that includes both RAM and ROM.

Primary Secondary Off-line


[1]

(c) Explain what is meant by off-line storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 2210/12/O/N/18 [Turn over


Page 28 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

3 A greenhouse uses a system to monitor the conditions that plants need to grow.

The inputs to the system are:

Binary
Input Condition
value
1 Window is open
W
0 Window is closed
1 Temperature >=26 °C
T
0 Temperature <26 °C
1 Humidity >=50%
H
0 Humidity <50%

The system will sound an alarm when certain conditions are detected.

Alarm (X) will sound (=1) when:

window is closed and temperature >=26 °C

or

temperature <26 °C and humidity >=50%

Draw a logic circuit to represent the system.

T X

[5]

© UCLES 2018 2210/12/O/N/18

Page 29 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

4 (a) Identify three security issues that can put a computer system at risk.

Security issue 1 ........................................................................................................................

Security issue 2 ........................................................................................................................

Security issue 3 ........................................................................................................................


[3]

(b) Explain how a firewall can help to protect a computer system from security issues.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

5 (a) Karina is taking her Computer Science examination. She has three questions to answer
about output devices.

(i) For the first question she writes the answer:

“It is a high powered laser that cuts materials such as thin metals or wood.”

Identify the output device that Karina is describing.

.......................................................................................................................................[1]

(ii) For the second question she writes the answer:

“The screen is made up of blocks of red, green and blue pixels. The screen uses layers
of different types of liquid.”

Identify the output device that Karina is describing.

.......................................................................................................................................[1]

(iii) For the third question she writes the answer:

“It is responsible for powering and moving a motor in machinery, such as a robot arm in
a factory.”

Identify the output device that Karina is describing.

.......................................................................................................................................[1]

© UCLES 2018 2210/12/O/N/18 [Turn over


Page 30 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

(b) Karina correctly answers another examination question about some more output devices.

Five different terms have been removed from her answer.

Complete the sentences in Karina’s answer, using the list given. Not all terms in the list need
to be used.

• 3D
• digital light projector
• inkjet
• interactive whiteboard
• laser
• rotating
• scanning
• sliding
• speaker
• thermal bubble

An ................................................................................................... allows a user to write on a

surface using a pen, the text and drawings can then be captured and stored for later use.

An ................................................................................................... printer produces a hard

copy of a document using ................................................................................................... and

piezoelectric technology. A ...................................................................................................

printer uses a .............................................................................................. drum, and positive

and negative charges, to produce a hard copy of a document.


[5]

© UCLES 2018 2210/12/O/N/18

Page 31 of 400
Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

6 (a) Many programmers write computer programs in high-level languages. The programs need to
be translated into machine code to be read by the computer.

State two types of translator that can be used.

Translator 1 ...............................................................................................................................

Translator 2 ...............................................................................................................................
[2]

(b) Explain two reasons why a computer programmer may choose to write a program in a high-
level language, rather than a low-level language.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Three examples of computer code are given in the table.

Tick (✓) to show whether each example of computer code is High-level language, Assembly
language or Machine code.

High-level Assembly Machine


Computer code language language code
(✓) (✓) (✓)
10110111
11001100
01011100
FOR X = 1 TO 10
PRINT X
NEXT X
INP X
STA X
LDA Y
[3]

© UCLES 2018 2210/12/O/N/18 [Turn over


Page 32 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

7 Six internet terms and six definitions are listed.

Draw a line to connect each term to a correct definition.

Internet term Definition

A program that allows a user to view


Browser
webpages

Internet Service Provider The main protocol that governs the


(ISP) transmission of data using the Internet

Hyper Text Transfer Protocol The website address that is typed into the
(HTTP) address bar

Uniform Resource Locator An address given to each device on a network.


(URL) It is provided by the network

A unique address given to a device on a


MAC address
network. It is provided by the manufacturer

A company that provides a connection to


IP address
access the Internet

[5]

8 Describe the purpose of an interrupt in a computer system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 2210/12/O/N/18

Page 33 of 400
Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

9 (a) Computers can transmit data using different methods.

Describe the three data transmission methods given.

(i) Serial data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Parallel data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Duplex data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2018 2210/12/O/N/18 [Turn over


Page 34 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

(b) Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.

Identify and describe three methods of error detection that could be used to see if an error
has occurred.

Error detection method 1 ..........................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Error detection method 2 ..........................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Error detection method 3 ..........................................................................................................

Description .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[9]

© UCLES 2018 2210/12/O/N/18

Page 35 of 400
Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

10 A system uses pH sensors and a microprocessor to help monitor pollution in a river.

The pH of the water should be between 6 and 8. The system outputs an alert if the pH of the water
is not in this range.

Explain how the system uses the pH sensors and the microprocessor to help monitor the pollution.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2018 2210/12/O/N/18

Page 36 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 2210/12/O/N/18

Page 37 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge Assessment International Education


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/12


Paper 1 October/November 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 12 printed pages.

© UCLES 2018 [Turn over

Page 38 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2018 Page 2 of 12

Page 39 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2018 Page 3 of 12

Page 40 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

1(a) 1 mark for each correct 8-bit binary number 3

66 0 1 0 0 0 0 1 0

85 0 1 0 1 0 1 0 1

83 0 1 0 1 0 0 1 1

1(b)(i) 1 mark for each correct hexadecimal number 3


4B
45
59

1(b)(ii) Three from: 3


• (HTML) colour codes
• Error messages
• MAC addresses
• IP addresses
• Assembly language
• Memory dump
• Locations in memory

1(b)(iii) Two from: 2


• Easier to read/write/understand (for humans)
• Easier to remember (for humans)
• Short way to represent binary // Uses less screen/display space
• Fewer errors made (in data transcription)
• Easier to debug (for humans)

© UCLES 2018 Page 4 of 12

Page 41 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

2(a) 1 mark for each correct tick (9) 3

Statement RAM ROM


(9) (9)

Stores the programs and data that are currently in use 9

Used to boot up the computer when power is turned on 9

Contents are retained when power is turned off 9

2(b) Primary 1

2(c) Two from: 2


• Non-volatile storage
• Storage that can be disconnected/removed from the computer
• Any suitable example
• Must be (physically) connected to computer to obtain stored data
• Used to store files as a backup

© UCLES 2018 Page 5 of 12

Page 42 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

3 1 mark for each correct logic gate, with correct inputs. 5

© UCLES 2018 Page 6 of 12

Page 43 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

4(a) Three from: 3


• Malware
• Virus // No antivirus
• Denial of service
• Spyware // No antispyware
• Phishing // opening unknown links/emails
• Pharming // opening unknown links/emails (only award once for this alternative)
• Hacking/cracking/unauthorised access // No/weak password // No/weak firewall
• Downloading/Using unknown software
• Not updating software
• Physical issue e.g. computer/door left unlocked

4(b) Four from: 4


• It examines/monitors/filters traffic into and out of a computer
• It allows a user to set criteria/rules for the traffic
• It checks whether the traffic meets the criteria/rules
• It blocks any traffic that does not meet the criteria/rules // Blocks unauthorised access
• It warns a user of any unauthorised software/access/unauthorised outgoing traffic
• It keeps a log of all traffic (that can be examined)

Question Answer Marks

5(a)(i) 2D/3D cutter 1

5(a)(ii) Liquid crystal display // LCD 1

5(a)(iii) Actuator 1

5(b) 1 mark for each correct missing word, in the given order: 5
• interactive whiteboard
• inkjet
• thermal bubble
• laser
• rotating
© UCLES 2018 Page 7 of 12

Page 44 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

6(a) • Compiler 2
• Interpreter

6(b) Four from: 4


• Closer to human language/English «
• « so it is easier/quicker to read/write/understand
• « so it is easier/quicker to debug the program
• « therefore, less likely to make errors

• The program can be used on many different platforms «


• « because it is written in source code
• « because it is compiled into object code

• They have built-in functions/libraries «


• « this saves time when writing the program

• Do not need to manipulate memory addresses directly «


• « therefore, specialist knowledge of this is not required

• Only need to learn a single language «


• « as this can be used on many different computers

© UCLES 2018 Page 8 of 12

Page 45 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

6(c) 1 mark for each correct tick (9) 3


High-level Assembly Machine
Computer code language language code
(9) (9) (9)

10110111
11001100 9
01011100

FOR X = 1 TO 10
PRINT X 9
NEXT X

INP X
STA X 9
LDA Y

© UCLES 2018 Page 9 of 12

Page 46 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

7 1 mark for each correct line (to a maximum of 5) 5


A program that allows a user to view
Browser
webpages

Internet Service Provider The main protocol that governs the


(ISP) transmission of data using the Internet

Hypertext Transfer Protocol The website address that is typed into


(HTTP) the address bar

Uniform Resource Locator An address given to each device on a


(URL) network. It is provided by the network

A unique address given to a device on


MAC address a network. It is provided by the
manufacturer

A company that provides a connection


IP address
to access the Internet

© UCLES 2018 Page 10 of 12

Page 47 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

8 Four from: 4
• Used to attend to certain tasks/issues
• Used to make sure that vital tasks are dealt with immediately
• The interrupt/signal tells the CPU/processor (that its attention is required)
• A signal that can be sent from a device (attached to the computer)
• A signal that can be sent from software (installed on the computer)
• The interrupt will cause the OS/current process to pause
• The OS/CPU/ISR will service/handle the interrupt
• They have different levels of priority
• After the interrupt is serviced, the (previous) process is continued
• It enables multi-tasking to be carried out on a computer
• A valid example of an interrupt e.g. ‘out of paper’ message for a printer

Question Answer Marks

9(a)(i) Two from: 2


• Data is transmitted one bit at a time
• Data is transmitted using a single wire
• Bits arrive in order/sequence

9(a)(ii) Two from: 2


• Data is transmitted multiple bits at a time/simultaneously
• Data is transmitted using multiple wires
• Bits may arrive out of sequence/skewed (and are reordered)

9(a)(iii) 1 mark for each: 2


• Data is transmitted in both directions
• « at the same time/simultaneously

© UCLES 2018 Page 11 of 12

Page 48 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

9(b) Maximum of three marks per error detection method. 9


1 mark for naming the method, 2 marks for describing it.
Parity (check)
• Odd or even parity can be used
• Bits are added together // 1 bits are counted
• Parity bit added (depending on parity set)
• Parity checked on receipt
• If parity bit is incorrect an error is detected

Checksum
• Calculation performed on data (to get the checksum)
• Checksum sent with data
• Checksum recalculated after transmission
• Comparison made between checksum before and checksum after transmission
• Error detected if checksums are different

Automatic repeat request (ARQ)


• Uses acknowledgement and timeout
• Request is sent (with data) requiring acknowledgement
• If no response/acknowledgment within certain time frame data package is resent
• When data received contains an error a request is sent (automatically) to resend the data
• The resend request is repeatedly sent until packet is received error free/limit is reached/acknowledgement received

Question Answer Marks

10 Five from: 5
• The sensor sends data to the microprocessor
• The analogue data is converted to digital (using ADC)
• The microprocessor compares the reading to the set range/stored values/stored data (6 to 8) «
– « If the reading is >8 or <6 / outside range «
o « the microprocessor sends a signal to output the alert
• The process is continuous/repeated

© UCLES 2018 Page 12 of 12

Page 49 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 6 5 9 3 9 4 9 7 3 1 *

COMPUTER SCIENCE 2210/12


Paper 1 Theory May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 11 printed pages and 1 blank page.

DC (JM) 162278
© UCLES 2018 [Turn over

Page 50 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 Different units of data can be used to represent the size of a file, as it changes in size.

Fill in the missing units of data, using the list given:

• byte
• gigabyte (GB)
• megabyte (MB)
• nibble

The units of data increase in size from smallest to largest.

Smallest bit

………………………………………………..

………………………………………………..

kilobyte (kB)

………………………………………………..

………………………………………………..

Largest terabyte (TB)


[4]

2 (a) Nancy has captured images of her holiday with her camera. The captured images are stored
as digital photo files on her camera.

Explain how the captured images are converted to digital photo files.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2018 2210/12/M/J/18

Page 51 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

(b) Nancy wants to email the photos to Nadia.

Many of the photos are very large files, so Nancy needs to reduce their file size as much as
possible.

Identify which type of compression would be most suitable for Nancy to use. Explain your
choice.

Compression type .....................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

3 A stopwatch uses six digits to display hours, minutes and seconds.

The stopwatch is stopped at:

0 2 3 1 5 8
Hours Minutes Seconds

An 8-bit register is used to store each pair of digits.

(a) Write the 8-bit binary numbers that are currently stored for the Hours, Minutes and Seconds.

Hours

Minutes

Seconds

[3]

© UCLES 2018 2210/12/M/J/18 [Turn over


Page 52 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

(b) The stopwatch is started again and then stopped.

When the watch is stopped, the 8-bit binary registers show:

Hours 0 0 0 0 0 1 0 1

Minutes 0 0 0 1 1 0 1 0

Seconds 0 0 1 1 0 1 1 1

Write the denary values that will now be shown on the stopwatch.

Hours Minutes Seconds


[3]

4 Jafar is using the Internet when he gets the message:

“D03, page is not available”

Jafar remembers that hexadecimal is often used to represent binary values in error codes.

Convert the hexadecimal number in the error message into 12-bit binary.

[3]

© UCLES 2018 2210/12/M/J/18

Page 53 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

5 The three binary numbers in the registers X, Y and Z have been transmitted from one computer to
another.

Parity bit

Register X 1 0 0 1 0 0 1 0

Register Y 1 1 1 0 0 1 1 1

Register Z 1 1 1 0 1 0 0 1

Only one binary number has been transmitted correctly. This is identified through the use of a
parity bit.

Identify which register contains the binary number that has been transmitted correctly. Explain
the reason for your choice.

The binary number that has been transmitted correctly is in Register ............................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2018 2210/12/M/J/18 [Turn over


Page 54 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

6 Kelvin correctly answers an examination question about the Von Neumann model.

Eight different terms have been removed from his answer.

Complete the sentences in Kelvin’s answer, using the list given.

Not all items in the list need to be used.

• accumulator (ACC)
• address bus
• arithmetic logic unit (ALU)
• control unit (CU)
• data bus
• executed
• fetches
• immediate access store (IAS)
• memory address register (MAR)
• memory data register (MDR)
• program counter (PC)
• saved
• transmits

The central processing unit (CPU) ....................................................................................

the data and instructions needed and stores them in the

.................................................................................... to wait to be processed.

The .................................................................................... holds the address of the next

instruction. This address is sent to the .................................................................................... .

The data from this address is sent to the .................................................................................... .

The instruction can then be decoded and .................................................................................... .

Any calculations that are carried out on the data are done by the

.................................................................................... . During calculations, the data is temporarily

held in a register called the .................................................................................... .


[8]

© UCLES 2018 2210/12/M/J/18

Page 55 of 400
Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

7 Consider the logic statement:

X = 1 if ((A is 1 AND B is NOT 1) NAND C is 1) XOR ((A is 1 AND C is 1) OR B is 1)

(a) Draw a logic circuit to represent the given logic statement.

B X

[6]

(b) Complete the truth table for the given logic statement.

A B C Working space X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

© UCLES 2018 2210/12/M/J/18 [Turn over


Page 56 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

8 Dimitri is writing a computer program in a high-level language.

He needs to send just the machine code for the program to his friend, electronically.

It is important that the program is executed as quickly as possible.

Identify which translator will be most suitable for Dimitri to use. Explain your choice.

Type of translator .............................................................................................................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

9 An advertisement in a magazine displays this barcode:

(a) Identify this type of barcode.

.............................................................................................................................................. [1]

(b) Explain how the data stored in this barcode is read.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]
© UCLES 2018 2210/12/M/J/18

Page 57 of 400
Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

10 Alexandra has a new mobile device.

It has a touch screen that uses capacitive technology.

(a) Describe how a capacitive touch screen registers Alexandra’s touch.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(b) Alexandra is wearing gloves because it is cold.

She presses an icon on her touch screen but her action is not registered.

(i) Explain why the touch screen will not register her touch.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Alexandra does not want to remove her gloves.

Explain how Alexandra could use her mobile device whilst still wearing gloves.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2018 2210/12/M/J/18 [Turn over


Page 58 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

11 A factory uses a security system to control a security light. The system uses a sensor and a
microprocessor.

Explain how the security system makes use of the sensor and the microprocessor to control the
security light.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 2210/12/M/J/18

Page 59 of 400
Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

12 (a) Selma has some important personal information that she needs to email to her employer.

She wants to make sure that if the personal information is intercepted, it cannot be understood.

(i) State how Selma could email her personal data more securely.

...................................................................................................................................... [1]

(ii) Describe how your chosen solution works.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [5]

(b) Selma wants to make sure that the information received is correct.

A parity check can be used to detect errors.

Describe another error detection method that can be used to check the information received
is correct.

Error detection method .............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2018 2210/12/M/J/18

Page 60 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 2210/12/M/J/18

Page 61 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge Assessment International Education


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/12


Paper 1 May/June 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 10 printed pages.

© UCLES 2018 [Turn over

Page 62 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2018 Page 2 of 10

Page 63 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2018 Page 3 of 10

Page 64 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

1 1 mark for each unit, in the given order: 4

– nibble
– byte

– megabyte (MB)
– gigabyte (GB)

Question Answer Marks

2(a) Any four from: 4


– Image is converted from analogue to digital (using ADC)
– Image is turned into pixels
– Each pixel is given a binary value
– Pixels form a grid (to create the image)
– Each pixel has a colour
– Pixels are stored in sequence (in a file)
– Meta data is stored (to describe the dimensions/resolution of the image) // It stores the dimensions/colour
depth .etc.
– An example of a suitable photo file format e.g. JPEG

2(b) 1 mark for correct compression, 3 marks for explanation: 4

– Lossy

Any three from:


– Lossy would reduce the file size more (than lossless)
– The redundant data can be removed from the files // by example (must be about redundant data)
– Images can still be a similar quality
– There is no requirement for the files to be exactly the same as original file
– Photos can be sent quicker // faster to upload // faster to download

© UCLES 2018 Page 4 of 10

Page 65 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

3(a) 1 mark for each correct register 3

Hours 0 0 0 0 0 0 1 0

Minutes 0 0 0 1 1 1 1 1

Seconds 0 0 1 1 1 0 1 0

3(b) 1 mark for each correct section: 3

0 5 2 6 5 5
Hours Minutes Seconds

Question Answer Marks

4 1 mark for each correct section: 3

1 1 0 1 0 0 0 0 0 0 1 1

1 mark 1 mark 1 mark

© UCLES 2018 Page 5 of 10

Page 66 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

5 1 mark for correct register, 3 marks for reason: 4

– Register Y

Any three from:


– Count the number of 1/0 bits (in each byte/register)
– Two bytes/registers have an odd number of 1/0 bits // Two have odd parity
– Even parity must be the parity used
– One byte/register has an even number of 1/0 bits // One uses even parity
– The two with an odd number of one bits/odd parity are incorrect // Register X and Z should have even parity

Question Answer Marks

6 1 mark for each correct missing word, in the given order: 8

– fetches
– immediate access store // IAS
– program counter // PC
– memory address register // MAR
– memory data register // MDR
– executed
– arithmetic logic unit // ALU
– accumulator // ACC

© UCLES 2018 Page 6 of 10

Page 67 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

7(a) 1 mark for each correct logic gate with correct direct of input(s): 6

7(b) 4 marks for 8 correct outputs 4


3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs

A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 0
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 0
1 1 1 0

© UCLES 2018 Page 7 of 10

Page 68 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

8 1 mark for correct translator, 3 marks for explanation: 4

– Compiler

Any three from:


– Does not require recompilation // compiled program can be executed without a compiler «
– ... therefore, allows faster execution
– Provides an executable file «
– « therefore, allows him to just send machine code
– Dimitri’s friend does not need translation/compilation software to execute the program

Question Answer Marks

9(a) QR/Quick response 1

9(b) Any four from: 4


– Read/scanned using app (on mobile device)
– It is the camera that is used to scan/capture the image
– The three large squares are used to define the alignment // uses alignment targets/modules
– Black squares reflect less light // white squares reflect more light
– The app/device processes the image
– Each small square/pixel is converted to a binary value

Question Answer Marks

10(a) Any four from: 4


– Conductive layer
– An electrostatic/electric field is created
– Sensor(s) (around the screen) monitor the electrostatic field
– When touched (electrostatic) charge is transferred to finger
– Location of touch is calculated // Co-ordinates used to calculate touch

© UCLES 2018 Page 8 of 10

Page 69 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

10(b)(i) Any two from: 2


– Gloves are not conductive // Gloves are an insulator
– Block current/charge from finger / body / person
– Stop the electrostatic field being disturbed/changed

10(b)(ii) Any two from e.g. (1 mark for method, 1 for expansion): 2
– She could use a (conductive) stylus«
– « this will allow the charge to be charged/disturbed

– She could use capacitive gloves«


– « this will allow the charge to be charged/disturbed

– She could use a natural language interface/voice operated interface «


– « she could give vocal commands to the device

Question Answer Marks

11 Any six from: 6


– Suitable sensor (motion/infra-red)
– Data converted (from analogue) to digital (using ADC)
– Data sent to microprocessor
– Data is compared to stored value/range «
– « if data matches/out of range data security light turned on «
– « waits for suitable period/until no motion detected «
– « light turned off
– Continuous loop/process

Question Answer Marks

12(a)(i) Encryption 1

© UCLES 2018 Page 9 of 10

Page 70 of 400
2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

12(a)(ii) Any five from: 5


– Her personal details before encryption is the plain text
– The plain text/her personal details is encrypted using an encryption algorithm
– The plain text/her personal details is encrypted using a key
– The encrypted text is cypher/cipher text
– The key is transmitted separately (from the text)
– The key is used to decrypt the cypher text (after transmission)

12(b) Any three from a single error method: 3


– Checksum
– Calculation carried out on data
– (checksum/calculated) value sent with data
– recalculated after transmission and compared to original
– If they do not match an error is present

– ARQ
– uses acknowledgment and timeout
– A request is sent with data to acknowledge all data is received
– Acknowledgement sent back to say all data is received
– If no acknowledgement is received in a time frame an error in transmission detected / data automatically resent.

© UCLES 2018 Page 10 of 10

Page 71 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 6 0 0 8 0 2 0 0 2 9 *

COMPUTER SCIENCE 2210/11


Paper 1 Theory May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 11 printed pages and 1 blank page.

DC (JM) 162279/1
© UCLES 2018 [Turn over

Page 72 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 Jane answers an examination question about computers and data correctly.


Six different words or numbers have been removed from her answer.

Complete the sentences in Jane’s answer, using the list given. Not all items in the list need to be
used.

• 2
• 10
• 16
• analogue
• binary
• denary
• digital
• hexadecimal

As humans, we process …………………………………… data, but a computer cannot

process this type of data. For a computer to be able to process data it needs to be

converted to …………………………………… data.

As humans, we mostly use a …………………………………… number system;

this is a base …………………………………… number system.

Computers use a …………………………………… number system;

this is a base …………………………………… number system.


[6]

2 Dheeraj identifies three hexadecimal numbers.

Write the denary number for each of the three hexadecimal numbers:

2A ....................................................................................................

101 ...................................................................................................

21E ..................................................................................................

[3]

Working Space

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2018 2210/11/M/J/18

Page 73 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

3 The three binary numbers in the registers A, B and C have been transmitted from one computer to
another.

Parity bit
Register A 1 0 0 1 1 0 0 0

Register B 0 1 1 0 0 1 1 1

Register C 1 0 0 1 1 0 0 1

One binary number has been transmitted incorrectly. This is identified through the use of a parity bit.

Identify which register contains the binary number that has been transmitted incorrectly. Explain
the reason for your choice.

The binary number that has been transmitted incorrectly is in Register ..........................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2018 2210/11/M/J/18 [Turn over


Page 74 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 Michele wants to email a file to Elsa. The file is too large so it must be compressed.

(a) Name two types of compression that Michele could use.

Compression type 1 ..................................................................................................................

Compression type 2 ..................................................................................................................


[2]

(b) The file Michele is sending contains the source code for a large computer program.

Identify which type of compression would be most suitable for Michele to use.

Explain your choice.

Compression type ......................................................................................................................

Explanation ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 2210/11/M/J/18

Page 75 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

5 Six components of the Von Neumann model for a computer system and six descriptions are given.

Draw a line to match each component to the most suitable description.

Component Description

Immediate Holds data and instructions when they are


access store loaded from main memory and are waiting
(IAS) to be processed.

Holds data temporarily that is currently


Register
being used in a calculation.

Control unit Holds data or instructions temporarily


(CU) when they are being processed.

Accumulator Manages the flow of data and interaction


(ACC) between the components of the processor.

Arithmetic logic
Carries out the calculations on data.
unit (ALU)

Pathway for transmitting data and


Bus
instructions.
[5]

© UCLES 2018 2210/11/M/J/18 [Turn over


Page 76 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

6 Consider the logic statement:

X = 1 if ((A is NOT 1 OR B is 1) NOR C is 1) NAND ((A is 1 AND C is 1) NOR B is 1)

(a) Draw a logic circuit to represent the given logic statement.

B X

[6]

(b) Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2018 2210/11/M/J/18

Page 77 of 400
Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

7 Translators, such as a compiler and an interpreter, are used when writing and running computer
programs.

Describe how a compiler and an interpreter translates a computer program.

Compiler ...........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Interpreter .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2018 2210/11/M/J/18 [Turn over


Page 78 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

8 A supermarket uses a barcode scanner to read the barcodes on its products.

(a) Describe how the barcode scanner reads the barcode.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(b) Explain how the barcode system could help the supermarket manage its stock.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) An infrared touch screen is used to view and navigate the supermarket stock system.

Explain how the infrared touch screen detects a user’s touch.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]
© UCLES 2018 2210/11/M/J/18

Page 79 of 400
Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

(d) The supermarket uses secondary storage and off-line storage to store data about its stock.

Explain what is meant by secondary storage and off-line storage.

Secondary storage ...................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Off-line storage .........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

9 A business wants to use a biometric security system to control entry to the office.

The system will use a biometric device and a microprocessor.

Explain how the biometric security system will make use of the biometric device and the
microprocessor to control entry to the office.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2018 2210/11/M/J/18 [Turn over


Page 80 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

10 RockICT is a music business that has a website to allow customers to view and buy the products
it sells.

The website consists of web pages.

(a) Describe what is meant by HTML structure and presentation for a web page.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The URL for the music company’s website is:

https://www.rockict.net/index.htm
Part 1 Part 2

(i) Identify what Part 1 and Part 2 represent in this URL.

Part 1 ................................................................................................................................

Part 2 ................................................................................................................................
[2]

(ii) Describe what is meant by https.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2018 2210/11/M/J/18

Page 81 of 400
Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

(c) When a customer enters the website, a message is displayed:

“RockICT makes use of cookies. By continuing to browse you are agreeing to our use of
cookies.”

Explain why the music company uses cookies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(d) The music company is concerned about the security of its website.

The company uses a proxy server as part of its security system.

Describe the role of a proxy server in the security system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 2210/11/M/J/18

Page 82 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 2210/11/M/J/18

Page 83 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge Assessment International Education


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/11


Paper 1 May/June 2018
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 12 printed pages.

© UCLES 2018 [Turn over

Page 84 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers. They should be applied alongside the
specific content of the mark scheme or generic level descriptors for a question. Each question paper and mark scheme will also comply with these
marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit is given for valid answers which go beyond the
scope of the syllabus and mark scheme, referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these features are specifically assessed by the
question as indicated by the mark scheme. The meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed instructions or in the application of generic level
descriptors.

© UCLES 2018 Page 2 of 12

Page 85 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question (however; the use of the full mark range may
be limited according to the quality of the candidate responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should not be awarded with grade thresholds or
grade descriptors in mind.

© UCLES 2018 Page 3 of 12

Page 86 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

1 1 mark for each correct answer, in the given order: 6

− analogue
− digital
− denary
− 10
− binary
− 2

Question Answer Marks

2 1 mark for each correct conversion: 3

− 42
− 257
− 542

Question Answer Marks

3 1 mark for correct register, 3 marks for reason: 4

− Register C

Any three from:


− Count the number of 1/0 bits (in each byte/register)
− Two bytes/registers have an odd number of 1/0 bits // Two use odd parity
− Odd parity must be the parity used
− One byte/register has an even number of 1/0 bits // One uses even parity
− One with an even number of one bits/even parity is incorrect // Register C should have odd parity

© UCLES 2018 Page 4 of 12

Page 87 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

4(a) 1 mark for each correct answer: 2

Lossy (compression)
Lossless (compression)

4(b) 1 mark for correct compression, 3 marks for description: 4

− Lossless (compression)

Any three from:


− The file can be restored/decompressed to the exact same state it was before compression/ to original
− (It is a computer program so) no data can be lost // Lossy would remove data
− Will not run correctly (with any other compression)
− (Lossless) will give repeating words/sections of word a value// RLE is used // Other valid examples of methods of
lossless compression
− Value is recorded in an index

© UCLES 2018 Page 5 of 12

Page 88 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

5 1 mark for each correct line, up to a maximum of 5 marks: 5

Component Description
Holds data and instructions when they are
Immediate access
loaded from main memory and are waiting
store (IAS)
to be processed.

Register Holds data temporarily that is currently


being used in a calculation.

Control unit Holds data or instructions temporarily when


(CU) they are being processed.

Accumulator Manages the flow of data and interaction


(ACC) between the components of the processor.

Arithmetic logic
Carries out the calculations on data.
unit (ALU)

Pathway for transmitting data and


Bus
instructions.

© UCLES 2018 Page 6 of 12

Page 89 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

6(a) 1 mark for each correct logic gate (with the correct direction of input(s)) 6

© UCLES 2018 Page 7 of 12

Page 90 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

6(b) 4 marks for 8 correct outputs 4


3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs

A B C Working space X
0 0 0 1
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1

© UCLES 2018 Page 8 of 12

Page 91 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

7 Compiler 6
Any three from:
− Translates high-level language into machine code/low level language
− Translates (the source code) all in one go/all at once
− Produces an executable file
− Produces an error report

Interpreter
Any three from:
– Translates high-level language into machine code/low level language
− Translates (the source code) line by line/statement by statement
– Stops if it finds an error
– Will only continue when error is fixed

Question Answer Marks

8(a) Any four from: 4


− Shines light / (red) laser at barcode
− Light is called an illuminator
− Light is reflected back // White lines reflect light // Black lines reflect less light/absorbs light
− Sensors / photoelectric cells detect the light
− Different reflections / bars will give different binary values / digital values // pattern converted to digital values
− A microprocessor interprets the data

8(b) Any three from: 3


− barcode identifies a (unique) product
− barcode can be used to look up product (in a database)
− data about stock levels can be stored on a system
− stock can be automatically deducted from the system
− can check stock is below a certain level // check stock level
− automatic re-order // Alerts when stock is low
− automatically update new stock level
− to locate if an item of stock is available in another location

© UCLES 2018 Page 9 of 12

Page 92 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

8(c) Any four from: 4


− (Infrared) rays are sent across screen (from the edges)
− Has sensors around edge // Sensors capture beams
− (Infrared) rays form a grid across the screen
− (Infrared) ray is broken (by a finger blocking a beam)
− Calculation is made (on where beam is broken) to locate the ‘touch’ // Co-ordinates are used to locate the touch

8(d) Secondary Storage – any two from: 4


− Not directly accessed by the CPU
− Non-volatile storage
− Secondary is internal to the computer/device
− An example of secondary storage would be HDD/SSD

Off-line storage – any two from:


− Non-volatile storage
− Off-line storage is storage that is removable from a computer/device // not internal // portable
− An example of off-line storage would be CD/DVD/USB stick/SD card/magnetic tape/ external HDD/SSD

Question Answer Marks

9 Any six from: 6


− Suitable biometric device, such as fingerprint scanner/retina/eye/iris scanner/face recognition/voice
recognition/palm scanner // description of use e.g. use fingerprint on device
− Sensor (in biometric device) captures/takes data/readings (of user)
− Data/readings are converted from analogue to digital (using ADC)
− Data/reading sent to the microprocessor
− Data/readings compared to stored values/data «
− « if data/readings match user can enter
− « if data/readings do not match user is declined entry // user asked to try again «
− « alert may be sent to security // alarm may sound

© UCLES 2018 Page 10 of 12

Page 93 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

10(a) Any four from: 4


− Structure and presentation are defined using (mark-up) tags
− Structure and presentation dictate the appearance of the website
− Structure is used for layout
− Example of structure
− Presentation is used for formatting / style
− Example of formatting
− Separate file / CSS can be used for presentation content

10(b)(i) 1 mark for each correct part 2

− domain (name)
− file name/webpage name

10(b)(ii) Any two from: 2


− Hypertext Transfer Protocol Secure // it is the access protocol // It is a protocol
− It means the website uses SSL/TLS
− It means data sent (to and from the webserver) is encrypted

10(c) Any two from e.g. : 2


− To store items that a customer has added to an online shopping basket
− To store a customer’s credit card details
− To store log-in details
− To track what product a customer browses // Track music preferences
− Targeted advertising // making recommendations
− Personalises/customises the experience
− Shows who are new and returning customers
− To speed up log-in times
− To speed up/allow single click purchases
− Improves the experience

© UCLES 2018 Page 11 of 12

Page 94 of 400
2210/11 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
May/June 2018
PUBLISHED www.cs2210.blogspot.com
Question Answer Marks

10(d) Any four from: 4


− Prevents direct access to the webserver // Sits between user and webserver
− If an attack is launched it hits the proxy server instead // can be used to help prevent DDOS // help prevent
hacking of webserver
− Used to direct invalid traffic away from the webserver
− Traffic is examined by the proxy server // Filters traffic
− If traffic is valid the data from the webserver will be obtained by the user
− If traffic is invalid the request to obtain data is declined
− Can block requests from certain IP addresses

© UCLES 2018 Page 12 of 12

Page 95 of 400
Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 5 0 3 4 9 2 8 0 0 5 *

COMPUTER SCIENCE 2210/13


Paper 1 Theory October/November 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 11 printed pages and 1 blank page.

DC (CE/SW) 152856
© UCLES 2017 [Turn over

Page 96 of 400
Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 A washing machine has a small display screen built into it.

One use of the display screen is to show an error code when a problem has occurred with a
washing cycle.

(a) State whether the display screen is an input, output or storage device.

...............................................................................................................................................[1]

(b) The display screen shows a hexadecimal error code:

E04
This error code means that the water will not empty out of the washing machine.

Convert this error code to binary.

[3]

(c) State why hexadecimal is used to display the error code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(d) Identify three sensors that could be used in the washing machine.

State what each sensor could be used for.

Sensor 1 ...................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

Sensor 2 ...................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

Sensor 3 ...................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................
[6]
© UCLES 2017 2210/13/O/N/17

Page 97 of 400
Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

2 Data files are stored in different file formats.

Complete the table by providing a suitable file format for each file type. The first one has been
done for you.

File type File format


Pictures .JPEG
Text
Sound
Video
[3]

3 (a) An example of a Uniform Resource Locator (URL) is:

http://www.cie.org.uk/index.htm
Part 1 Part 2 Part 3

Identify the three parts that make up this URL.

Part 1 ........................................................................................................................................

Part 2 ........................................................................................................................................

Part 3 ........................................................................................................................................
[3]

(b) Describe what is meant by an Internet Protocol (IP) address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 2210/13/O/N/17 [Turn over


Page 98 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 Six components of a computer system and six descriptions are shown.

Draw a line to match each component with the most suitable description.

Component Description

Used to connect together


Arithmetic Logic
the internal components
Unit (ALU)
of the CPU.

Used to carry out


Buses
calculations on data.

Used to temporarily hold


Control Unit
data and instructions
(CU)
during processing.

Immediate Access Used to allow interaction


Store (IAS) with the computer.

Used to hold data and


Input/Output instructions before they
are processed.

Used to manage the flow


Registers
of data through the CPU.

[5]

© UCLES 2017 2210/13/O/N/17

Page 99 of 400
Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

5 (a) Draw a logic circuit for the logic statement:

X = 1 if ((A is 1 AND B is 1) OR (A is NOT 1 AND C is 1))

B X

[4]

© UCLES 2017 2210/13/O/N/17 [Turn over


Page 100 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

(b) Draw the symbol for an XOR gate and explain the function of this logic gate.

Explanation ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

6 Describe the operation of a 2D scanner and a 3D scanner.

2D .....................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3D .....................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2017 2210/13/O/N/17

Page 101 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

7 Six statements about firewalls are shown.

Tick (3) to show whether each statement is true or false.

Statement true false


(3) (3)
Firewalls can monitor incoming and
outgoing traffic.

Firewalls operate by checking traffic against


a set of rules.

Firewalls cannot block access to a certain


website.

Firewalls can be software and hardware.

Firewalls can act as intermediary servers.

Firewalls can block unauthorised traffic.

[6]

© UCLES 2017 2210/13/O/N/17 [Turn over


Page 102 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

8 (a) Data is valuable. It needs to be kept secure and it can easily be damaged.

Give three different ways that data can be accidentally damaged.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

(b) The Secure Socket Layer (SSL) protocol can be used to securely transmit data in online
banking.

State three other different applications that use SSL.

Application 1 .............................................................................................................................

Application 2 .............................................................................................................................

Application 3 .............................................................................................................................
[3]

© UCLES 2017 2210/13/O/N/17

Page 103 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

(c) Online banking is increasing in popularity.

Online banking can be a risk as it can raise a number of security issues. SSL can be used as
a security method to make online banking safer.

Identify and describe three other security methods that could be used to make online banking
safer.

Security method 1 .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security method 2 .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security method 3 .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2017 2210/13/O/N/17 [Turn over


Page 104 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

9 (a) Optical storage media can be used to store data.

Describe how the data is read from a Compact Disc (CD).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Kamil wants to store a 16-bit colour image file. The image size is 1000 pixels.

Calculate the size of the file.

Give your answer in bytes. Show your working.

Working .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer ............................... bytes


[2]

(c) Describe the differences between primary and secondary storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 2210/13/O/N/17

Page 105 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

10 Six statements about assembly language are shown.

Tick (3) whether the statement is true or false.

Statement true false


(3) (3)

Assembly language uses mnemonic codes.

Assembly language programs do not need


a translator to be executed.

Assembly language is a low-level


programming language.

Assembly language is specific to the


computer hardware.

Assembly language is machine code.

Assembly language is often used to create


drivers for hardware.
[6]

© UCLES 2017 2210/13/O/N/17

Page 106 of 400


Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 2210/13/O/N/17

Page 107 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge Assessment International Education


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/13


Paper 1 October/November 2017
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 10 printed pages.

© UCLES 2017 [Turn over

Page 108 of 400


2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

1(a) Output 1

1(b) 1 mark for each correct conversion 3

E 0 4

1 1 1 0 0 0 0 0 0 1 0 0

1(c) Any one from: 1


– Hexadecimal codes can fit in a smaller display rather than a full text based message
– Smaller amount of memory needed to store the hex error messages than text based

1(d) 1 mark for correct sensor, 1 mark for corresponding use 6


Possible examples could include:

– Temperature (sensor)
– To monitor the temperature of the water

– Pressure (sensor)
– To monitor the level of water in the washing machine

– Motion (sensor)
– To monitor whether the drum is still in motion

– pH (sensor)
– To monitor the level of water hardness/detergent present in the water

© UCLES 2017 Page 2 of 10

Page 109 of 400


2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

2 1 mark for each correct file format e.g. 3

File type File format


Pictures .JPEG
.doc, .txt, .rtf,
Text
.docx, .odt .pdf
.mp3, .wav, .aif,
Sound
.flac, .mid
Video .mp4, .flv, .wmv

Question Answer Marks

3(a) – Part 1 (access) protocol 3


– Part 2 domain (name)
– Part 3 filename

3(b) Four from: 4


– IP address is used to identify a device (on the Internet / network)
– IP address is allocated by the network/ ISP
– Can be used in place of URL
– IP addresses can be IPv4 or IPv6
– IP address can be static «
– ... meaning it doesn’t change each time it is connected to the Internet
– IP address can be dynamic «.
– « meaning that it can change each time a device is connected to the Internet
– Any valid example (e.g. xxx.xxx.xxx.xxx or xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx)

© UCLES 2017 Page 3 of 10

Page 110 of 400


2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

4 1 mark for each correct line up to a total of 5 marks 5

© UCLES 2017 Page 4 of 10

Page 111 of 400


2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

5(a) 1 mark for each correct logic gate 4

© UCLES 2017 Page 5 of 10

Page 112 of 400


2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

5(b) 1 mark for correct logic gate symbol: 5

Any four from:


– similar to an OR gate
– It has (at least) two inputs
– Output will be high/1 if both inputs are different
– Output will be high/1 if either input is high
– Output will be low/0 if both inputs are high
– Output will be low/0 if both inputs are low

Question Answer Marks

6 Any six from: 6

2D
– (Scanner) shines a light onto the surface of a document // Light moves across document
– Reflected light is captured
– Uses mirrors and lenses
– Captured image is converted into a digital file
– Produces a 2D digital image

3D
– Scanners shines a laser (or light) over the surface of a 3D object
– Records measurements of the geometry/dimensions of the object
– Measurements are converted to digital file
– Produces a 3D digital model

© UCLES 2017 Page 6 of 10

Page 113 of 400


2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

7 1 mark for each correct tick 6

true false
Statement
(9) (9)
Firewalls can monitor incoming and outgoing traffic. 9
Firewalls operate by checking traffic against a set of rules. 9
Firewalls cannot block access to a certain website. 9
Firewalls can be software and hardware. 9
Firewalls can act as intermediary servers. 9
Firewalls can block unauthorised traffic. 9

Question Answer Marks

8(a) Any three from: 3


– Human error (e.g. deleting/overwriting data)
– Physical damage
– Power failure/surge
– Hardware failure
– Software crashing

8(b) Any three from: 3


– Online shopping // Online payment systems // Online booking
– Email
– Cloud based storage
– Intranet/extranet
– VPN
– VoIP // video conferencing
– Instant messaging (IM) // social networking // online gaming

© UCLES 2017 Page 7 of 10

Page 114 of 400


2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

8(c) 1 mark for identifying, 1 mark for description 6

– Strong password
– To make it difficult to hack an account

– Biometric device
– To use data that is difficult to fake as a password

– TLS // Encryption
– To make data meaningless if intercepted
– To encrypt data that is exchanged (TLS only)
– More secure than SSL (TLS only)

– Anti-spyware (software)
– To find and remove any spyware that is installed on a computer
– To help stop key loggers recording key presses

– Firewall
– To help prevent unauthorised access to an account
– Blocks any requests that do not meet/match the criteria

– Authentication (card reader at home)/mobile security code app/two-step verification


– To add another level of identification of the user

– Use of drop-down boxes (or equivalent)


– So key loggers cannot record the key presses

– Proxy server
– To divert an attack away from the main system

© UCLES 2017 Page 8 of 10

Page 115 of 400


2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

9(a) Any four from: 4


– (Red) laser is used
– (Laser beams) shines onto surface of the disk
– It is rotated (at a constant speed) to be read
– Surface is covered in a track (that spirals from the centre)
– Data is represented on the surface using pits and lands
– Pits and lands represent binary values
– Pits reflect light back differently (to the area in between/land)
– Optical device can determine the binary value from the light reflection

9(b) 1 mark for calculation, 1 mark for correct answer: 2

– 1000 × 16
– 16000/8

– Answer is 2000 bytes

9(c) Four from: (Max 2 for either primary or secondary) 4

– Primary RAM and ROM


– Secondary HDD and SSD

– Primary is directly accessible by CPU


– Secondary is not directly accessible by CPU

– Primary is internal to computer


– Secondary can be internal or external to the computer

– Primary stores boot up instructions and can hold data whilst being processed
– Secondary stores files/software

– Primary has faster access speed


– Secondary has a slower access speed

– Primary has both volatile and non-volatile


– Secondary is non-volatile

© UCLES 2017 Page 9 of 10

Page 116 of 400


2210/13 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

10 1 mark for each correct tick 6

true false
Statement
(9) (9)
Assembly language uses mnemonic codes. 9
Assembly language programs do not need a translator to be executed. 9
Assembly language is a low-level programming language. 9
Assembly language is specific to the computer hardware. 9
Assembly language is machine code. 9
Assembly language is often used to create drivers for hardware. 9

© UCLES 2017 Page 10 of 10

Page 117 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 1 2 0 2 9 2 7 4 5 6 *

COMPUTER SCIENCE 2210/12


Paper 1 Theory October/November 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

DC (SC) 152928
© UCLES 2017 [Turn over

Page 118 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 A robot arm in a factory is programmed to move products.

The binary instructions to operate the robot arm are:

Operation Binary Instruction

UP 1 1 1 1

DOWN 0 0 0 1

LEFT 1 0 0 1

RIGHT 0 1 1 0

OPEN 1 1 0 0

CLOSE 0 0 1 1

The instructions are entered as hexadecimal values.

An operator enters the values:

9 1 C 3 F

Convert the values and write down the operation (e.g. RIGHT) carried out by the robot arm.

9 .............................................................................

1 .............................................................................

C .............................................................................

3 .............................................................................

F .............................................................................
[5]

© UCLES 2017 2210/12/O/N/17

Page 119 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

2 Storage devices and storage media can be categorised as primary, secondary or off-line.

Write primary, secondary or off-line next to each storage device or medium to indicate its most
suitable category.

HDD ....................................................................................................................................

RAM ....................................................................................................................................

ROM ....................................................................................................................................

CD-ROM ....................................................................................................................................

SSD ....................................................................................................................................

DVD-RAM ....................................................................................................................................
[6]

3 (a) Explain the differences between the binary number system and the denary number system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Explain the process of converting the binary number 1010 into a denary number.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]
© UCLES 2017 2210/12/O/N/17 [Turn over
Page 120 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 A file server is used as a central data store for a network of computers.

Rory sends data from his computer to a file server that is approximately 100 metres away.

It is important that the data is transmitted accurately. Rory needs to be able to read data from and
write data to the file server at the same time.

(a) (i) Use ticks (3) to identify the most suitable data transmission methods for this application.

Method 1 Tick Method 2 Tick


(3) (3)
Serial Simplex
Parallel Half-duplex
Duplex
[2]

(ii) Explain why your answer to part (a)(i) is the most suitable data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

© UCLES 2017 2210/12/O/N/17

Page 121 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

(b) Identify and describe two methods of error checking that can be used to make sure that the
data stored after transmission is accurate.

Method 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Method 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2017 2210/12/O/N/17 [Turn over


Page 122 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

5 Raj is using the Internet to do some online shopping. He visits a website that tells him that it uses
cookies.

(a) Explain what is meant by the term cookies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Give two examples of the use of cookies.

Example 1 .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Example 2 .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2017 2210/12/O/N/17

Page 123 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

6 Selma writes the following four answers in her Computer Science examination.

State which computer terms she is describing.

“It is a signal. When the signal is received it tells the operating system that an event has occurred.”

Selma is describing ..........................................................................................................................

“It takes source code written in a high level language and translates it into machine code. It
translates the whole of the source code at once.”

Selma is describing ..........................................................................................................................

“The part of the central processing unit (CPU) that carries out calculations.”

Selma is describing ..........................................................................................................................

“When data is transmitted, if an error is detected in the data received a signal is sent to ask for the
data to be retransmitted. This continues until the data received is correct.”

Selma is describing ..........................................................................................................................


[4]

© UCLES 2017 2210/12/O/N/17 [Turn over


Page 124 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

7 Draw a logic circuit to represent the logic statement:

X = 1 if (A is NOT 1 AND B is 1) AND (A is NOT 1 AND C is NOT 1) OR (B is 1 AND C is 1)

B X

[7]

© UCLES 2017 2210/12/O/N/17

Page 125 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

8 (a) A computer has 2048 MB of RAM.

How many GB of RAM does the computer have?

Show your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

..............................GB [2]

(b) Describe one item that is stored in RAM.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Explain three ways that RAM is different to ROM.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2017 2210/12/O/N/17 [Turn over


Page 126 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

9 Anna has a farm that grows fruit.

She has a system that monitors the conditions for growing the fruit.

Sensors are used in this system.

(a) Explain what is meant by the term sensor.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) State two sensors that could be used in this system and describe how they could be used.

Sensor 1 ...................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Sensor 2 ...................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2017 2210/12/O/N/17

Page 127 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

10 (a) Describe what is meant by Transport Layer Security (TLS).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Name three different applications of TLS.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

© UCLES 2017 2210/12/O/N/17 [Turn over


Page 128 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

11 Complete the paragraphs choosing the correct five terms from the list. Each term can only be
used once:

• Ethics
• Freeware
• Free Software
• Hacking
• Malware
• Plagiarism
• Shareware
• Virus

Taking another person’s work from the Internet and claiming it as your own is called

............................................. . It is possible to protect your work online with copyright.

One product that people may want to protect is software. ............................................. does allow

a person to share, copy and change software freely, but ............................................. does not

allow a person to do this legally. Software that has a licence allowing free use for a trial period

is called ............................................ . The name given to this area of Computer Science is

............................................. .
[5]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 2210/12/O/N/17

Page 129 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge Assessment International Education


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/12


Paper 1 October/November 2017
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over

Page 130 of 400


2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

1 1 mark per correct instruction: 5

9 – LEFT
1 – DOWN
C – OPEN
3 – CLOSE
F – UP

Question Answer Marks

2 1 mark for each correct category: 6

HDD – Secondary
RAM – Primary
ROM – Primary
CD-ROM – Off-line
SSD – Secondary
DVD-RAM – Off-line

Question Answer Marks

3(a) Any four from (Max 2 per number system) : 4

• A binary number system is a base-2 system


• A denary number system is a base-10 system

• A binary number system uses 0 and 1 values


• A denary number system uses 0 to 9 values

• A binary number system has units/ placeholders/column headings that increase by the power of 2
• A denary number system has units/ placeholders/column headings that increase by the power of 10

• Binary has more digit for the same value// Denary has less digits for the same value

© UCLES 2017 Page 2 of 9

Page 131 of 400


2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

3(b) Five from: 5


• Correct column headings / place holders by example
• Correctly place a 1 or a 0 for each column
• Identify the columns to be added
• Add together the (denary) values identified «
• « this will give a total which is the denary number/answer
• Answer is 10

Question Answer Marks

4(a)(i) Method 1 Tick (9) Method 2 Tick (9) 2

Serial 9 Simplex
Parallel Half-duplex
Duplex 9

4(a)(ii) Any four from (Max 3 for serial): 4


• Serial has less/lower interference
• Serial is (more) reliable/accurate over distances
• In serial the bits won’t be skewed
• In serial it is easier to collate the bits together again after transmission

• Duplex transmits data in both directions at the same time


• simplex/half-duplex/remaining methods won’t allow read and write at same time

© UCLES 2017 Page 3 of 9

Page 132 of 400


2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

4(b) 1 mark for error checking method, 2 marks for description: 6

Checksum
• A value is calculated from the data // Description of calculation
• Value is transmitted with data
• Value is recalculated after transmission
• If the values match the data is (more likely to be) accurate

Parity check
• A parity bit is transmitted with each byte of data
• Odd or even (parity can be used)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even // counts / checks to see if 1’s are odd
• (Each byte is) checked after transmission to see if it matches the odd/even parity used

Automatic Repeat Request (ARQ)


• Uses acknowledgement and timeout
• When a device detects an error in data transmission it asks for the packet to be resent / no error detected, positive
acknowledgment sent
• The sending device resends the packet after the request to resend/ timeout received
• This process is continuous until the packet received is correct/until the ARQ limit is reached

Echo (check)
• Copy of data is sent back to sender
• Data is compared to see if it matches
• If it does not match error detected

© UCLES 2017 Page 4 of 9

Page 133 of 400


2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

5(a) Any four from: 4


• Data / files
• Stored in a text file
• Downloaded to a user’s computer when a website is visited // webserver sends to web browser
• Stored on a user’s computer
• Stored by a browser
• Detected by the website when it is visited again

5(b) Any two from: e.g. 2


• To store personal information/data
• To store login details
• To save items in an online shopping basket
• To track/save internet surfing habits // to track website traffic
• To carry out targeted advertising
• To store payment details
• To customise a webpage // to store user preferences
• Store progress in online games/quizzes

Question Answer Marks

6 1 mark for each correct term, in this order: 4


• Interrupt
• Compiler
• ALU/Arithmetic and Logic Unit
• ARQ/Automatic repeat request

© UCLES 2017 Page 5 of 9

Page 134 of 400


2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

7 1 mark for each correct logic gate with the correct input(s) 7

© UCLES 2017 Page 6 of 9

Page 135 of 400


2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

8(a) 1 mark for correct calculation method, 1 mark for correct answer: 2

• 2048/1024 (or 1024 × 2)


• 2 GB

8(b) • Instructions/programs/data 2
• « currently in use

8(c) Any three from: 3


• RAM is volatile, ROM is non-volatile
• RAM is temporary, ROM is (semi) permanent
• RAM normally has a larger capacity than ROM
• RAM can be edited ROM cannot be edited // Data can be read from and written to RAM, ROM can only be read from.

© UCLES 2017 Page 7 of 9

Page 136 of 400


2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

9(a) • It is an input device 2


• It measures/takes (physical) readings of the surrounding environment / environment by example / physical properties

9(b) 1 mark for each sensor, 2 marks for each description: 6

Moisture (sensor)
• To measure the water content of the soil
• To alert when the soil is too dry or too wet/needs watering

pH (sensor)
• To measure how acidic/alkaline the soil is
• To alert when there may be something polluting the soil

Light (sensor)
• To measure the brightness of the environment
• To alert when the fruit has too little/too much light

Temperature (sensor)
• To measure the temperature of the environment
• To alert when it is too hot/too cold for the fruit to grow

Gas (sensor)
• To measure the amount of CO2/oxygen present
• To alert when too much CO2/oxygen present

Humidity (sensor)
• To measure the water content in the air
• To alert when the air is too dry

Infra-red / motion (sensor)


• To measure level of infra-red/microwaves deflected
• To alert to any intruders e.g. animals stealing the fruit

© UCLES 2017 Page 8 of 9

Page 137 of 400


2210/12 Cambridge O Level – Mark Scheme Muhammad Qadeer (0333-8136280)
October/November
PUBLISHED www.cs2210.blogspot.com
2017
Question Answer Marks

10(a) Any three from: 3


• It is a (security) protocol
• It encrypts data (sent over the web/network)
• It is the updated version of SSL
• It has two layers
• It has a handshake layer
• It has a record layer

10(b) 1 mark for each correct application, examples could include: 3


• Online banking
• Online shopping // Online payment systems
• Email
• Cloud based storage
• Intranet/extranet
• VPN
• VoIP
• Instant messaging (IM) // social networking

Question Answer Marks

11 1 mark for each correct missing word, in the correct order: 5

• Plagiarism
• Free software
• Freeware
• Shareware
• Ethics

© UCLES 2017 Page 9 of 9

Page 138 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 8 8 1 5 1 8 1 7 9 2 *

COMPUTER SCIENCE 2210/12


Paper 1  Theory May/June 2017
 1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [  ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

DC (RW) 144486/1
© UCLES 2017 [Turn over

Page 139 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 Name three different buses that are used in the fetch-execute cycle.

Bus 1 ������������������������������������������������������������������������������������������������������������������������������������������������

Bus 2 ������������������������������������������������������������������������������������������������������������������������������������������������

Bus 3 ������������������������������������������������������������������������������������������������������������������������������������������������
[3]

2 Give two examples of primary, secondary and off-line storage.

Primary

Example 1 ����������������������������������������������������������������������������������������������������������������������������������������

Example 2 ����������������������������������������������������������������������������������������������������������������������������������������

Secondary

Example 1 ����������������������������������������������������������������������������������������������������������������������������������������

Example 2 ����������������������������������������������������������������������������������������������������������������������������������������

Off-line

Example 1 ����������������������������������������������������������������������������������������������������������������������������������������

Example 2 ����������������������������������������������������������������������������������������������������������������������������������������
[6]

© UCLES 2017 2210/12/M/J/17

Page 140 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

3 The diagram shows five output devices and five descriptions.

Draw a line between each output device and its description.

Output Device Description

Flat panel display that uses the light modulating


Inkjet printer
properties of liquid crystals.

Flat panel display that uses an array of


LCD screen
light‑emitting diodes as pixels.

2D cutter Droplets of ink are propelled onto paper.


Electrically charged powdered ink is transferred


LED screen
onto paper.

Laser printer High powered laser that uses the x-y plane.

[4]

© UCLES 2017 2210/12/M/J/17 [Turn over


Page 141 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 There are various methods used to detect errors that can occur during data transmission and
storage.

Describe each of the following error detection methods.

Parity check �������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

Check digit ���������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

Checksum ����������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

Automatic Repeat request (ARQ) ����������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������
[8]

© UCLES 2017 2210/12/M/J/17

Page 142 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

5 (a) The denary number 57 is to be stored in two different computer registers.

Convert 57 from denary to binary and show your working.

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

�����������������������������������������������������������������������������������������������������������������������������������������������[2]

(b)
Show the binary number from part (a) as it would be stored in the following registers.

Register 1

Register 2
[2]

(c)
A binary number stored in a register can have many different uses, for example an address in
main memory.

Give two other uses for a binary number stored in a register.

Use 1 ����������������������������������������������������������������������������������������������������������������������������������������

Use 2 ����������������������������������������������������������������������������������������������������������������������������������������
[2]

(d)
A register in a computer contains binary digits.

0 0 1 1 1 0 1 0

The contents of the register represent a binary integer.

Convert the binary integer to hexadecimal.

....................................................................................................................................................

................................................................................................................................................[1]

© UCLES 2017 2210/12/M/J/17 [Turn over


Page 143 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

6 Airline boarding passes can be read from a smartphone instead of a printout.

Back Boarding Pass

TSA Pre
Passenger Webb / Alan
Boarding
Group B 15 Boarding
Position
Flight 683
JFK – LAX
Date Thursday, November 10, 2016
Departs 8.15 pm
Gate C4
Time, gate and terminals may change - check monitors

Fly Rewards Conf# BC123D


Fly Rewards# 12345678

Identify what type of barcode A is an example of. Explain how the data stored in this type of
barcode is read.

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

������������������������������������������������������������������������������������������������������������������������������������������������������[4]

© UCLES 2017 2210/12/M/J/17

Page 144 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

7 Computer A is communicating with computer B.

(a)
Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The
direction of the data transmission must be fully labelled.

Simplex data transmission

Computer A Computer B
             

Duplex data transmission

Computer A Computer B
             

Half-duplex data transmission

Computer B Computer A
             
[6]

(b)
State a use for the following data transmission methods. The use must be different for each
data transmission method.

Simplex �������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

Duplex ��������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������
[2]

© UCLES 2017 2210/12/M/J/17 [Turn over


Page 145 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

(c)
A computer includes an Integrated Circuit (IC) and a Universal Serial Bus (USB) for data
transmission.

Describe how the computer uses these for data transmission, including the type of data
transmission used.

IC ����������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

USB ������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������
[4]

© UCLES 2017 2210/12/M/J/17

Page 146 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

8 A company has a number of offices around the world.

(a)
Data is transmitted between the offices over the Internet. In order to keep the data safe the
company is using Secure Socket Layer (SSL) protocol and a firewall at each office.

Explain how SSL protocol and a firewall will keep the company’s data safe.

SSL protocol �����������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

Firewall �������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������
[4]

(b)
A company stores personal details of its customers on a computer system behind a firewall.

Explain, with reasons, what else the company should do to keep this data safe.

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

�����������������������������������������������������������������������������������������������������������������������������������������������[6]

© UCLES 2017 2210/12/M/J/17 [Turn over


Page 147 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

9 A cold store is kept at a constant low temperature using a sensor, a microprocessor and a cooling
unit.

Explain how the sensor and microprocessor will maintain a constant low temperature.

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

������������������������������������������������������������������������������������������������������������������������������������������������������[6]

© UCLES 2017 2210/12/M/J/17

Page 148 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

10 For this logic statement:

X = 1 if (( A is 1 AND B is 1 ) OR ( B is 1 AND C is NOT 1 ))

(a)
Draw the logic circuit.

B X

[4]

(b)
Complete the truth table for the given logic statement.

Working space
A B C X

0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]

© UCLES 2017 2210/12/M/J/17 [Turn over


Page 149 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

11 A company sells smartphones over the Internet.

Explain how the information stored on the company’s website is requested by the customer, sent
to the customer’s computer and displayed on the screen.

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

������������������������������������������������������������������������������������������������������������������������������������������������������[7]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 2210/12/M/J/17

Page 150 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/12


Paper 1 May/June 2017
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over

Page 151 of 400


2210/12 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

1 • address (bus) 3
• control (bus)
• data (bus)

Question Answer Marks

2 2 marks for each type of storage 6

Primary storage
• RAM
• ROM

Secondary storage
• hard disk drive (HDD)
• solid state drive (SSD)

Off-line storage e.g.


• CD
• DVD
• Blu-ray
• Flash memory // USB storage
• removable / external / portable hard disk drive (HDD/SSD)
• SD card

Question Answer Marks

3 4

1 mark for each correct line to a max of 4 marks.

© UCLES 2017 Page 2 of 9

Page 152 of 400


2210/12 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

4 Two marks for each correct description 8

Parity Check
• Checks a byte of data
• Check is performed when data is received
• A parity bit is added (to the parity byte)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• Can be even or odd
• If parity is incorrect, error is detected

Check digit
• A digit that is calculated from the data // uses modulo to calculate digit
// valid description of modulo
• It is appended / added to the data
• Digit is recalculated when data is entered
• Digits are compared to check for error

Checksum
• A value is calculated from the data // Valid description of calculation
• It is transmitted with the data
• Value is recalculated after transmission
• Values are compared after transmission to check for error

Automatic Repeat reQuest


• Uses acknowledgement / request and time-out
• Error control protocol
• Check performed on receiving data // error is detected by e.g. parity
check, check sum
• If error detected, request is sent to resend data // negative
acknowledgement is used
• Resend request is repeated till data is sent correctly / requests time
out / limit is reached
• Send acknowledgement that data is received // positive
acknowledgement is used
• If acknowledgement not received in set time data is resent

© UCLES 2017 Page 3 of 9

Page 153 of 400


2210/12 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

5(a) 1 mark for correct method, 1 mark for correct answer 2

32 + 16 + 8 + 1
(00)111001

5(b) registers must have leading zeros, allow follow through from 5(a) for an 2
incorrect value
1 mark for each correct register.

0 0 1 1 1 0 0 1

0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1

5(c) Two from: 2

• data
• ASCII value / Unicode value / character
• number
• part of image / small image
• a sound / sound sample / small sound track
• instruction

5(d) 3A 1

Question Answer Marks

6 1 mark for correct name of code, up to a further 3 marks for appropriate 4


explanation

• Quick response (QR) Code

Three from:
• Barcode is captured / scanned / imaged, by a camera / scanner /
barcode reader / QR code reader
• Read using a laser
• Processed by an app
• Light is reflected back
• Black squares reflect less light than white squares
• Modules are used for orientation / alignment
• Squares / data are decoded

© UCLES 2017 Page 4 of 9

Page 154 of 400


2210/12 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

7(a) 1 mark for correct arrow(s), one mark for correct description 6

OR

(Direction of data is) one way only // unidirectional

(Direction of data is both ways) at same time / simultaneously / concurrently

AND

(Direction of data is both ways) but at different times / not at the same time /
not simultaneously / not concurrently

© UCLES 2017 Page 5 of 9

Page 155 of 400


2210/12 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

7(b) 1 mark each use, must be different. 2

Simplex e.g.:
Microphone to computer
Sensor to computer
Computer to printer
Computer to speaker
Computer to monitor
Webcam to computer
Sending data to a device // sending data from a device

Duplex e.g.:
Telephone call
Voice over IP
Computer to printer (only award once)
Instant messaging
Broadband connections
Video conferencing
Sending data to and from devices e.g wireless technology
Computer to modem

7(c) 2 marks for IC, 2 marks for USB 4

IC
• parallel transmission // description of parallel
• for sending data internally

USB
• serial transmission // description of serial
• for sending data externally (to and from peripherals / between
devices)

Question Answer Marks

8(a) 2 marks for SSL, 2 marks for Firewall 4

SSL protocol
Two from:
• uses encryption
• encryption is asymmetric / symmetric / both
• makes use of (public and private) keys
• data is meaningless (without decryption key / if intercepted)

Firewall
Two from:
• helps prevent unauthorised access // helps prevent hacking
• checks that data meets criteria // identifies when data does not meet
criteria
• acts as a filter for (incoming and outgoing) data // blocks any
unacceptable data //allows acceptable data through

© UCLES 2017 Page 6 of 9

Page 156 of 400


2210/12 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

8(b) Six from: 6

Encrypt the data «


« so it cannot be understood by those not entitled to view it

Password protected / biometrics «


« to help prevent unauthorised access

Virus checking software «


« helps prevent data corruption or deletion
« identifies / removes a virus in the system
« scans a system for viruses

Spyware checking software «


« helps prevent data being stolen/copied/logged
« scans a system for spyware

Drop-down input methods / selectable features «


« to reduce risk of spyware / keylogging

Physical method e.g. locked doors / CCTV timeout / auto log off
« to help prevent unauthorised access

Network / company policies // training employees


« to educate users how to be vigilant

Access rights «
« allows users access to data that they have permission to view
« prevents users from accessing data that they do not have permission to
view

Question Answer Marks

9 Six from: 6

• temperature sensor
• analogue data / temperature is converted to digital data (with an ADC)
• sensor sends signal to the microprocessor
• microprocessor compares input values with stored values/pre-set
values «
• « if the temperature value input is too high/low «
• « a signal is sent from the microprocessor to turn on / off / up / down
the cooling unit
• « if temperature matches the stored values «
• « no action is taken
• an actuator is used to turn the cooling unit on / off / up / down
• the process is a continuous loop

© UCLES 2017 Page 7 of 9

Page 157 of 400


2210/12 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

10(a) 1 mark for each correct gate, with the correct input(s) 4

10(b) 4
A B C X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 1
1 1 1 1

4 marks for 8 correct outputs


3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs

© UCLES 2017 Page 8 of 9

Page 158 of 400


2210/12 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

11 Seven from: 7

Requested
• a web browser is used
• user enters the URL / web address (into the address bar) // clicks a
link containing the web address // clicks an element of the webpage
• the URL / web address specifies the protocol
• protocols used are Hyper Text Transfer Protocol (HTTP) / Hyper Text
Transfer Protocol Secure (HTTPS)

Sent
• the URL / web address contains the domain name
• the Internet Service Provider (ISP) looks up the IP address of the
company
• the domain name is used to look up the IP address of the company
• the domain name server (DNS) stores an index of domain names and
IP addresses
• web browser sends a request to the web server / IP address

Received
• Data for the website is stored on the company’s web server
• webserver sends the data for the website back to the web browser
• web server uses the customer’s IP address to return the data
• the data is transferred into Hyper Text Mark-up Language (HTML)
• HTML is interpreted by the web browser (to display the website)

© UCLES 2017 Page 9 of 9

Page 159 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 3 9 5 4 2 6 8 7 3 4 *

COMPUTER SCIENCE 2210/11


Paper 1 Theory May/June 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

DC (KN/SG) 144780
© UCLES 2017 [Turn over

Page 160 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 The memory of a computer contains data and instructions in binary.

The following instruction is stored in a location of the memory.

0 0 1 0 1 0 0 1 1 1 1 1 1 1 0 0

(a) Convert the instruction into hexadecimal.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................... [2]

(b) Explain why a programmer might prefer to read the instruction in hexadecimal rather than in
binary.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................... [2]

(c) Give two other uses of hexadecimal.

Use 1 ........................................................................................................................................

...................................................................................................................................................

Use 2 ........................................................................................................................................

...................................................................................................................................................
[2]

2 Programmers can use a high-level language to write a computer program.

(a) Explain what is meant by the term ‘high-level language’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................... [2]

© UCLES 2017 2210/11/M/J/17

Page 161 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

(b) A program written in a high-level language is translated into machine code. This is so that it
can be processed by a computer.

Name one type of translator that can be used.

.............................................................................................................................................. [1]

(c) Describe how your answer to part (b) translates this program.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

3 Steffi has a number of files of different sizes that contain her work.

Tick (3) to show whether each statement is true or false.

true false
Statement
(3) (3)

47KB is larger than 10MB.

250bytes is smaller than 0.5MB.

50GB is larger than 100MB.

1TB is smaller than 4GB.


[4]

© UCLES 2017 2210/11/M/J/17 [Turn over


Page 162 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 Five statements about serial half-duplex data transmission are shown in the table below.

Tick (3) to show whether each statement is true or false.

true false
Statement
(3) (3)

Data is transmitted in one direction only, one bit at a time.

Data is transmitted in both directions, multiple bits at a time.

Data is transmitted in one direction only, multiple bits at a time.

Data is transmitted in both directions, but only one direction at a


time. Data is transmitted one bit at a time.
Data is transmitted in both directions, but only one direction at a
time. Data is transmitted multiple bits at a time.
[5]

© UCLES 2017 2210/11/M/J/17

Page 163 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

5 (a) Parity checks are often used to detect errors that may occur during data transmission.

The received bytes in the table below were transmitted using odd parity.

Tick (3) to show whether each byte has been corrupted during transmission or not
corrupted during transmission.

corrupted not corrupted


during during
Received byte
transmission transmission
(3) (3)

10110100

01101101

10000001
[3]

(b) Another method of error detection is Automatic Repeat reQuest (ARQ).

Explain how ARQ is used in error detection.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2017 2210/11/M/J/17 [Turn over


Page 164 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

6 Signals are sent to and from the components of a processor using buses.

Identify and describe the purpose of two different buses.

Bus 1 ....................................................................

Purpose ............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Bus 2 ....................................................................

Purpose ............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2017 2210/11/M/J/17

Page 165 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

7 Six security terms and six statements are listed below.

Draw a line to match the security term with the most appropriate statement.

Security term Statement

Provides a secure connection between


Encryption web browsers and websites allowing
secure transmission of private data.

Computer that acts as an intermediary


Secure Socket
between a web browser and the
Layer (SSL)
Internet.

Legitimate-looking email is sent in the


hope of gathering personal information;
Pharming
it requires the user to click on a link in
the email.

Uses rules and criteria, set by the user,


Phishing to help protect a network or system from
unauthorised access.

Malicious code installed on the hard


drive of a user’s computer; this code
Firewall will redirect the user to a fake website
without the user’s knowledge.

Proxy server Scrambles data for secure transmission.

[5]
© UCLES 2017 2210/11/M/J/17 [Turn over
Page 166 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

8 Complete the paragraph by choosing six correct terms from the list.

• Optical
• On-line
• RAM
• HDD
• Primary
• SSD
• Secondary
• ROM
• Off-line

A computer has two different types of memory. .................................... memory is not directly

accessed by the CPU, but it allows a user to store data that can easily be accessed by applications.

Two examples of this type of memory are .................................... and .................................... . The

second type of memory is .................................... memory. This memory is directly accessed by

the CPU. It allows the processor to access data and instructions that are stored in this memory.

Two examples of this memory are .................................... and .................................... .


[6]

© UCLES 2017 2210/11/M/J/17

Page 167 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

9 A supermarket has a system that allows customers to check out their own shopping.

Identify and describe the purpose of two input devices and one output device used in this system.

Input device 1 ...................................................................................................................................

Purpose ............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Input device 2 ...................................................................................................................................

Purpose ............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Output device 1 ................................................................................................................................

Purpose ............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

10 (a) Complete the truth table for the NOR gate.

A
X
B

A B Output (X)

0 0

0 1

1 0

1 1
[1]

© UCLES 2017 2210/11/M/J/17 [Turn over


Page 168 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

(b) Write a logic statement that corresponds with the following logic circuit.

A
B

X = ..................................................................................................................................... [3]

11 State three functions provided by an operating system.

Function 1 ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Function 2 ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Function 3 ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[3]

© UCLES 2017 2210/11/M/J/17

Page 169 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

12 The processes in a chemical factory are monitored by sensors connected to a microprocessor.

(a) Identify two different sensors used in this application. Give an example of how each sensor
could be used in the chemical factory.

Sensor 1 ...................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................

Sensor 2 ...................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................
[4]

(b) Describe how the sensors and a microprocessor are used to monitor a process.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2017 2210/11/M/J/17 [Turn over


Page 170 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

13 (a) Gurdeep wants to send a large file to Jennifer over the Internet.

State two benefits of compressing the file to send it.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) Two types of compression are lossy and lossless.

Choose the most suitable type of compression for the following and explain your choice.

(i) Downloading the code for a computer program:

Type of compression .........................................................................................................

Explanation .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Streaming a video file:

Type of compression .........................................................................................................

Explanation .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 2210/11/M/J/17

Page 171 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/11


Paper 1 May/June 2017
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 8 printed pages.

© UCLES 2017 [Turn over

Page 172 of 400


2210/11 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

1(a) 1 mark for any two correct values, 2 marks for all 4 correct values. 2
29FC

1(b) Two from: 2


• Easier/quicker to understand/read
• Easier to debug/identify errors
• Fewer digits are used / shorter // takes up less space on screen // more
can be shown on screen / page

1(c) Two from: 2


• Notations for colour in HTML // HTML colour (codes)
• Error messages
• MAC address // IP address
• Locations in memory
• Memory dump

Question Answer Marks

2(a) Two from: 2


• Closer to human language // closer to English
• Independent of a particular type of computer/device/platform // portable
language
• A language such as Python, Java, Pascal, etc. (any suitable example)

2(b) One from: 1


• Compiler
• Interpreter

2(c) Must relate to answer given in 2b. No follow through for incorrect answer in 3
part 2b.

Compiler – Three from:


• Translates the whole program as a complete unit / at once
• Creates an executable file / object code
• A report / list of errors in the code is created
• Optimises the source code (to run efficiently)

Interpreter – Three from:


• Translates a program one line of code at a time
• Machine code is directly executed // The interpreter is used each time
the program / code is executed
• Will identify an error as soon as it finds one in a line of code

© UCLES 2017 Page 2 of 8

Page 173 of 400


2210/11 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

3 1 mark per correct tick 4

Statement true false


(9) (9)
47KB is larger than 10MB. 9
250bytes is smaller than 0.5MB. 9
50GB is larger than 100MB. 9
1TB is smaller than 4GB. 9

Question Answer Marks

4 1 mark per correct tick 5

Statement True False


Data is transmitted in one direction only, one
9
bit at a time.
Data is transmitted in both directions,
9
multiple bits at a time.
Data is transmitted in one direction only,
9
multiple bits at a time.
Data is transmitted in both directions, but
only one direction at a time. Data is 9
transmitted one bit at a time.
Data is transmitted in both directions, but
only one direction at a time. Data is 9
transmitted multiple bits at a time.

© UCLES 2017 Page 3 of 8

Page 174 of 400


2210/11 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

5(a) 1 mark per correct tick 3

corrupted not corrupted


during during
Received byte
transmission transmission
(9) (9)
10110100 9
01101101 9
10000001 9

5(b) Four from: 4


• Uses acknowledgement and time out
• Check performed on received data // error is detected by e.g. parity
check, check sum
• If error detected, request sent to resend data // negative
acknowledgment is used
• If no acknowledgement is sent that data is received // positive
acknowledgement is used
• Data is resent / Resend request repeated, till data is resent correctly «
• « or request times out // limit is reached

Question Answer Marks

6 1 mark for correct bus name and up to 2 further marks for appropriate 6
purpose.

Address (bus)
Two from:
• Carries / transports an address / location «
• « of the next item to be fetched
• Data travels one way (unidirectional)

Data (bus)
Two from:
• Carries / transports data / example of data ...
• « that is currently being processed // that will be / has been processed
• Data can travel in both directions (bidirectional)

Control (bus)
Two from:
• Carries / transports signals
• Control / directs the actions of the CPU / processor
• Can be either Unidirectional or Bidirectional

© UCLES 2017 Page 4 of 8

Page 175 of 400


2210/11 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

7 5

1 mark for correct line till 5 marks given.

Question Answer Marks

8 • Secondary 6
• HDD/SSD
• SSD/HDD
• Primary
• ROM/RAM
• RAM/ROM

© UCLES 2017 Page 5 of 8

Page 176 of 400


2210/11 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

9 1 mark for appropriate device name and 1 further mark for appropriate 6
purpose.

Input devices
Two from:
• Keypad / Keyboard «
• « e.g. to allow customer to input the quantity of an item
• Touchscreen «
• « e.g. to allow a customer to select a payment method
• Barcode scanner / Barcode reader «
• « e.g. to allow a customer to scan in their shopping
• Card reader // Cash deposit / intake «
• « e.g. to allow a customer to pay for their shopping
• Weighing scales «
• « e.g. to allow a customer to weigh fresh produce

Output devices
One from:
• Display / Touchscreen «
• « e.g. to allow a customer to see the running total of their shopping
• Speaker «
• « e.g. to give audio instructions to a customer about how to use the
self-checkout
• Printer «
• « e.g. to print a receipt for the customer

Question Answer Marks

10(a) 1 mark for four correct outputs only 1

A B Output
0 0 1
0 1 0
1 0 0
1 1 0

10(b) 1 mark for each correct section of the statement 3

• (A AND B)
• AND
• (C OR NOT B)

© UCLES 2017 Page 6 of 8

Page 177 of 400


2210/11 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

11 Three from e.g. : 3


• (Provides an) interface
• Loads / opens / installs / closes software
• Manages the hardware // manages peripherals // spooling
• Manages the transfer of programs into and out of memory
• Divides processing time // processor management
• Manages file handling
• Manages error handling // manages interrupts
• Manages security software
• Manages utility software
• Manages user accounts
• Multitasking
• Multiprogramming // time slicing
• Batch processing

Question Answer Marks

12(a) 1 mark for appropriate sensor and 1 further mark for appropriate use. 4

Two from:
• Gas (sensor) «
• « e.g. to measure the levels of oxygen/carbon dioxide / nitrogen in the
factory to make sure they are not too high / low
• Temperature (sensor) «
• « e.g. to measure the temperature of the chemicals to make sure it is
not too high/low
• Motion / Infra-red (sensor) «
• « e.g. to detect any persons in an unauthorised area of the factory
• Pressure (sensor) «
• « e.g. to measure the pressure of chemicals flowing through pipes to
check that level are not too high / low
• pH (sensor) «
• « to measure the pH to make sure the acidity / alkalinity of the
chemicals is correct
• Light (sensor) «
• « to measure the level of light to make sure it remains at a constant
level for the chemical process

12(b) Five from: 5


• Sensors send signals to microprocessor
• Analogue signals are converted to digital (using ADC)
• Microprocessor compares value to stored value «
• « If out of range / matches stored values «
• « signal sent to alert workers (e.g. sound alarm)
• « microprocessor send signal to cause an action to occur e.g. cool a
process down, heat a process up, add a chemical
• « no action taken
• Output/record readings
• Monitoring is continuous

© UCLES 2017 Page 7 of 8

Page 178 of 400


2210/11 Muhammad QadeerMay/June
Cambridge O Level – Mark Scheme (0333-8136280)
2017
PUBLISHED www.cs2210.blogspot.com

Question Answer Marks

13(a) Two from: 2


• Smaller file to transmit
• The file is transmitted quicker
• Uses / requires less bandwidth

13(b)(i) • Lossless (compression) « 3


• « It is important the code must be (exactly) the same as the original
file
• « If it does not match the original file it will not work

13(b)(ii) • Lossy (compression) « 3


• « It would make the file smaller than lossless compression / the file
would stream faster than lossless compression
• « The quality of the video can be reduced but it can still be viewed

© UCLES 2017 Page 8 of 8

Page 179 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 2 2 0 3 8 2 8 9 7 8 *

COMPUTER SCIENCE 2210/13


Paper 1 Theory October/November 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (SLM) 135989
© UCLES 2016 [Turn over

Page 180 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 To process an instruction, a central processing unit (CPU) goes through a cycle that has three
main stages.

Name each stage in this cycle.

Stage 1 ................................................................................

Stage 2 ................................................................................

Stage 3 ................................................................................
[3]

2 Name each of the potential security issues described in the five statements below:

Statement Security issue

The act of gaining unauthorised access to


a computer system ..................................................................................

Program code that can replicate itself with


the intention of deleting or corrupting files
stored in a computer ..................................................................................

A small file sent by a web server to a web


browser; every time the user visits the
website, data about user preferences is
collected ..................................................................................

The act of illegally changing the source


code of a program so that it can be
exploited for another use ..................................................................................

Malicious code installed on a user’s hard


drive or a web server which redirects
the user to a fake website without their
knowledge ..................................................................................

[5]

© UCLES 2016 2210/13/O/N/16

Page 181 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

3 Five computer terms and seven descriptions are shown below.

Draw a line to connect each computer term to its correct description.

Computer term Description

Several bits of data sent down several


wires, in both directions, but not at the
same time
Serial, simplex data
transmission

Several bits of data sent down several


wires, in both directions, at the same
time

Parallel, half-duplex
data transmission
An even or odd number of bits set to 1
in a byte, used to check if the byte has
been transmitted correctly

One bit sent at a time, over a single wire


Parity check in one direction only

An additional digit placed at the end of a


number to check if the number has been
entered correctly
Automatic repeat
request (ARQ)

A value transmitted at the end of a block


of data; it is calculated using the other
elements in the data stream and is used
to check for transmission errors

Checksum An error detection method that uses


response and time out when transmitting
data; if a response is not sent back to
the sender in an agreed amount of time,
then the data is re-sent

[5]
© UCLES 2016 2210/13/O/N/16 [Turn over
Page 182 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 The Henslows Diner is a local restaurant.

(a) Staff currently use a keyboard to input a customer food order into a computer. The food order
is then sent to the kitchen.

State two disadvantages of using a keyboard to input a customer food order.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) A concept keyboard has a flat surface that is overlaid with images of food items available
from the restaurant menu. Staff can click on an image to add the food item to a customer food
order.

The Henslows Diner wants to change to a concept keyboard to input customer food orders.

Explain two benefits of making this change.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2016 2210/13/O/N/16

Page 183 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

(c) The Henslows Diner stores personal data on a computer. This computer is connected to the
Internet to allow the data to be backed up.

There is currently one security method in place to protect the data on the computer from
unauthorised access. This is a password.

Give two other security methods that could be added to improve the security of the data.
Describe how each method will keep the data safe.

Security method 1 .....................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security method 2 .....................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2016 2210/13/O/N/16 [Turn over


Page 184 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

5 Three switches, A, B and C, each send values of 0 or 1 to a logic circuit. Value X is output from the
logic circuit.

Switch A
Switch B Logic circuit Output X
Switch C

Output X has a value of 1 depending on the following conditions:

Switch A sends value 1 AND Switch B sends value 0

OR

Switch B sends value 1 AND Switch C sends value 0

(a) Draw a logic circuit to represent the conditions above.

B X

[5]

© UCLES 2016 2210/13/O/N/16

Page 185 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

(b) Complete the truth table for the conditions given at the start of question 5.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

(c) A microprocessor regularly samples the output, X. Each sample value is stored in an 8-bit
register as shown below. One bit of this register is reserved as a parity bit.

Five consecutive output values of 1 indicate a fault condition.

Identify which of the following registers shows a fault condition.


Parity bit

1 1 1 1 1 0 0 1 Register Y

0 1 0 1 1 1 1 1 Register Z

Register .............................................[1]

© UCLES 2016 2210/13/O/N/16 [Turn over


Page 186 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

(d) When eight bytes of data have been collected, they are transmitted to a computer 100 km
away. Parity checks are carried out to identify if the data has been transmitted correctly. The
system uses even parity and column 1 is the parity bit.

The eight bytes of data are sent together with a ninth parity byte:

parity column column column column column column column


bit 2 3 4 5 6 7 8
byte 1 1 0 0 0 0 1 0 0
byte 2 1 1 1 1 0 0 1 1
byte 3 0 1 0 0 1 0 0 0
byte 4 0 1 1 1 0 0 0 1
byte 5 1 0 0 0 1 1 1 1
byte 6 0 0 0 0 0 0 0 0
byte 7 1 1 1 0 1 0 0 0
byte 8 1 0 0 0 1 1 1 0
parity
1 0 1 1 0 1 1 1
byte

(i) Identify which of the eight bytes contains an error.

byte ...............................................................................................................................[1]

(ii) Identify which column contains an error.

column ...........................................................................................................................[1]

(iii) The incorrect bit is indicated where the byte number and column cross.

Give the corrected byte.

[1]

(iv) Calculate the denary value of the corrected byte.

...........................................................................................................................................

.......................................................................................................................................[1]

(v) Considering the fault condition given in part (c), explain why it is very important that the
incorrect bit is located and corrected.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]
© UCLES 2016 2210/13/O/N/16

Page 187 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

6 High-level or low-level languages can be used when writing a computer program.

State two advantages of using a high-level language and two advantages of using a low-level
language.

High-level language advantage 1 ....................................................................................................

..........................................................................................................................................................

High-level language advantage 2 ....................................................................................................

..........................................................................................................................................................

Low-level language advantage 1 .....................................................................................................

..........................................................................................................................................................

Low-level language advantage 2 .....................................................................................................

..........................................................................................................................................................
[4]

7 Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode (LED) backlit technology.

Give four benefits of using LED technology.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2016 2210/13/O/N/16 [Turn over


Page 188 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

8 Four descriptions about compilers and interpreters are shown below.

Draw lines to indicate which descriptions refer to a compiler and which descriptions refer to an
interpreter.

Description

It is more difficult to debug the


code since one error can
produce many other associated
errors.

The speed of execution of


program loops is slower. Compiler

It produces fast, executable


code that runs directly on the Interpreter
processor.

It is easier to debug the code


since an error is displayed as
soon as it is found.

[4]

© UCLES 2016 2210/13/O/N/16

Page 189 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

9 A security light is controlled by sensors and a microprocessor.

Describe how the sensors and microprocessor interact to switch on the security light when an
intruder is detected.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 2210/13/O/N/16 [Turn over


Page 190 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

10 (a) A manufacturer of aeroplane engines assigns a denary identification number (ID) to each
engine.

One engine has the ID: 0431


(i) Convert this denary number to a 12-bit binary format.

[2]

(ii) Show how this number would be represented in hexadecimal.

...........................................................................................................................................

...........................................................................................................................................
[3]

(b) The current status of the engine is sent to a computer in the aeroplane.

Each piece of data collected is 8 bytes in size. Data collection occurs every 30 seconds.

Calculate the number of kilobytes that would be needed to store the data collected during a
10-hour flight. Show your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

................................................. kilobytes
[3]

© UCLES 2016 2210/13/O/N/16

Page 191 of 400


Muhammad Qadeer (0333-8136280)
13 www.cs2210.blogspot.com

(c) At the end of the flight, all of the data are sent to the aeroplane engine manufacturer using the
Internet.

The computer in the aeroplane has a MAC address and an IP address.

State what is meant by these two terms.

MAC address ............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

IP address .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(d) When sending this data, security is very important. Data are sent over the Internet using
Transport Layer Security (TLS) protocol.

Name the two layers that make up TLS.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

© UCLES 2016 2210/13/O/N/16 [Turn over


Page 192 of 400
Muhammad Qadeer (0333-8136280)
14 www.cs2210.blogspot.com

11 Explain why ethics are important when using computers.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 2210/13/O/N/16

Page 193 of 400


Muhammad Qadeer (0333-8136280)
15 www.cs2210.blogspot.com

BLANK PAGE

© UCLES 2016 2210/13/O/N/16

Page 194 of 400


Muhammad Qadeer (0333-8136280)
16 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 2210/13/O/N/16

Page 195 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/13


Paper 1 October/November 2016
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 9 printed pages.

© UCLES 2016 [Turn over

Page 196 of 400


Muhammad Qadeer (0333-8136280)
Page 2 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

1 In any order:
– Fetch
– Decode
– Execute [3]

2 – Hacking
– Virus
– Cookies
– Cracking
– Pharming [5]

© UCLES 2016

Page 197 of 400


Muhammad Qadeer (0333-8136280)
Page 3 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

[5]

© UCLES 2016

Page 198 of 400


Muhammad Qadeer (0333-8136280)
Page 4 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

4 (a) Any two from:

– Easy to make a mistake


– Can be slow if not trained
– Dirt/food can get into keys [2]

(b) Any two with identification and explanation from:

– Fewer typing errors may be made «


– « because one button is pressed to order an item
– Speed up the time to enter an order «
– « because fewer buttons are pressed to complete the order
– May require less training «
– « because it is easier to identify an order item from its image rather than typing it
– Can stop dirt/food damage «
– « normally has a protective layer // because there are no keys for dirt/food to get into
[4]
(c) 1 mark for security measure, 1 mark for description.

Any two from:

– Encryption
– If the data is accessed or stolen it will be meaningless

– Biometric device
– Can help prevents unauthorised access to the system (only award once)

– Firewall
– Can alert to show unauthorised access attempt on the system
– Can help prevent unauthorised access to the system (only award once)
– Can help protect against viruses and malware entering the system

– Anti-spyware
– Can stop the keys being logged that, when analysed, would reveal the password to
the data [4]

© UCLES 2016

Page 199 of 400


Muhammad Qadeer (0333-8136280)
Page 5 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

5 (a) 1 mark per correct section.

B X

[5]

(b) 4 marks for 8 correct values


3 marks for 6 correct values
2 marks for 4 correct values
1 mark for 2 correct values

A B C Working space X

0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
[4]

© UCLES 2016

Page 200 of 400


Muhammad Qadeer (0333-8136280)
Page 6 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

(c) Register Z [1]

(d) (i) (byte) 5 [1]

(ii) (column) 4 [1]

(iii) corrected byte is: 1 0 0 1 1 1 1 1 [1]

(iv) that gives the value: 1 5 9


(follow through applies) [1]

(v) Any two from:

– The byte would be transmitted without having 5 consecutive 1’s


– The fault condition would not be recognised [2]

6 Any two from:

High level language

– easier/faster to write code as uses English-like statements


– easier to modify as uses English-like statements
– easier to debug as uses English-like statements
– portable language code

Any two from:

Low level language

– can work directly on memory locations


– can be executed faster
– translated program requires less memory [4]

7 Any four from:

– reaches maximum brightness quickly


– colours are vivid
– good colour definition/contrast can be achieved
– screens can be thinner/thin
– more reliable as LED’s are long lasting
– consume very little/less energy [4]

© UCLES 2016

Page 201 of 400


Muhammad Qadeer (0333-8136280)
Page 7 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

It is more difficult to debug the


code since one error can
produce many other
associated errors

The speed of execution of


program loops is slower. Compiler

It produces fast, executable


code that runs directly on the Interpreter
processor

It is easier to debug the code


since an error is displayed as
soon as it is found.
[4]

© UCLES 2016

Page 202 of 400


Muhammad Qadeer (0333-8136280)
Page 8 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

9 Any six from:

– infrared / motion / pressure (sensor) // sensor detects movement/pressure


– signals/data sent (continuously) to microprocessor
– converted from analogue to digital (using ADC)
– microprocessor compares value with those stored in memory
– if sensor value does not match the stored value(s) «
– « signal sent to switch on the light
– « signal sent to keep the light on
– « light remains on for a period of time (30 seconds)
– if sensor value matches the stored value(s) «
– « light will remain off
– « will turn off after period of time (30 seconds)
– works in a continues loop [6]

10 (a) (i) 2 marks for 3 correct binary conversions, 1 mark for 2 correct binary conversions [2]

0 0 0 1 1 0 1 0 1 1 1 1

(ii) 1 mark for each correct hex value converted

1AF [3]

(b) 2 marks for working + 1 mark for correct answer

Working
– 1200 × 8 = 9600 (bytes)
– 9600/1024

Answer
– 9.4 kilobytes [3]

(c) Any one from:

MAC address

– Media Access Control (address)


– unique number that identifies a device (connected to the Internet)
– address is made up of manufacturer id + serial number of device
– address is allocated by the manufacturer

Any one from:

IP address

– Internet Protocol (address)


– location/address of a device on the Internet
– address is unique for given Internet session
– address is supplied when a device connects to the Internet
– address is allocated by the network [2]

© UCLES 2016

Page 203 of 400


Muhammad Qadeer (0333-8136280)
Page 9 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

(d) – record (layer)


– handshake (layer) [2]

11 Any six from:


– Help stop the misuse of computers
– The use of computers needs to be governed
– Help keep users safer when using computers
– Provides rules for using computers
– Help stop intellectual property theft
– Helps prevent the misuse of personal information
– Reference to laws (relevant example)
– Reference to security issues (relevant example)

NOTE: Answer must refer to the importance of ethics and be more than a description of
ethics. [6]

© UCLES 2016

Page 204 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 0 7 4 3 5 8 5 6 7 6 *

COMPUTER SCIENCE 2210/12


Paper 1 Theory October/November 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

DC (AL) 135539
© UCLES 2016 [Turn over

Page 205 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 (a) Give two reasons why a programmer would choose to write code in a low-level language.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) High-level languages require either an interpreter or a compiler to translate the program.

The table below lists a number of statements about language translators.

Tick (3) to show which statements refer to interpreters and which refer to compilers.

Statements Interpreter (3) Compiler (3)


Translates the source code into machine code
all at once

Produces an executable file in machine code

Executes a high-level language program one


instruction at a time
Once translated, the translator does not need to
be present for the program to run

An executable file is produced

[5]

2 State four functions of an operating system.

1 .......................................................................................................................................................

2 .......................................................................................................................................................

3 .......................................................................................................................................................

4 .......................................................................................................................................................
[4]

© UCLES 2016 2210/12/O/N/16

Page 206 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

3 (a) Explain what is meant by:

(i) Serial data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Parallel data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) A computer in a factory is connected to a printer. The printer is located in an office 1 km away
from the factory.

Identify which data transmission method would be most suitable for this connection.

...................................................................................................................................................

Give two reasons for your choice.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2016 2210/12/O/N/16 [Turn over


Page 207 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 Nine bytes of data are transmitted from one computer to another. Even parity is used. An additional
parity byte is also sent.

The ten bytes arrive at the destination computer as follows:

parity bit bit 2 bit 3 bit 4 bit 5 bit 6 bit 7 bit 8

byte 1 1 1 1 0 1 1 1 0

byte 2 0 0 0 0 0 1 0 1

byte 3 0 1 1 1 1 0 0 0

byte 4 1 1 0 0 0 0 0 0

byte 5 1 0 1 1 1 1 1 0

byte 6 0 1 0 1 1 0 0 1

byte 7 0 1 1 1 0 0 1 1

byte 8 0 0 1 1 0 1 1 0

byte 9 1 1 0 0 0 0 1 1

parity byte 0 0 1 0 0 0 1 0

One of the bits was corrupted during the data transmission.

(a) Circle the corrupt bit in the corrupt byte in the table above. [1]

(b) Explain how the corrupted bit was found.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 2210/12/O/N/16

Page 208 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

5 A computer uses an 8-bit register.

The 8-bit register contains binary integers.

(a) Write the denary (base 10) value represented by:

128 64 32 16 8 4 2 1

0 1 1 1 0 0 0 0

...............................................................................................................................................[1]

(b) All the bits in the register are shifted one place to the right as shown below.

0 1 1 1 0 0 0 0

0 0 1 1 1 0 0 0

Write the denary number that is represented after this shift.

...............................................................................................................................................[1]

(c) State the effect the shift to the right had on the original denary number from part (a).

...............................................................................................................................................[1]

(d) The original number in part (a) is shifted three places to the right.

(i) Show the new binary number:

[1]

(ii) Write the equivalent denary number.

.......................................................................................................................................[1]

© UCLES 2016 2210/12/O/N/16 [Turn over


Page 209 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

(e) Describe the problems that could be caused if the original binary number in part (a) is shifted
five places to the right.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

6 Four computer terms and eight descriptions are shown below.

Draw lines to connect each computer term to the correct description(s).

Computer term Description

Data can be read but not altered

Arithmetic and logic


unit (ALU) Carries out operations such as
addition and multiplication

Stores bootstrap loader and BIOS

Control unit
Fetches each instruction in turn

Carries out operations such as


Random access AND, OR, NOT
memory (RAM)
Stores part of the operating system
currently in use

Read only memory Stores data currently in use


(ROM)

Manages execution of each


instruction

[4]

© UCLES 2016 2210/12/O/N/16

Page 210 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

7 (a) Complete the truth tables and name the single logic gate that could replace each logic circuit:

(i)
Working space
A A B X
X
B 0 0
0 1
1 0
1 1

Single logic gate ............................................................................................................[3]

(ii)

A Working space
A B X

X 0 0
0 1
B 1 0
1 1

Single logic gate ............................................................................................................[3]

© UCLES 2016 2210/12/O/N/16 [Turn over


Page 211 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

(b) (i) Draw a logic circuit to represent the following logic statement:

X = 1 if (A = 1 AND B = 1) OR ( (B = NOT 1) AND C = 1)

B X

[4]

(ii) Complete the truth table for the logic statement in part (b)(i).

Working space
A B C X

0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1

[4]

© UCLES 2016 2210/12/O/N/16

Page 212 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

8 Identify whether the four statements about file compression are correct by writing TRUE or FALSE
in the following table.

Statement TRUE or FALSE

MIDI files store the actual music notes in a compressed format

JPEG files are examples of lossless file compression

MP3 files are, on average, 90% smaller than the music files
stored on a CD

MP4 files are examples of lossy file compression

[4]

9 (a) Explain what is meant by a denial of service attack.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Name and describe two other potential security threats when using the Internet.

Security threat 1 .......................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security threat 2 .......................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2016 2210/12/O/N/16 [Turn over


Page 213 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

10 (a) Describe what is meant by HTML.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) The following URL is typed in:

http://www.cie.org.uk/ComputerSciencePapers

This URL is composed of three parts.

State the part of this URL that is the:

File name ..................................................................................................................................

Protocol ....................................................................................................................................

Web server name .....................................................................................................................


[3]

© UCLES 2016 2210/12/O/N/16

Page 214 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

11 A security system is installed in a house. A hexadecimal number is entered to activate or deactivate


the alarm.

(a) The alarm code is set to hexadecimal number 2 A F

Show how this number would be stored in a 12-bit binary register.

[3]

(b) Identify two sensors that the security system could use to detect intruders.

Describe how each sensor could be used in the security system.

Sensor 1 ...................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Sensor 2 ...................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2016 2210/12/O/N/16 [Turn over


Page 215 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

12 Explain the differences between freeware and free software.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 2210/12/O/N/16

Page 216 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/12


Paper 1 October/November 2016
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 10 printed pages.

© UCLES 2016 [Turn over

Page 217 of 400


Muhammad Qadeer (0333-8136280)
Page 2 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

1 (a) Any two from:

– direct access to computer processor / special hardware // machine dependent


instructions
– uses up less memory
– can increase the speed of processing a program // executes instructions faster
[2]

(b)
Statements Interpreter (9) Compiler (9)

Translates the source code into machine code


9
all at once

Produces an executable file in machine code 9

Executes a high-level language program one


9
instruction at a time

Once translated, the translator does not need to be


9
present for the program to run

An executable file is produced 9

[5]

2 Any four from:

– Provides a user interface


– Handles interrupts / errors
– Memory management
– File management
– Manages peripherals (inputs/outputs)
– Provides security methods
– Allows multitasking
– Manages multiprogramming
– Enables batch processing
– Manages software installation / removal
– Allows creation of multiple accounts
– Levels of access
[4]

© UCLES 2016

Page 218 of 400


Muhammad Qadeer (0333-8136280)
Page 3 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

3 (a) (i) Any two from:

serial

– one bit sent at a time // bits sent sequentially


– over a single wire
– synchronous or asynchronous
[2]
(ii) Any two from:

parallel

– several bits / a byte sent at a time


– using many / multiple wires
– synchronous
[2]

(b) – serial

Any two from:

– serial data transmission more reliable over long distances


– less likely for the data to be skewed/out of synchronisation
– less interference as only a single wire
– it is a cheaper connection as only single wire needed // cheaper to set up
– a fast connection is not required as a printer is limited by its printing speed
[3]

4 (a) Intersection of Row 7 and column 4 circled [1]

(b) – Row (byte number) 7 has an odd number of 1s (five 1s)


– Column (bit number) 4 has an odd number of 1s (five 1s)
[2]

© UCLES 2016

Page 219 of 400


Muhammad Qadeer (0333-8136280)
Page 4 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

5 (a) 112 [1]

(b) 56 [1]

(c) divided by 2 // value 112 was halved // multiplied by 0.5 [1]

(d) (i)
0 0 0 0 1 1 1 0

[1]

(ii) 14 [1]

(e) Any two from:

– run out of places to the right of register / at the end of register


– right-most 1 would be lost
– number would become 3 instead of 3.5
– loss of precision
[2]

© UCLES 2016

Page 220 of 400


Muhammad Qadeer (0333-8136280)
Page 5 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

6 1 mark for both correct lines from each computer term.

[4]

© UCLES 2016

Page 221 of 400


Muhammad Qadeer (0333-8136280)
Page 6 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

7 (a) (i) 2 marks for 4 correct outputs,


1 mark for 2 correct outputs

1 mark for correct gate

A B Working space X

0 0 0

0 1 0

1 0 0

1 1 1

AND gate
[3]

(ii) 2 marks for 4 correct outputs


1 mark for 2 correct outputs

1 mark for correct gate

A B Working space X

0 0 0

0 1 1

1 0 1

1 1 1

OR gate

[3]

© UCLES 2016

Page 222 of 400


Muhammad Qadeer (0333-8136280)
Page 7 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

(b)(i) 1 mark per correct section.


1 mark

1 mark

1 mark

1 mark

[4]
(ii) 4 marks for 8 correct outputs
3 marks for 6 correct outputs
2 marks for 4 correct outputs
1 mark for 2 correct outputs

A B C Working space X

0 0 0 0

0 0 1 1

0 1 0 0

0 1 1 0

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 1

[4]

© UCLES 2016

Page 223 of 400


Muhammad Qadeer (0333-8136280)
Page 8 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

8
Statement TRUE or FALSE

MIDI stores the actual music notes in a compressed format FALSE

JPEG files are examples of lossless file compression FALSE

MP3 files are, on average, 90% smaller than the music files
TRUE
stored on a CD

MP4 files are examples of lossy file compression


TRUE

[4]

9 (a) Any two from:

– a large number of requests are sent to the network/server all at once


– designed to flood a network/server with useless traffic/requests
– the network/server will come to a halt/stop trying to deal with all the traffic/requests
– prevents users from gaining access to a website/server
[2]

(b) 1 mark for each security threat and 1 mark for matching description

Security threat Description

Viruses – software that replicates


– causes loss/corruption of data // computer may “crash”/run
slow

Hacking/cracking – illegal/ unauthorised access to a system/data

Phishing – a link/attachment sends user to fake website (where personal


data may be obtained)

Pharming – malicious code installed on user’s hard drive / computer


– user is redirected to a fake website (where personal data may
be obtained)

Spyware/key logger – send/relay key strokes to a third party

[4]

© UCLES 2016

Page 224 of 400


Muhammad Qadeer (0333-8136280)
Page 9 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

10 (a) Any three from:

– hyper text mark-up language


– uses both structure and presentation
– web-authoring language/software // used to create websites/webpages
– uses tags to define e.g. colour / font / graphics / layout
[3]

(b)

File name: ComputerSciencePapers

Protocol: http(://)

Web server name: www.cie.org.uk


[3]

11 (a) 1 mark per nibble

0010 1010 1111


[3]

(b) 1 mark for identification of each sensor, max 2 for each description

Infrared/motion sensor

– Receives infrared rays/heat


– Sends data to microprocessor
– Receives microwaves
– Placed in the corner of a room, across a doorway
– Used to detect the heat of an intruder // used to detect if an infrared beam has been
broken by an intruder

Pressure sensor

– Receives current if circuit created // stops receiving current if circuit is broken


– Sends data to microprocessor
– Placed on a window/door, at the entrance
– Used to detect a change in pressure
[6]

© UCLES 2016

Page 225 of 400


Muhammad Qadeer (0333-8136280)
Page 10 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

12 Any four from:

– Freeware needs owner’s permission to share/copy/amend whereas free software can be


shared/copied/amended without permission
– Freeware the owner retains copyright / is subject to copyright whereas free software the
owner releases copyright/ is not subject to copyright
– Freeware is normally provided without a fee whereas free software a fee may be charged
– Freeware is distributed without the source code whereas free software is distributed with the
source code
– Freeware can be restricted in use e.g. non-commercial whereas free software can be used
without restriction

NOTE: The question asks candidates to explain the differences, so each mark needs to have a
comparison.
[4]

© UCLES 2016

Page 226 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 2 9 4 2 1 7 6 9 5 1 *

COMPUTER SCIENCE 2210/12


Paper 1 Theory May/June 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (CW/JG) 127298
© UCLES 2016 [Turn over

Page 227 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 Complete the following by writing either compiler, interpreter or assembler in the spaces
provided.

..................................................................... – translates source code into object code.

...................................................................... – translates low-level language into machine code.

...................................................................... – stops the execution of a program as soon as it


encounters an error.
[3]

2 Motion sensors are used in a security system to detect intruders.

Name three other sensors that could be used in the following applications.

Give a different type of sensor for each application.

Application Sensor

controlling street lights

monitoring a river for pollution

controlling traffic lights

[3]

© UCLES 2016 2210/12/M/J/16

Page 228 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

3 (a) Convert the following hexadecimal number into 12-bit binary:

4AF

[3]

(b) The 2016 Olympic Games will be held in Rio de Janeiro. A timer that counts down to the
opening of the Games is shown on a microprocessor-controlled display.

The number of hours, minutes and seconds until the Games open are held in three 8-bit
registers.

The present register values are:

0 1 1 0 1 0 0 1 105 hours

0 0 1 0 0 0 0 0 32 minutes

0 0 0 1 0 1 0 0 20 seconds

The timer will count down in seconds.

(i) Show the values in each 8-bit register 30 seconds after the time shown above:

hours

minutes

seconds
[3]

(ii) Write the hexadecimal value of the minutes register from part (b)(i).

.......................................................................................................................................[1]

© UCLES 2016 2210/12/M/J/16 [Turn over


Page 229 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 Nigel wants to send a large text file electronically to Mashuda.

(a) Describe how the size of the text file can be reduced.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) This file will be transmitted to Mashuda as an email attachment. Mashuda then stores it on
her computer.

Explain how checksums can be used to verify that the file has not been corrupted during
transmission or data storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 2210/12/M/J/16

Page 230 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

5 Six descriptions and six devices are shown below.

Draw a line to link each description to the correct device.

Description Device

Allows a user to write on a surface


using a pen; text and drawings are
then captured electronically and Digital Light Projector
stored for later use.

Converts sound into an electrical


Inkjet printer
signal/voltage.

Uses thermal bubble and piezoelectric


Interactive whiteboard
technology to produce a hard copy.

Uses a bright white light source and


micro mirrors (on a chip) to produce Laser printer
an image to be shone onto a wall or
screen.

Converts a hard copy document into


an electronic form to be stored as a Microphone
file on a computer.

Uses negatively charged images on a


rotating drum and positively charged Scanner (2D)
toner to output a hard copy.

[5]

© UCLES 2016 2210/12/M/J/16 [Turn over


Page 231 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

6 (a) Three descriptions of data transmission are given below.

Tick (✓) the appropriate box in each table to show the:

• type of transmission
• method of transmission

Description 1:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted several bits at
a time down several wires in both simplex serial
directions simultaneously.
half-duplex parallel

full-duplex

Description 2:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted in one direction
only, one bit at a time, down a simplex serial
single wire.
half-duplex parallel

full-duplex

Description 3:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted one bit at a
time down a single wire; the data simplex serial
is transmitted in both directions
but not at the same time.
half-duplex parallel

full-duplex

[6]

(b) Give two reasons why serial transmission, rather than parallel transmission, is used to
connect devices to a computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2016 2210/12/M/J/16

Page 232 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

7 (a)

;
%

&

Complete the truth table for this logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2016 2210/12/M/J/16 [Turn over


Page 233 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

(b) Draw a logic circuit corresponding to the following logic statement:

X = 1 if ( ( A is 1 OR B is 1 ) AND ( A is 1 AND B is 1 ) ) OR ( C is NOT 1 )

% ;

&

[5]

© UCLES 2016 2210/12/M/J/16

Page 234 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

(c) Re-draw the following logic circuit using NAND gates only.

&

Logic circuit re-drawn:

% ;

&

[4]

© UCLES 2016 2210/12/M/J/16 [Turn over


Page 235 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

8 (a) Five statements and three types of software are shown below.

Draw lines to connect each statement with the correct type of software.

Statement Type of software

Users have the freedom to pass on


the software to friends and family as
they wish.

Free software

Users can download this software free


of charge, but they cannot modify the
source code in any way.

Users are allowed to try out the


software for a trial period only before Freeware
being charged.

Users can study the software source


code and modify it, where necessary,
to meet their own needs, without
breaking copyright laws.

Shareware

Users can obtain a free trial version


of the software, but this often does
not contain all the features of the full
version.

[3]

© UCLES 2016 2210/12/M/J/16

Page 236 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

(b) Describe three ethical issues that should be considered when using computers.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) Security of data is very important.

Three security issues are viruses, pharming and spyware.

Explain what is meant by each issue.

Viruses: .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Pharming: .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Spyware: ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2016 2210/12/M/J/16 [Turn over


Page 237 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

(d) Describe three tasks carried out by a firewall.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

9 In the following barcode, each binary number is made up of seven bars.

Each bar is black or grey.

A black bar is interpreted as a “1” and a grey bar is interpreted as a “0”.

(a) Write the binary numbers that would be produced from this barcode:

%LQDU\QXPEHU$ %LQDU\QXPEHU%

Binary number A:

Binary number B:
[2]

(b) This barcode system uses odd parity.

Write the parity bit for each of the binary numbers in part (a):

Parity bit

Binary number A:

Binary number B:
[2]
© UCLES 2016 2210/12/M/J/16

Page 238 of 400


Muhammad Qadeer (0333-8136280)
13 www.cs2210.blogspot.com

10 There are six descriptions in the table below.

Complete the table below by writing the correct storage device or media in the box next to each
description.

Description Storage device or media

Non-volatile memory that can only be read from and not


written to.

Optical storage media that allows very high storage capacity


by using blue/violet laser technology.

Volatile memory that stores data, programs and the parts of


the operating system that are currently in use.

Optical storage media that uses a single spiral track and uses
dual layer technology, allowing high data storage capacity.

Device that stores data by controlling the movement of


electrons within a microchip; there are no moving parts.

Optical storage media that uses concentric tracks allowing


writing and reading to take place at the same time.

[6]

© UCLES 2016 2210/12/M/J/16 [Turn over


Page 239 of 400
Muhammad Qadeer (0333-8136280)
14 www.cs2210.blogspot.com

11 Describe the use of structure and presentation in a HTML document.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 2210/12/M/J/16

Page 240 of 400


Muhammad Qadeer (0333-8136280)
15 www.cs2210.blogspot.com

BLANK PAGE

© UCLES 2016 2210/12/M/J/16

Page 241 of 400


Muhammad Qadeer (0333-8136280)
16 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 2210/12/M/J/16

Page 242 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/12


Paper 1 May/June 2016
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 10 printed pages.

© UCLES 2016 [Turn over

Page 243 of 400


Muhammad Qadeer (0333-8136280)
Page 2 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

1 compiler

assembler

interpreter [3]

2
Application Sensor

controlling street lights Light

monitoring a river for pollution Gas, pH, temperature, light

controlling traffic lights pressure, magnetic field,

NOTE: The same sensor cannot be given twice [3]

3 (a) 1 mark for each nibble

0100 1010 1111 [3]

(b) (i) 0 1 1 0 1 0 0 1 105 hours 1 mark


00011111 31 minutes 1 mark
00110010 50 seconds 1 mark [3]

(ii) 1F [1]

© Cambridge International Examinations 2016

Page 244 of 400


Muhammad Qadeer (0333-8136280)
Page 3 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

4 (a) Any three from:


– The file can be compressed
– The compression that is used is lossless (not lossy)
– use of a compression algorithm
– repeated words can be indexed
– repeated word sections (e.g. “OU”) can be replaced by a numerical value
– reference to zip files
– save file as a pdf/convert to pdf [3]

(b) Any four from:


– the checksum for the bytes is calculated
– this value is then transmitted with the block of data
– at the receiving end, the checksum is re-calculated from the block of data received
– the calculated value is then compared to the checksum transmitted
– if they are the same value, then the data was transmitted without any error
– if the values are different, then an error has been found
– if the values are different, then a request is sent for the data to be re-transmitted [4]

© Cambridge International Examinations 2016

Page 245 of 400


Muhammad Qadeer (0333-8136280)
Page 4 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

5
Description Device

Allows a user to write on a


surface using a pen; text and
drawings are then captured Digital Light Projector
electronically and stored for
later use.

Converts sound into an


electrical signal/voltage. Inkjet printer

Uses thermal bubble and


piezoelectric technology to Interactive whiteboard
produce a hard copy.

Uses a bright white light source


and micro mirrors (on a chip) to Laser printer
produce an image to be shone
onto a wall or screen.

Converts a hard copy document Microphone


into an electronic form to be
stored as a file on a computer.

Uses negatively charged


images on a rotating drum and Scanner (2D)
positively charged toner to
output a hard copy.

5/6 matches – 5 marks


4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark [5]

© Cambridge International Examinations 2016

Page 246 of 400


Muhammad Qadeer (0333-8136280)
Page 5 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

6 (a)
Tick Tick
Type Method
() ()

simplex serial

half-duplex parallel 

full-duplex 

Tick Tick
Type Method
() ()

simplex  serial 

half-duplex parallel

full-duplex

Tick Tick
Type Method
() ()

simplex serial 

half-duplex  parallel

full-duplex
[6]

(b) Any two from:


– single wire means there is less chance of interference/data corruption
– single wire reduces costs
– more reliable over greater distances
– bits will still be synchronised after transmission [2]

© Cambridge International Examinations 2016

Page 247 of 400


Muhammad Qadeer (0333-8136280)
Page 6 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

7 (a)
A B C Working space X

0 0 0 0

0 0 1 1

0 1 0 0

0 1 1 1

1 0 0 0

1 0 1 1

1 1 0 1

1 1 1 0

4 marks for 8 correct X bits


3 marks for 6 correct X bits
2 marks for 4 correct X bits
1 mark for 2 correct X bits [4]

© Cambridge International Examinations 2016

Page 248 of 400


Muhammad Qadeer (0333-8136280)
Page 7 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

(b) 1 mark for each correct gate with correct source of input

X
B

[5]

(c) Each dotted area is 1 mark

B X

C
[4]

© Cambridge International Examinations 2016

Page 249 of 400


Muhammad Qadeer (0333-8136280)
Page 8 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

8 (a) 1 mark for correct lines from each type of software

NOTE: all statements that are correct must be connected to the correct type of
software for the mark to be awarded

Statement Type of software

Users have the freedom to


pass on the software to
friends and family as they
wish.

Free software

Users can download this


software free of charge, but
they cannot modify the
source code in any way.

Users are allowed to try out


the software for a trial period Freeware
only before being charged.

Users can study the software


source code and modify it,
where necessary, to meet
their own needs, without
breaking copyright laws.

Shareware

Users can obtain a free trial


version of the software, but
this often does not contain all
the features of the full
version.
[3]

© Cambridge International Examinations 2016

Page 250 of 400


Muhammad Qadeer (0333-8136280)
Page 9 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

(b) Any three from:


– That we should follow Copyright laws/intellectual property rights/work should not be
stolen/plagiarised
– That we should follow Data Protection laws
– That we should not create or distribute malware//description of malware
– That we should not hack/crack other computers//description of hacking
– That we should protect our own computers against malware/hacking
– That we should consider privacy issues (when using social networking)
– That we consider anonymity issues (when using social networking)
– That we should consider environmental impacts when using computers
– Loss/creation of jobs from use of computers/robotics
– We should follow codes of practice (for creation of code e.g. ACM/IEEE) [3]

(c) 2 marks for each term described

Viruses:
– program/software/file that replicates (copies) itself
– intends to delete or corrupt files//fill up hard disk space

Pharming:
– malicious code stored on a computer/web server
– redirects user to fake website to steal user data

Spyware:
– monitors and relays user activity e.g. key presses//key logging software
– user activity/key presses can be analysed to find sensitive data e.g. passwords [6]

(d) Any three from:


– examines/monitors traffic to and from a user’s computer and a network/Internet
– checks whether incoming and outgoing traffic meets a given set of criteria/rules
– firewall blocks/filters traffic that doesn’t meet the criteria/rules
– logs all incoming and outgoing traffic
– can prevent viruses or hackers gaining access
– blocks/filters access to specified IP addresses/websites
– warns users of attempts by software (in their computer) trying to access external data
sources (e.g. updating of software) etc. // warns of attempted unauthorised access to
the system [3]

© Cambridge International Examinations 2016

Page 251 of 400


Muhammad Qadeer (0333-8136280)
Page 10 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

9 (a)

Binary number A: 1 1 1 0 0 1 0

Binary number B: 1 0 0 1 1 1 0

[2]

(b)
Parity Bit

Binary number A 1

Binary number B 1
[2]

10 1 mark for each correct storage device

ROM (not EPROM/PROM)

Blu-ray disc

RAM

DVD/ DVD-R(+R)/ DVD-RW(+RW)/ DVD-ROM (not CD or DVD-RAM)

SSD/example of a USB storage device

DVD-RAM
[6]

11 1 mark for each correct point


– Presentation is used to format colour/style
– Structure is used to create layout
– In a HTML document structure and presentation are often kept separate
– By keeping the presentation separate it is easier to update colour/font
– Presentation is often stored in a file called a CSS …
– … the CSS in then linked to the HTML document to implement the presentation requirements
– (Mark-up) tags are used to define the structure of the document …
– … presentation and formatting can also be included within the tags [4]

© Cambridge International Examinations 2016

Page 252 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 5 4 8 9 4 4 1 2 0 6 *

COMPUTER SCIENCE 2210/11


Paper 1 Theory May/June 2016
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 13 printed pages and 3 blank pages.

DC (ST/CGW) 126907
© UCLES 2016 [Turn over

Page 253 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 Some software can be described as free, freeware or shareware.

Tick (✓) the appropriate boxes in the table below to show which features apply to these three
types of software.

Software feature Free Freeware Shareware

Software source code can be freely accessed and


modified as required

All the features of the full version of the software


are not made available; the full version needs to be
purchased first

The original software is subject to all copyright laws

It is possible to distribute modified versions or


copies of the software to friends and family

[3]

2 Hexadecimal codes are used in MAC addresses.

(a) State what is meant by the term MAC.

...............................................................................................................................................[1]

(b) Explain what the hexadecimal code in a MAC address represents.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 2210/11/M/J/16

Page 254 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

3 (a) Five sensors and five applications are shown below.

Draw a line to link each sensor to its most appropriate application.

Sensor Application

Light
Monitor the pollution levels in a river
sensor

Moisture Control the switching off and on of


sensor street lights

Gas Detect intruders breaking into a


sensor building

pH Monitor the amount of water left in


sensor clothes in a dryer

Pressure Monitor acidity levels in the soil in a


sensor greenhouse
[4]

(b) Automatic doors in a building are controlled by the use of infrared sensors and a
microprocessor.

Describe how the sensors and the microprocessor are used to automatically open a door as
a person approaches.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 2210/11/M/J/16 [Turn over


Page 255 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

4 (a) Nikita wishes to print out some documents and connects her printer to the computer using
one of the USB ports.

(i) Identify what type of data transmission is being used.

.......................................................................................................................................[1]

(ii) Give three reasons for using a USB port.

1 .......................................................................................................................................

...........................................................................................................................................

2 .......................................................................................................................................

...........................................................................................................................................

3 .......................................................................................................................................

...........................................................................................................................................
[3]

(iii) The printer runs out of paper while it is printing the documents. A signal is sent to the
processor to request that the problem is dealt with.

Name this type of signal.

.......................................................................................................................................[1]

(b) State one suitable application for each printer below. A different application must be given for
each printer.

Inkjet printer ..............................................................................................................................

...................................................................................................................................................

3D printer ..................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2016 2210/11/M/J/16

Page 256 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

(c) Name another type of printer and describe one way in which it is different from the printers
named in part (b).

Give an application for this printer.

Type of printer ...........................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Application ................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2016 2210/11/M/J/16 [Turn over


Page 257 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

5 A computer-controlled machine produces plastic sheets. The thickness of each sheet must be
within a certain tolerance. The sheets are kept below 50 °C as they move over rollers at 10 metres
per second.

Three parameters need to be monitored all the time.

Binary
Parameter Description Conditions
value
1 thickness of sheet in tolerance
D sheet thickness
0 thickness of sheet out of tolerance
1 roller speed = 10 metres/second
S roller speed
0 roller speed <> 10 metres/second
1 temperature < 50 °C
T temperature
0 temperature >= 50 °C

An alarm, X, will sound if:

thickness is in tolerance AND (roller speed <> 10 metres/second OR temperature >= 50 °C)

OR

roller speed = 10 metres/second AND temperature >= 50 °C

(a) Draw a logic circuit to represent the above monitoring system.

S X

[6]

© UCLES 2016 2210/11/M/J/16

Page 258 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

(b) Complete the truth table for the monitoring system.

Working Space
D S T X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

6 Secure socket layer (SSL) is used in the security of information on Internet websites.

(a) State how it is possible for a user to know that a website is secure by looking at the web
address.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) Describe three of the stages a web browser goes through to detect whether a website is
secure.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2016 2210/11/M/J/16 [Turn over


Page 259 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

7 Each seat on a flight is uniquely identified on an LCD above the seat. For example, seat 035C is
shown as:

The first three characters are digits that represent the row.
The fourth character is the seat position in that row. This is a single letter, A to F, that is stored as a
hexadecimal value.

Each of the four display characters can be stored in a 4-bit register. For example, 0 and C would
be represented as:

8 4 2 1
0: 0 0 0 0
C: 1 1 0 0

(a) Show how the 4-bit registers would store the remaining two characters, 3 and 5.

[2]

(b) Identify which seat is stored in the following 4-bit registers.

0 0 0 1
1 0 0 1
0 1 0 0
1 1 1 0
[2]

© UCLES 2016 2210/11/M/J/16

Page 260 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

8 A bank offers an online service to its customers. The bank has developed a “SafeToUse” system
that asks each customer to enter four randomly chosen characters from their password each time
they log in.

The customer selects these four characters from drop-down boxes. For example:

Please select the 2nd character

5th character

6th character

8th character

(a) (i) Explain why it is more secure to use drop-down boxes rather than entering characters
using a keyboard.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Give a reason why the system asks for four characters chosen at random.

...........................................................................................................................................

.......................................................................................................................................[1]

(b) Biometrics is an additional form of security.

Give two examples of biometrics.

1 ...............................................................................................................................................

2 ...............................................................................................................................................
[2]

© UCLES 2016 2210/11/M/J/16 [Turn over


Page 261 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

9 Check digits are used to ensure the accuracy of entered data.

A 7-digit number has an extra digit on the right, called the check digit.

digit position: 1 2 3 4 5 6 7 8

digit: – – – – – – – –

check digit

The check digit is calculated as follows:

• each digit in the number is multiplied by its digit position


• the seven results are then added together
• this total is divided by 11
• the remainder gives the check digit (if the remainder = 10, the check digit is X)

(a) Calculate the check digit for the following number. Show all your working.

4 2 4 1 5 0 8 …
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Check digit ................................................................................................................................


[2]

(b) An operator has just keyed in the following number:

3 2 4 0 0 4 5 X
Circle below correct if the check digit is correct OR incorrect if the check digit is incorrect.

correct incorrect

Explain your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2016 2210/11/M/J/16

Page 262 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

10 Six security issues and six descriptions are shown below.

Draw a line to link each security issue to its correct description.

Security issue Description

illegal access to a computer system


Pharming without the owner’s consent or
knowledge

software that gathers information by


monitoring key presses on a user’s
Phishing keyboard; the data is sent back to the
originator of the software

malicious code installed on the hard


drive of a user’s computer or on a web
Viruses server; this code will re-direct the user
to a fake website without the user’s
knowledge

creator of code sends out a


legitimate-looking email in the hope
of gathering personal and financial
Hacking
information from the recipient; it
requires the user to click on the link in
the email or attachment

a message given to a web browser by


a web server; it is stored in a text file;
Spyware the message is then sent back to the
server each time the browser requests
a page from the server

program or code that replicates itself;


designed to amend, delete or copy
Cookies data or files on a user’s computer;
often causes the computer to crash or
run slowly

[5]

© UCLES 2016 2210/11/M/J/16 [Turn over


Page 263 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

11 (a) Four examples of optical storage media are:

• DVD-RW
• DVD-RAM
• CD-ROM
• Blu-ray disc

The table below shows four features of optical storage media.

Tick (✓) the appropriate boxes in the table to indicate which of the features apply to each
example of optical storage media.

Many Blue laser Red laser


Single track concentric used to read/ used to read/
tracks write data write data

DVD-RW

DVD-RAM

CD-ROM

Blu-ray disc

[4]

(b) Solid state drives (SSD) are replacing hard disc drives (HDD) in some computers.

(i) Give three reasons why this is happening.

1 .......................................................................................................................................

...........................................................................................................................................

2 .......................................................................................................................................

...........................................................................................................................................

3 .......................................................................................................................................

...........................................................................................................................................
[3]

(ii) Explain why many web servers still use hard disc drive (HDD) technology.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 2210/11/M/J/16

Page 264 of 400


Muhammad Qadeer (0333-8136280)
13 www.cs2210.blogspot.com

12 (a) Name the following type of barcode:

...............................................................................................................................................[1]

(b) The barcode in part (a) contains the denary value 2640
Convert this value to hexadecimal.

...................................................................................................................................................

...................................................................................................................................................

Write the value as a 12-bit binary number.

[4]

(c) An airport uses the type of barcode shown in part (a) to advertise local places of interest.

Describe how a visitor landing at the airport could use these barcodes to help plan their visit.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 2210/11/M/J/16

Page 265 of 400


Muhammad Qadeer (0333-8136280)
14 www.cs2210.blogspot.com

BLANK PAGE

© UCLES 2016 2210/11/M/J/16

Page 266 of 400


Muhammad Qadeer (0333-8136280)
15 www.cs2210.blogspot.com

BLANK PAGE

© UCLES 2016 2210/11/M/J/16

Page 267 of 400


Muhammad Qadeer (0333-8136280)
16 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 2210/11/M/J/16

Page 268 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/11


Paper 1 May/June 2016
MARK SCHEME
Maximum Mark: 75

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 10 printed pages.

© UCLES 2016 [Turn over

Page 269 of 400


Muhammad Qadeer (0333-8136280)
Page 2 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

1 1 mark for each correct column

Software feature Free Freeware Shareware


Software source code can be freely accessed

and modified as required
All the features of the full version of the software
are not made available; the full version needs to 
be purchased first
The original software is subject to all of the
 
copyright laws
It is possible to distribute modified versions or

copies of the software to friends and family
(1 mark) (1 mark) (1 mark)
[3]

2 (a) media access control [1]

(b) Any three from:

– hardware/physical address
– unique address/number associated (with network card in) a device/computer
– usually 48/64 bits (12/16 hex digits)
– first 6/8 digits = manufacturer code/ID of device (NIC)
– last 6/8 digits = serial number of device (NIC) [3]

© Cambridge International Examinations 2016

Page 270 of 400


Muhammad Qadeer (0333-8136280)
Page 3 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

3 (a)

Light
sensor Monitoring the pollution levels in a river

Moisture Control the switching off and on of


sensor street lighting

Gas Detection of intruders breaking into a


sensor building

pH Monitor the amount of water left in


sensor clothes in a drier

Pressure Monitor acidity levels in the soil in a


sensor greenhouse

4/5 matches – 4 marks


3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark [4]

(b) Any four from:

– sensor(s) sends signal/data to microprocessor


– signal/data converted to digital (using an ADC)
– microprocessor compares signal/data with pre-set/stored value
– if sensor(s) signal/data indicates the presence of a person / the door needs to be opened
/ a match is found / door is closed …
– … microprocessor sends a signal to an actuator …
– … to operate/drive a motor to open the door [4]

© Cambridge International Examinations 2016

Page 271 of 400


Muhammad Qadeer (0333-8136280)
Page 4 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

4 (a) (i) serial [1]

(ii) Any three from:


– automatically detects the hardware/installs drivers
– plug only goes in one way/can’t connect incorrectly
– supports different data transmission speeds/a range of data transmission speeds
– has become the industry standard/universally used
– backwards compatible (with earlier versions of USB ports) [3]

(iii) interrupt [1]

(b) 1 mark each use of printer, max 1 mark per printer.

inkjet printer – (small quantities of) documents


– photographs

3D printer – (physical) prototype (from CAD)


– (physical) model (from a blueprint) [2]

(c) 1 mark for naming printer + 1 mark for description + 1 mark for application

Laser printer

– uses toner/powder ink


– uses (positive and negative) charged drums // rotating drum
– uses static charge
– no moving head
– faster at printing
– high volume output/high speed
– producing flyers/leaflets/magazines [3]

This is an example, other types of printers can be credited.

© Cambridge International Examinations 2016

Page 272 of 400


Muhammad Qadeer (0333-8136280)
Page 5 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

5 (a) 1 mark for each correct gate, with correct source of input(s)

[6]

(b)
D S T Working Space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0

4 marks for 8 correct X bits


3 marks for 6 correct X bits
2 marks for 4 correct X bits
1 mark for 2 correct X bits [4]

© Cambridge International Examinations 2016

Page 273 of 400


Muhammad Qadeer (0333-8136280)
Page 6 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

6 (a) Any one from:

– protocol ends in “s”


– use of https [1]

(b) Any three from:

– requests web server to identify itself/view the (SSL) certificate


– receives a copy of the (SSL) certificate, sent from the webserver
– checks if SSL certificate is authentic/trustworthy
– sends signal back to webserver that the certificate is authentic/trustworthy
– starts to transmit data once connection is established as secure
– if website is not secure browser will display an open padlock/warning message [3]

7 (a) 1 mark for each correct binary value

3 0 0 1 1

5 0 1 0 1
[2]

(b)

0 0 0 1 1
1 0 0 1 9 1 mark

0 1 0 0 4
1 1 1 0 E 1 mark

[2]

© Cambridge International Examinations 2016

Page 274 of 400


Muhammad Qadeer (0333-8136280)
Page 7 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

8 (a) (i) Any two from:

– to protect against key logging software/spyware


– can stop key presses being recorded
– can stop key presses being relayed
– drop down boxes cannot be recorded as key presses
– drop down boxes can be placed in different location on the screen each time
(to overcome screen capture issues) [2]

(ii) Any one from:

– hacker never finds all characters on the first hack


– makes it more difficult for hackers to find the order of the characters
– hacker needs to hack the system several times to gain the whole password
– shoulder surfing will not give person full password [1]

(b) Any two from:

– fingerprint scanner
– face recognition software
– retina scanner/iris scanner
– voice recognition software [2]

9 (a) 1 mark for correct check digit and 1 mark for showing the calculation

(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
1 mark for any correct
line of working
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105

105/11 = 9 remainder 6

check digit is: 6 [2]

(b) incorrect check digit [1]

– check digit should be 1


– (3*1) + (2*2) + (4*3) + (0*4) + (0*5) + (4*6) + (5*7) // 3 + 4 + 12 + 0 + 0 + 24 + 35 //
Total = 78
– 78/11 gives 7 remainder 1 [2]

© Cambridge International Examinations 2016

Page 275 of 400


Muhammad Qadeer (0333-8136280)
Page 8 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

10

illegal access to a computer system


Pharming without the owner’s consent or
knowledge

software that gathers information by


Phishing monitoring key presses on a user’s
keyboard; the information is relayed back
to the originator of the software

malicious code installed on the hard drive


Viruses of a user’s computer or on a web server;
this code will re-direct the user to a fake
website without the user’s knowledge

creator of code sends out a legitimate-


looking email in the hope of gathering
Hacking personal and financial information from
the recipient; it requires the user to click
on the link in the email or attachment

a message given to a web browser by a


Spyware web server; it is stored in a text file; the
message is then sent back to the server
each time the browser requests a page
from the server

program or code that replicates itself


Cookies designed to amend, delete or copy data
or files on a user’s computer; often
causes the computer to crash or run
slowly

5/6 matches – 5 marks


4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark [5]

© Cambridge International Examinations 2016

Page 276 of 400


Muhammad Qadeer (0333-8136280)
Page 9 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

11 (a) 1 mark for each correct row

Many Blue laser Red laser


Single track concentric used to read/ used to read/
tracks write data write data

DVD-RW   1 mark

DVD-RAM   1 mark

CD-ROM   1 mark

Blu-ray disc   1 mark

[4]

(b) (i) Any three from:

– don’t need to “get up to speed” to work properly/no latency


– lower/less power consumption/more energy efficient
– run cooler
– run quieter
– data access is faster
– occupies less physical space/more compact
– lighter, so more suitable for a portable computer/laptop
– no moving parts so more reliable/durable in a portable computer/laptop [3]

(ii) Any two from:

– HDD is cheaper for larger amounts of storage space


– HDD has greater longevity for read/write functions
– Expensive to change the technology // HDD are trusted technology
– No requirement for the increased speed of SSD [2]

© Cambridge International Examinations 2016

Page 277 of 400


Muhammad Qadeer (0333-8136280)
Page 10 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

12 (a) QR (quick response) Code [1]

(b) – A 5 0 (1 mark)

1 0 1 0 0 1 0 1 0 0 0 0

1 mark 1 mark 1 mark


[4]

(c) Any three from:

- visitor scans the QR code with (the camera on) the mobile device
- App is used to read/interpret the QR code
- links to a website/opens a document …
- … to access local tourist information
- can store the QR code to refer to again for the information [3]

© Cambridge International Examinations 2016

Page 278 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
*8259318641*

COMPUTER SCIENCE 2210/13


Paper 1 Theory October/November 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

© UCLES 2015 [Turn over

Page 279 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 (a) Name an application which makes use of the following sensors. A different application should
be used in each case.

Temperature .............................................................................................................................

...................................................................................................................................................

Magnetic field ...........................................................................................................................

...................................................................................................................................................

Motion .......................................................................................................................................

...................................................................................................................................................
[3]

(b) The flowchart on the opposite page shows how a light sensor and microprocessor are used
to switch a street lamp on or off. When the sensor reading is <= 50 light units, the lamp is
turned on automatically.

Several of the instructions have been omitted from the flowchart.

Using item numbers only from the list below, complete the flowchart:

Item
Instruction
number

1 Count down in minutes

2 Is light reading <= 50?

3 Is street lamp already on?

4 Is time = 0?

5 The microprocessor compares the sensor reading with stored values

6 The sensor reading is sent to the microprocessor

7 Switch the street lamp off

8 Switch street lamp on

9 Time set to 10 minutes

[5]

© UCLES 2015 2210/13/O/N/15

Page 280 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

START

Read light
sensor

Yes

No

Yes Is street light Yes


already off?

No
No

Time set to 10
minutes

Count down in
minutes

Yes No No Is time Yes


= 0?

© UCLES 2015 2210/13/O/N/15 [Turn over


Page 281 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

2 Sensors and a microprocessor monitor a car exhaust for high temperature and high carbon
monoxide (CO) levels.

(a) Describe how the sensors and microprocessor are used to monitor the temperature and CO
levels and warn the driver if either is out of range.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) The information from seven sensors is sent to an engine management system in the car. The
status of each sensor is stored in an 8-bit register; a value of 1 indicates a fault condition:

parity bit CO level voltage airbag


too high too low fault
temperature fuel pressure oil pressure brake pads
too high too low too low too thin

For example, a register showing 01011000 indicates:

• temperature too high


• fuel pressure too low
• voltage too low

© UCLES 2015 2210/13/O/N/15

Page 282 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

(i) Identify the fault condition(s) that the following register indicates:

0 0 1 0 0 1 0 1

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) The system uses odd parity.

Write the correct parity bit in each register.

1 1 1 0 0 1 0

0 0 0 1 1 1 0
[2]

(iii) A car has a faulty airbag and the CO level is too high.

Write what should be contained in the 8-bit register.

[2]

(iv) Give the hexadecimal value of the binary number shown in part (iii).

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2015 2210/13/O/N/15 [Turn over


Page 283 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

3 A section of computer memory is shown below:

Address Contents
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100

1000 1100
1000 1101
1000 1110
1000 1111

(a) (i) The contents of memory location 1000 0001 are to be read.

Show the contents of the Memory Address Register (MAR) and the Memory Data
Register (MDR) during this read operation:

MAR

MDR

[2]

(ii) The value 0111 1001 is to be written into memory location 1000 1110.

Show the contents of the MAR and MDR during this write operation:

MAR

MDR

[2]

© UCLES 2015 2210/13/O/N/15

Page 284 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

(iii) Show any changes to the computer memory following the read and write operations in
part (a)(i) and part (a)(ii).

Address Contents
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100

1000 1100
1000 1101
1000 1110
1000 1111
[1]

(b) Name three other registers used in computers.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]

(c) The control unit is part of a computer system.

What is the function of the control unit?

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 2210/13/O/N/15 [Turn over


Page 285 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

4 (a) Computer ethics involves a number of different topics.

(i) A student made the following statement on an examination paper:

“It allows a user to have the freedom to run, copy, change and adapt the software and
then pass it on to a colleague, friend or family member.”

Identify which computer term the student was describing.

...................................................................................................................................... [1]

(ii) Explain what is meant by computer ethics.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(b) The four statements below refer to firewalls and proxy servers.

Study each statement.

Tick (9) the appropriate column(s) to indicate whether the statement refers to a firewall
and/or a proxy server.

Statement Firewall Proxy server

Speeds up access of information from a web server by


using a cache

Filters all Internet traffic coming into and out from a


user’s computer, intranet or private network

Helps to prevent malware, including viruses, from


entering a user’s computer

Keeps a list of undesirable websites and IP addresses

[4]

© UCLES 2015 2210/13/O/N/15

Page 286 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

(c) Explain three ways of preventing accidental loss or corruption of data.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2015 2210/13/O/N/15 [Turn over


Page 287 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

5 A security system records video footage. One minute of video requires 180 MB of storage. The
recording system can store several hours of video footage.

(a) Name and describe a suitable storage device for this recording system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) Calculate how much storage would be needed for 2 hours of video footage.

Show your working and give the answer in Gigabytes (GB).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 2210/13/O/N/15

Page 288 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

6 Passengers fly into an airport from other countries. The airport has a security system that uses:

• computers
• scanners
• digital cameras

To gain entry to the country, each passenger must have a passport or identification (ID) card. This
must contain a recent photograph and other personal data. The passenger must:

• place their passport or ID card on a scanner that reads machine-readable characters and
scans the photograph
• look towards a camera that takes an image of the passenger’s face

Describe how a computer checks whether the image just taken by the camera matches the
scanned photograph.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2015 2210/13/O/N/15 [Turn over


Page 289 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

7 Name a suitable output device for each of the following applications. A different device should be
used for each application.

Application Suitable output device

Production of one-off photographs of


very good quality ..................................................................................

High volume colour printing of


advertising flyers ..................................................................................

Production of an object, which is built up


layer by layer; used in CAD applications ..................................................................................

Converting electrical signals into sound


..................................................................................

Showing enlarged computer output on a


wall or large screen ..................................................................................

[5]

© UCLES 2015 2210/13/O/N/15

Page 290 of 400


Muhammad Qadeer (0333-8136280)
13 www.cs2210.blogspot.com

8 Four input devices are shown in the table below.

Give an application which makes use of each device and state a reason why the device is
appropriate for that application.

Your application must be different in each case.

Input device Application and reason

Application .............................................................................................

Reason ..................................................................................................
Light sensor
................................................................................................................

................................................................................................................

Application .............................................................................................

Reason ..................................................................................................
Keyboard
................................................................................................................

................................................................................................................

Application .............................................................................................

Reason ..................................................................................................
Barcode reader
................................................................................................................

................................................................................................................

Application .............................................................................................

Reason ..................................................................................................
Touch screen
................................................................................................................

................................................................................................................

[8]

© UCLES 2015 2210/13/O/N/15 [Turn over


Page 291 of 400
Muhammad Qadeer (0333-8136280)
14 www.cs2210.blogspot.com

9 MP3 file compression reduces the size of a music file by 90%.

(a) A music track is 80 MB in size.

Calculate the file size after compression.

...................................................................................................................................................

How many MP3 files of the size calculated above could be stored on an 800 MB CD?

...................................................................................................................................................
[2]

(b) (i) Explain how MP3 files retain most of the original music quality.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) State the type of file compression used in MP3 files.

...................................................................................................................................... [1]

(iii) Name another file compression format.

...................................................................................................................................... [1]

© UCLES 2015 2210/13/O/N/15

Page 292 of 400


Muhammad Qadeer (0333-8136280)
15 www.cs2210.blogspot.com

10 Choose five correct terms from the following list to complete the spaces in the sentences below:

• cypher text
• encryption algorithm
• encryption key
• firewall
• plain text
• proxy server
• symmetric encryption

....................................................................................... is a security system.

It uses the same ....................................................................... to encrypt and decrypt a message.

Before encryption, the message is called ...................................................................................... .

The ..................................................................................... processes the original message.

The output is known as ........................................................................... . [5]

© UCLES 2015 2210/13/O/N/15

Page 293 of 400


Muhammad Qadeer (0333-8136280)
16 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 2210/13/O/N/15

Page 294 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

CAMBRIDGE INTERNATIONAL EXAMINATIONS


Cambridge Ordinary Level

MARK SCHEME for the October/November 2015 series

2210 COMPUTER SCIENCE


2210/13 Paper 1, maximum raw mark 75

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

Page 295 of 400


Muhammad Qadeer (0333-8136280)
Page 2 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

1 (a) Temperature
– central heating / air con system
– greenhouse environment
– a chemical reaction / process

Magnetic field
– anti-lock brakes on a car
– detection of motor vehicles (e.g. at traffic lights)
– reading magnetic ink characters on cheques
– geophysical surveys

Motion
– automatic doors
– burglar alarm [3]

© Cambridge International Examinations 2015

Page 296 of 400


Muhammad Qadeer (0333-8136280)
Page 3 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

(b)

START

Read light
sensor

6
1 mark

Yes
2
1 mark
No

Yes Is street light Yes


already off? 3

No
No
Time set to 10
minutes
9/7
1 mark
8
7/9
1 mark

Count down in
minutes 1

1 mark
Yes No No Is time Yes
4 = 0?

[5]

© Cambridge International Examinations 2015

Page 297 of 400


Muhammad Qadeer (0333-8136280)
Page 4 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

2 (a) Any five from:


– sensors send signals / data to microprocessor
– signal / data converted to digital (by an ADC)
– microprocessor compares temperature / carbon monoxide level / value with stored
level / value
– if CO level > stored value, microprocessor sends signal«
– if temperature > stored value, microprocessor sends signal«
– «to light warning bulb on dashboard / sounds alarm [5]

(b) (i) 2 marks for all correct conditions, 1 mark for 2 correct conditions

CO (carbon monoxide) level too high


oil pressure too low
brake pads too thin [2]

(ii) 1 mark for each correct parity bit in position 1

1 1 1 1 0 0 1 0

0 0 0 0 1 1 1 0

[2]

(iii) 1 mark for correct parity bit + 1 mark for remainder of binary value

1 0 1 0 0 0 1 0

[2]

(iv) A 2 (allow follow through from part (iii)) [1]

3 (a) (i)

MAR 1 0 0 0 0 0 0 1

MDR 0 1 0 1 0 0 0 1

[2]

© Cambridge International Examinations 2015

Page 298 of 400


Muhammad Qadeer (0333-8136280)
Page 5 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

(ii)

MAR 1 0 0 0 1 1 1 0

MDR 0 1 1 1 1 0 0 1

[2]

(iii)
Address Contents
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100

1000 1100
1000 1101
1000 1110 0111 1001
1000 1111
[1]

(b) – CIR (Current Instruction Register)


– PC (Program Counter)
– Acc (Accumulator) [3]

(c) – Controls operation of memory, processor and input / output


– Instructions are interpreted
– Sends signals to other components telling them “what to do” [3]

4 (a) (i) Free software / open source software [1]

(ii) Any three from:


– Set of principles / laws that regulate the use of computers
– Covers intellectual property rights (e.g. copying of software)
– Privacy issues (e.g. accessing personal information)
– Impact of computers on society (relevant examples can be credited) [3]

© Cambridge International Examinations 2015

Page 299 of 400


Muhammad Qadeer (0333-8136280)
Page 6 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

(b) 1 mark for each CORRECT row

Statement Firewall Proxy server

Speeds up access of information from a web server by


9
using a cache
Filters all Internet traffic coming into and out from a
9 9
user’s computer, intranet or private network
Helps to prevent malware, including viruses, from
9
entering a user’s computer
Keeps a list of undesirable websites and IP addresses 9 9

[4]

(c) one mark for method + one mark for linked reason (maximum 6 marks)

– back up files«
– «on a regular basis / to another device / to the cloud

– set data to read only«


– «to prevent accidental editing

– save data on a regular basis«


– «to prevent loss / corruption of data in unexpected shutdown / failure

– use correct shut down / start up procedures«


– «to prevent damage to components / stored files

– use correct procedures before disconnecting portable storage device«


– «to prevent damage to device / data corruption

– keep storage devices in a safe place«


– «away from fire hazards [6]

5 (a) – Memory card / SSD / HDD / magnetic tape


– Suitable description of device given [2]

(b) 2 hours = 120 minutes


120 × 180 = 21 600
21 600 / 1024
= 21.1 GB

(1 mark for correct answer and 1 mark for correct calculation) [2]

6 Any two from:


– facial recognition software / biometric software used to scan face
– face image converted to digital format / data by the camera
– digital image formed from scanned photo / biometric data stored in passport
– key features of the face are checked / compared [2]

© Cambridge International Examinations 2015

Page 300 of 400


Muhammad Qadeer (0333-8136280)
Page 7 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

Application Suitable output device

Production of one-off photographs of inkjet printer


very good quality

High volume colour printing of


laser printer
advertising flyers

Production of an object, which is built


up layer by layer; used in CAD 3D printer
applications

Converting electrical signals into sound speaker/headphones

Showing enlarged computer output on Projector


a wall or large screen

[5]

© Cambridge International Examinations 2015

Page 301 of 400


Muhammad Qadeer (0333-8136280)
Page 8 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

8 1 mark for each named application + 1 mark for each matching reason for choice

Input device Application and reason

Automatic doors
– detects a person when light beam broken and opens doors

Light sensor Street lighting


– detects change in light and switches on / off the street lights

Greenhouse
– ensures correct lighting conditions for growth of plants
Word processor / spreadsheet / database
– need to key in data manually (e.g. report writing)
Keyboard
Control room interface
– need to manually key in data (e.g. flow speed of liquid)
Supermarket checkout
– read barcodes to find prices, description
– allows automatic stock control

Barcode reader Library system


– can track books on loan
– can link books to borrowers using barcoded cards

Airport check-ins
– barcodes on luggage to track whereabouts
Ticket / information kiosk
– easy method for public to enter data
– limited number of options

Touch screen Mobile phone / tablet


– easy method to input data
– use of icons for application selection

Control room interface


– faster / easier method to input data into system
– fewer chances of error since number of choices limited

[8]

© Cambridge International Examinations 2015

Page 302 of 400


Muhammad Qadeer (0333-8136280)
Page 9 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

9 (a) 8 MB
100 [2]

(b) (i) Any two from:


– removes sounds human ear can’t hear very well
– if two sounds played at same time, softer sound removed
– uses perceptual music shaping [2]

(ii) Lossy [1]

(iii) One from, for example:


– jpeg
– MP4
– zip
– gif [1]

10 symmetric encryption

encryption key

plain text

encryption algorithm

cypher text [5]

© Cambridge International Examinations 2015

Page 303 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
*8805434291*

COMPUTER SCIENCE 2210/12


Paper 1 Theory October/November 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 12 printed pages.

© UCLES 2015 [Turn over

Page 304 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 There are a number of security risks associated with using the Internet.

Name three of these risks. For each, state why it is a risk and describe how the risk can be
minimised.

Security risk 1 ...................................................................................................................................

Why it is a risk ..................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

How to minimise the risk ..................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Security risk 2 ...................................................................................................................................

Why it is a risk ...................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

How to minimise the risk ..................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Security risk 3 ...................................................................................................................................

Why it is a risk ..................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

How to minimise the risk ..................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

[9]

© UCLES 2015 2210/12/O/N/15

Page 305 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

2 Seven computer terms and seven descriptions are shown below.

Draw a line to link each computer term to its most appropriate description.

Computer term Description

Reduction of file size by permanently removing


Interface
some redundant information from the file

File compression format designed to make


Interrupt photo files smaller in size for storage and for
transmission

File compression system for music which does


JPEG
not noticeably affect the quality of the sound

Hardware component that allows the user to


Lossless
communicate with a computer or operating
compression
system

The file is reduced in size for transmission and


Lossy
storage; it is then put back together again later
compression
producing a file identical to the original

Signal sent to a processor which may cause


MIDI a break in execution of the current routine,
according to priorities

Standard adopted by the electronic music


MP3 format industry for controlling devices such as
synthesisers and sound cards
[6]

© UCLES 2015 2210/12/O/N/15 [Turn over


Page 306 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

3 The flowchart on the opposite page shows what happens when the barcode on a product is
scanned at the checkout in a supermarket. The barcodes are used in an automatic stock control
system.

Several of the statements in the flowchart are missing.

Using item number only from the list below, complete the flowchart.

Item
Statement
number

1 Add flag to product record to indicate re-order made

2 Any more barcodes to scan?

3 Has the scanned barcode been found in the file?

4 Has the re-order flag already been added to the product record?

5 Is number of product in stock <= re-order level?

6 Number of product in stock is reduced by 1

7 Output an error message

8 Automatically send out order for new product

© UCLES 2015 2210/12/O/N/15

Page 307 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

START

Barcode on product
is scanned END

No

Barcode is looked up Yes


in stock database

No

Yes

Yes

No Any more
barcodes
to scan? No

Yes

Yes
END

No

[4]

© UCLES 2015 2210/12/O/N/15 [Turn over


Page 308 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

4 (a) (i) Convert the following two hexadecimal numbers into binary:

FA7
D3E

FA7

D3E
[4]

(ii) Now perform the AND (logic) operation on each corresponding pair of binary bits in the
two numbers from part (i).

[2]

(iii) Convert your answer in part (ii) into hexadecimal.

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2015 2210/12/O/N/15

Page 309 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

(b) (i) The following code shows HTML ‘tag’ pairs on either side of the text stating the colour
that each creates.

<font color “ # F F 0 0 0 0 “ > RED </font>


<font color “ # 0 0 F F 0 0 “ > GREEN </font>
<font color “ # 0 0 0 0 F F “ > BLUE </font>

<font color “ # X “ > YELLOW </font>


<font color “ # Y “ > MAGENTA </font>
<font color “ # Z “ > CYAN </font>

Yellow is a combination of red and green, magenta a combination of red and blue and
cyan a combination of green and blue.

State what 6-digit hexadecimal values should replace X, Y and Z in the above code.

X ........................................................................................................................................

Y ........................................................................................................................................

Z ........................................................................................................................................
[3]

(ii) Describe how other colours, such as a darker shade of blue, are created.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

(c) 1A – 16 – C5 – 22 – FF – FF is an example of a MAC address.

(i) Identify what the first six and last six hexadecimal digits represent.

First six digits ....................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Last six digits .....................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

(ii) State why MAC addresses are used.

...........................................................................................................................................

...........................................................................................................................................
[1]

© UCLES 2015 2210/12/O/N/15 [Turn over


Page 310 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

5 A security system uses sensors, a camera and a microprocessor to capture images of each person
entering a large shopping mall.

(a) Describe how the sensors, camera and microprocessor interact to identify certain people
entering the mall.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[5]

(b) Each image taken requires 1 MB of storage. If the camera captures an image every 5 seconds
over a 24 hour period, how much storage is required?

Give your answer in gigabytes and show all your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(c) The shopping mall has over 100 cameras. At the end of each day all these cameras send
their images, captured over the last 24 hours, to a central computer.

Explain why the mall uses dedicated fibre optic cable rather than transmitting the data over
the local broadband network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2015 2210/12/O/N/15

Page 311 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

6 (a) Explain what is meant by HTML.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) HTML uses both structure and presentation.

Describe what is meant by the two terms.

Structure ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Presentation ..............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(c) Explain the function of a web browser.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 2210/12/O/N/15 [Turn over


Page 312 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

7 (a) Check digits are used to ensure the accuracy of input data.

A 7-digit code number has an extra digit on the right, called the check digit.

Digit position 1 2 3 4 5 6 7 8

Digit – – – – – – – –

The check digit is calculated as follows:

• each digit in the number is multiplied by its digit position


• the seven results are then added together
• this total is divided by 11
• the remainder gives the check digit (if the remainder = 10, the check digit is X)

(i) Calculate the check digit for the following code number. Show all your working.

4 2 4 1 5 0 8 …

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Check digit ........................................................................................................................


[2]

(ii) An operator has just keyed in the following code number:

3 2 4 0 0 4 5 X

Has the operator correctly keyed in the code number?

...........................................................................................................................................

Give a reason for your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© UCLES 2015 2210/12/O/N/15

Page 313 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

(b) When data are transmitted from one device to another, a parity check is often carried out on
each byte of data. The parity bit is often the leftmost bit in the byte.

(i) If a system uses even parity, give the parity bit for each of the following bytes:

parity bit

1 1 0 0 1 1 0

parity bit

0 0 0 0 0 0 1
[2]

(ii) A parity check can often detect corruption of a byte.

Describe a situation in which it cannot detect corruption of a byte.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

8 The steps to print a document using a laser printer are shown in the table below.

Put each step in the correct order. The first step has been done for you.

Step Order
As the printing drum rotates, a laser scans across it; this removes the
positive charge in certain areas
The printing drum is coated in positively-charged toner; this then sticks to the
negatively-charged parts of the printing drum
The paper goes through a fuser which melts the toner so it fixes permanently
to the paper
The printer driver ensures that the data is in a format that the laser printer
can understand 1

A negatively-charged sheet of paper is then rolled over the printing drum

Data is then sent to the laser printer and stored temporarily in the printer
buffer
The toner on the printing drum is now transferred to the paper to reproduce
the required text and images

The printing drum is given a positive charge

Negatively-charged areas are then produced on the printing drum; these


match exactly with the text and images to be printed

[8]
© UCLES 2015 2210/12/O/N/15 [Turn over
Page 314 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

9 A remote-controlled model car contains RAM, ROM and a solid state drive. The car receives
radio signals from its remote control. It can only receive radio signals of a certain frequency. The
manufacturer sets this frequency and the owner cannot change it. The owner of the model car can
input their own sequence of movements from an interface underneath the car.

(a) Describe the purpose of each of the three types of memory supplied with the car.

RAM ..........................................................................................................................................

...................................................................................................................................................

ROM .........................................................................................................................................

...................................................................................................................................................

Solid state drive ........................................................................................................................

...................................................................................................................................................
[3]

(b) The owner needs to be able to enter their own sequence of movements for the model car.

Name a suitable input device.

Input device ..............................................................................................................................

...................................................................................................................................................

Give a reason for your choice of device.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(c) Explain why the model car uses a solid state drive rather than another type of secondary
storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 2210/12/O/N/15

Page 315 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

CAMBRIDGE INTERNATIONAL EXAMINATIONS


Cambridge Ordinary Level

MARK SCHEME for the October/November 2015 series

2210 COMPUTER SCIENCE


2210/12 Paper 1, maximum raw mark 75

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

Page 316 of 400


Muhammad Qadeer (0333-8136280)
Page 2 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

1 1 mark for each risk + 1 mark for corresponding reason why it is a risk and 1 mark for method
of minimisation

Risk: hacking
Reason: illegal/unauthorised access to data
deletion/amendment of data
Minimised: use of passwords/user ids
use of firewalls
encrypt data/encryption

Risk: virus
Reason: can corrupt/delete data
cause computer to crash/run slow
can fill up hard drive with data
Minimised: use of /run anti-virus (software)
do not download software or data from unknown sources

Risk: spyware/key logging (software)


Reason: can read key presses/files/monitors on a user’s computer
Minimised: use of/run anti-spyware (software)
use data entry methods such as drop-down boxes to minimise risk

Risk: phishing
Reason: link/attachments takes user to fake/bogus website
website obtains personal/financial data
Minimised: do not open/click emails/attachments from unknown sources
some firewalls can detect fake/bogus websites

Risk: pharming
Reason: redirects user to fake/bogus website
redirection obtains personal/financial data
Minimised: only trust secure websites, e.g. look for https
check the URL matches the intended site

Risk: credit card fraud/identity theft


Reason: loss of money due to misuse of card/stealing data
Minimised: set passwords
encrypt data/encryption

Risk: cracking
Reason: illegal/unauthorised access to data
Minimised: setting strong passwords
encrypt data/encryption

There may be other valid answers given that are outside the provided mark scheme.
[9]

© Cambridge International Examinations 2015

Page 317 of 400


Muhammad Qadeer (0333-8136280)
Page 3 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

2
Interface Reduction of file size by permanently
removing certain, redundant information
from the file

Interrupt
File compression format designed to make
photo files smaller in size for storage and
for transmission

JPEG
File compression system for music which
does not noticeably affect the quality of the
sound

Lossless
compression Hardware component that allows the user
to communicate with a computer or
operating system

Lossy The file is reduced in size for transmission


compression and storage; it is then put back together
again later producing a file identical to the
original

MIDI Signal sent to a processor which may cause


a break in execution of the current routine,
according to priorities

MP3 format Standard adopted by the electronic music


industry for controlling devices such as
synthesisers and sound cards

[6]

© Cambridge International Examinations 2015

Page 318 of 400


Muhammad Qadeer (0333-8136280)
Page 4 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

3
[4]
START

barcode on product is
scanned END

No

Yes
barcode is looked up
in stock database
2

1 mark

No
3 7

Yes
1 mark

6
Yes

No any more
5 barcodes
No
to scan?

1 mark Yes

Yes

4 END

No

1/8

1 mark

8/1

[4]

© Cambridge International Examinations 2015

Page 319 of 400


Muhammad Qadeer (0333-8136280)
Page 5 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

4 (a) (i) For each hex number, 2 marks if all correct, 1 mark for 2 correct conversions

F A 7: 1 1 1 1 1 0 1 0 0 1 1 1

D 3 E: 1 1 0 1 0 0 1 1 1 1 1 0

[4]

(ii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through

1 1 0 1 0 0 1 0 0 1 1 0

[2]

(iii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through
D26 [2]

(b) (i) (X) FF FF 00

(Y) FF 00 FF

(Z) 00 FF FF [3]

(ii) – hex values between 0 to F are combined together to create a hex code
– different combinations in hex codes will create different shades/tones/colours [2]

(c) (i) First six digits: manufacturer code/manufacturer ID

Last six digits: serial number/serial ID of device/product [2]

(ii) Allows all devices to be uniquely identified [1]

© Cambridge International Examinations 2015

Page 320 of 400


Muhammad Qadeer (0333-8136280)
Page 6 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

5 (a) Any five from:


– naming a suitable sensor, e.g infra-red, pressure, motion sensors, send signal/data to
microprocessor
– signal/data is converted to digital (using an ADC)
– microprocessor instructs/send signals to camera to capture image/video
– captured image/video data sent to microprocessor

either
– microprocessor compares the image/video with stored images/video«
– « if person detected = stored image «
– «alert given to signal a person has been identified

or
– microprocessor compares the biometric data from an image/video with stored biometric
data for images/video «
– « if biometric data matched = stored data «
– « alert given to signal a person has been identified

– Continual/repeated process [5]

(b) 1 mark for correct calculation, 1 mark for correct answer


– number of photos = 12 × 60 × 24 = 17 280
– memory requirement = 17 280/1024 = 16.9 [2]

(c) Any two from:


– (data transmission) is faster
– more secure/safer (because it is a dedicated line)
– (fibre optic transmission) is more reliable [2]

© Cambridge International Examinations 2015

Page 321 of 400


Muhammad Qadeer (0333-8136280)
Page 7 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

6 (a) Any three from:


– hypertext mark-up language
– used to create/develop/author webpages
– translated by a browser to display webpages
– uses (opening and closing) tags to display/format content [3]

(b) Structure:
– instructs how the layout of the content is displayed

Presentation:
– instructs how the content will be formatted e.g. colour/style/CSS [2]

(c) Any three from:


– displays web page
– interprets/translates the HTML document
– interprets/translates embedded scripting, for example JavaScript
– provides functions, such as bookmarks and history
– identifies protocols, such as https, SSL [3]

7 (a) (i) 1 mark for correct check digit and 1 mark for showing the calculation

(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)

= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105

105/11 = 9 remainder 6

check digit is: 6 [2]

(ii) 1 mark
– No/incorrect check digit

2 marks
– Total is 78
– 78/11 «
– « gives 7 remainder 1
– check digit should be 1 [3]

© Cambridge International Examinations 2015

Page 322 of 400


Muhammad Qadeer (0333-8136280)
Page 8 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

(b) (i) 1 mark for each correct parity bit

parity bit

0 1 1 0 0 1 1 0

parity bit

1 0 0 0 0 0 0 1
[2]

(ii) Any one from:


– an even number of digits are changed
– a transposition error(s) has occurred [1]

8 1 mark for each step in correct order. (NOTE: Marks can be awarded for a correct sequence.)

Steps in the printing process Step order

As the printing drum rotates, a laser scans across it; this removes the
positive charge in certain areas 4
The printing drum is coated in positively-charged toner; this then sticks to
the negatively-charged parts of the printing drum 6
The paper goes through a fuser which melts the toner so it fixes
permanently to the paper 9
The printer driver ensures that the data is in a format that the laser printer
can understand (1)
A negatively-charged sheet of paper is then rolled over the printing drum 7
Data is then sent to the laser printer and stored temporarily in the printer
buffer 2
The toner on the printing drum is now transferred to the paper to
reproduce the required text and images 8
The printing drum is given a positive charge 3
Negatively-charged areas are then produced on the printing drum; these
match exactly with the text and images to be printed 5
[8]

© Cambridge International Examinations 2015

Page 323 of 400


Muhammad Qadeer (0333-8136280)
Page 9 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

9 (a) RAM
– contains instructions/program/data currently in use

ROM
any one from:
– contains the start-up/bootstrap program
– contains/stores the setting for frequency (can’t be changed)

Solid state drive


– stores the instructions/program/data (to operate the car) [3]

(b) 1 mark for device and 1 mark for corresponding reason

Device:
– touch screen
– key pad (NOT keyboard)

Reason:
– easy to use interface
– limited number of options
– small space/space is limited
– other devices such as mouse, keyboard, trackerball, « not suitable [2]

(c) Any two from:


– A solid state drive has no moving parts
– A solid state drive has faster random access
– A solid state drive has a quick start up/shut down time (reduced latency)
– A solid state drive is very small
– A solid state drive is very light
– A solid state drive consumes very little power
– A solid state drive does not generate a lot of heat (therefore safer in this application) [2]

© Cambridge International Examinations 2015

Page 324 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 9 4 7 0 5 3 9 2 0 0 *

COMPUTER SCIENCE 2210/12


Paper 1 Theory May/June 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.

This document consists of 14 printed pages and 2 blank pages.

DC (RW) 111393
© UCLES 2015 [Turn over

Page 325 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 (a) Four statements about cookies are shown in the table below.

Study each statement.

Tick (✓) to show whether the statement is true or false.

Statement True False


they are a form of spyware
they are used only in advertising
they are used to track browser use
they act in the same way as a virus
[4]

(b) Five descriptions and five security issues are shown below.

Draw a line to connect each description to the correct security issue.

Description Security issue

malicious code installed on the hard drive of a


user’s computer or on the web server; this code
hacking
will re-direct user to a fake web site without their
consent

software that gathers information by monitoring


key presses on a user’s computer and relays
pharming
the information back to the person who sent the
software

program or code that replicates itself and is


designed to amend, delete or copy data and files phishing
on a user’s computer without their consent

the act of gaining illegal access to a computer


spyware
system without the owner’s consent

creator of code sends out a legitimate-looking


email in the hope of gathering personal and
virus
financial data; it requires the recipient to follow a
link in the email or open an attachment

[4]

© UCLES 2015 2210/12/M/J/15

Page 326 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

2 The majority of mobile phones use touch screens. Three common technologies are used by
different mobile phone manufacturers.

Choose one of the following mobile phone technologies:

• resistive
• capacitive
• infrared

Chosen technology ..........................................................................................................................

(i) Describe how your chosen technology works to allow a user to make selections by touching
the screen.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(ii) Give one benefit and one drawback of your chosen technology when used on mobile phone
touch screens.

Benefit

...................................................................................................................................................

...................................................................................................................................................

Drawback

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2015 2210/12/M/J/15 [Turn over


Page 327 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

3 Four input devices, four descriptions and four applications are shown below.

Draw a line to connect each input device to its correct description. Then connect each description
to its correct application.

Input device Description Application

copies paper documents and


voice
barcode reader converts the text and pictures
recognition
into a computer-readable form

reads labels containing parallel


microphone dark and light lines using laser reading
light or LEDs; the width of each passports
line represents a binary code

detects changes in acidity


automatic stock
pH sensor levels; data is often in
control
analogue form

device that allows audio


signals to be converted into
monitor soil in a
scanner electric signals; these can be
greenhouse
interpreted by a computer after
being converted into digital form
[6]

© UCLES 2015 2210/12/M/J/15

Page 328 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

4 (a) State what is meant by the term SSL.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(b) The following stages take place when a user wishes to access a secure website.

Put each stage in sequence by writing the numbers 1 to 6 in the column on the right. The first
one has been done for you.

Sequence
Stage
number

the encrypted data is then shared securely between the web browser
and the web server

the web browser attempts to connect to a website which is secured by


SSL 1

the web server sends the web browser a copy of its SSL certificate

the web browser requests the web server to identify itself

the web server will then send back some form of acknowledgement to
allow the SSL encrypted session to begin

the web browser checks whether the SSL certificate is trustworthy; if it


is, then the web browser sends a message back to the web server
[5]

© UCLES 2015 2210/12/M/J/15 [Turn over


Page 329 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

5 Parity checks are often used to check for errors that may occur during data transmission.

(a) A system uses even parity.

Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.

Received byte Byte transmitted correctly Byte transmitted incorrectly

11001000

01111100

01101001

[3]

(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.

The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per
character). A tenth byte, the parity byte, was also transmitted.

The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.

letter column column column column column column column column


1 2 3 4 5 6 7 8
byte 1 F 1 0 1 0 0 1 1 0
byte 2 L 1 0 1 0 1 1 0 0
byte 3 O 1 0 1 0 1 1 1 1
byte 4 W 1 0 1 1 0 1 1 1
byte 5 C 1 0 1 0 0 0 1 1
byte 6 H 0 0 1 0 1 0 0 0
byte 7 A 0 0 1 0 0 1 0 1
byte 8 R 1 0 1 1 0 0 1 0
byte 9 T 1 0 1 1 0 1 0 0
parity
1 0 1 1 1 1 1 0
byte

(i) One of the bits has been transmitted incorrectly.

Write the byte number and column number of this bit:

Byte number ......................................................................................................................

Column number .................................................................................................................


[2]

© UCLES 2015 2210/12/M/J/15

Page 330 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

(ii) Explain how you arrived at your answer for part (b)(i).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(c) Give the denary (base 10) value of the byte: 1 0111110
...................................................................................................................................................

...............................................................................................................................................[1]

(d) A parity check may not identify that a bit has been transmitted incorrectly.

Describe one situation in which this could occur.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2015 2210/12/M/J/15 [Turn over


Page 331 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

6 A gas fire has a safety circuit made up of logic gates. It generates an alarm (X = 1) in response to
certain conditions.

Binary
Input Description Conditions
value
1 gas pressure is correct
G gas pressure
0 gas pressure is too high
1 carbon monoxide level is correct
C carbon monoxide level
0 carbon monoxide level is too high
1 no gas leak is detected
L gas leak detection
0 gas leak is detected

The output X = 1 is generated under the following conditions:

gas pressure is correct AND carbon monoxide level is too high

OR

carbon monoxide level is correct AND gas leak is detected

(a) Draw a logic circuit for this safety system.

&
;

[5]

© UCLES 2015 2210/12/M/J/15

Page 332 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

(b) Complete the truth table for the safety system.

Workspace
G C L X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[4]

(c) Complete the truth table for the XOR gate:

A B C

0 0

0 1

1 0

1 1

[1]

© UCLES 2015 2210/12/M/J/15 [Turn over


Page 333 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

7 (a) Street lighting is controlled automatically. A light sensor and a microprocessor are used to
decide when to switch each street light on or off.

Describe how the sensor, microprocessor and light interact to switch the street light on or off.

Include in your answer how the microprocessor stops the street lights being frequently
switched on and off due to brief changes in the light intensity.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Name three different sensors (other than light and pH) and describe an application for each
of these sensors.

A different application is needed for each sensor.

Sensor 1 ...................................................................................................................................

Application ................................................................................................................................

...................................................................................................................................................

Sensor 2 ...................................................................................................................................

Application ................................................................................................................................

...................................................................................................................................................

Sensor 3 ...................................................................................................................................

Application ................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2015 2210/12/M/J/15

Page 334 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

8 Five computing terms are described below.

Write the name of the term being described.

Software that anyone can download for free from the Internet
and then use without having to pay any fees. The usual
copyright laws apply and a user license is important.
................................................

Software that gives the user the chance to try it out free of
charge before actually buying it. The software is subject to the
usual copyright laws. As a rule, not all the features found in the
full version are available at this stage.
................................................

Software where users have freedom to run, copy, change and


adapt it. This is an issue of liberty and not of price since the
software guarantees freedom and the right to study and modify
the software by having access to the actual source code.
................................................

Set of principles that regulates the use of computers in


everyday life. This covers intellectual property rights, privacy
issues and the effects of computers on society in general.
................................................

The taking of somebody’s idea or software and claim that the


idea or software code were created by the “taker”.
................................................
[5]

© UCLES 2015 2210/12/M/J/15 [Turn over


Page 335 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

9 (a) Five statements about interpreters and compilers are shown in the table below.

Study each statement.

Tick (✓) to show whether the statement refers to an interpreter or to a compiler.

Statement Interpreter Compiler

creates an executable file that runs directly on the


computer

more likely to crash the computer since the machine


code produced runs directly on the processor

easier to debug since each line of code is analysed


and checked before being executed

slow speed of execution of program loops

it is more difficult to modify the executable code,


since it is in machine code format
[5]

(b) State why a compiler or an interpreter is needed when running a high-level program on a
computer.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Give one benefit of writing a program in a high-level language.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(d) Give one benefit of writing a program in a low-level language.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2015 2210/12/M/J/15

Page 336 of 400


Muhammad Qadeer (0333-8136280)
13 www.cs2210.blogspot.com

(e) Study the following three sections of code.

A: 1 0 1 0 1 1 0 1
1 1 0 0 1 1 1 0
1 0 1 1 0 1 1 1

B: LDA X
INC X
STA Y

C: FOR x ← 1 TO 10
READ n
ENDFOR

Identify, using the letters A, B or C, which of the above codes is an example of assembly
code, high-level language code or machine code:

Assembly code .........................................................................................................................

High-level language code .........................................................................................................

Machine code ...........................................................................................................................


[2]

© UCLES 2015 2210/12/M/J/15 [Turn over


Page 337 of 400
Muhammad Qadeer (0333-8136280)
14 www.cs2210.blogspot.com

10 Letters from the alphabet are represented in a computer by the following denary (base 10) values:

A = 97
G = 103
I = 105
L = 108
N = 110

The word “A L I G N” is stored as: 97 108 105 103 110

(a) Convert each of the five values to binary. The first one has been done for you.

Letter Denary value

A (97): 0 1 1 0 0 0 0 1
L (108):

I (105):

G (103):

N (110):
[2]

(b) An encryption system works by shifting the binary value for a letter one place to the left. “A”
then becomes:

1 1 0 0 0 0 1 0
This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:

C 2

For the two letters “L” and “G”, shift the binary values one place to the left and convert these
values into hexadecimal:

hexadecimal

L: .............................................

G: .............................................
[4]

© UCLES 2015 2210/12/M/J/15

Page 338 of 400


Muhammad Qadeer (0333-8136280)
15 www.cs2210.blogspot.com

BLANK PAGE

© UCLES 2015 2210/12/M/J/15

Page 339 of 400


Muhammad Qadeer (0333-8136280)
16 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 2210/12/M/J/15

Page 340 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

CAMBRIDGE INTERNATIONAL EXAMINATIONS


Cambridge Ordinary Level

MARK SCHEME for the May/June 2015 series

2210 COMPUTER SCIENCE


2210/12 Paper 1, maximum raw mark 75

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

Page 341 of 400


Muhammad Qadeer (0333-8136280)
Page 2 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

1 (a) 1 mark per correctly placed tick


Statement True False

they are a form of spyware 

they are used in advertising only 

they are used to track the browsing of a user 

they act in the same way as a virus 


[4]

(b)

malicious code installed on the hard drive of a


user’s computer or on the web server; this code hacking
will re-direct user to a fake web site without their
consent

software that gathers information by monitoring


key presses on a user’s computer and relays the pharming
information back to the person who sent the
software

program or code that replicates itself and is


designed to amend/delete/copy data and files on phishing
a user’s computer without their consent

the act of gaining illegal access to a computer spyware


system without the owner’s consent

creator of code sends out a legitimate-looking


email in the hope of gathering personal and
virus
financial data from the recipient; it requires the
email or attachment to be opened first

4/5 matches – 4 marks


3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[4]

© Cambridge International Examinations 2015

Page 342 of 400


Muhammad Qadeer (0333-8136280)
Page 3 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

2 (i) Either of the three options, resistive, capacitive or infra-red must be chosen
maximum of two marks from chosen technology:
resistive
− uses multiple layers of material …
− … that transmit electric currents
− when the top layer/screen is pushed/touched into the lower/bottom layer …
− … the electric current changes and location of “touch” is found

capacitive
− current sent/flows out from all 4 corners of the screen
− when finger/stylus touches screen, the current changes
− the location of “touch” is calculated
infra-red
− an “invisible” grid on the screen (pattern of infra-red LED beams)
− sensors detect where the screen has been touched through a break in an infrared
beam(s)
− the position where the screen touched is calculated [2]

(ii) 1 mark for benefit, 1 mark for drawback


Resistive

benefits:
− inexpensive/cheap to manufacture
− can use stylus/finger/gloved finger/pen
drawbacks:
− poor visibility in sunlight
− vulnerable to scratching
− wears through time
− does not allow multi-touch facility

capacitive

benefits:
− good visibility in sunlight
− (very) durable surface
− allows multi-touch facility
drawbacks:
− screen (glass) will shatter/break/crack (on impact)
− cannot use when wearing (standard) gloves
infra-red
benefits:
− good durability
− allows multi-touch facility
− can use stylus/finger/gloved finger/pen
drawbacks:
− expensive to manufacture
− screen (glass) will shatter/break/crack (on impact)
− sensitive to dust/dirt [2]

© Cambridge International Examinations 2015

Page 343 of 400


Muhammad Qadeer (0333-8136280)
Page 4 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

copies paper
barcode documents and voice
reader converts the text and recognition
pictures into a
computer-readable form

reads labels containing


parallel dark and light
microphone reading
lines using laser light;
passports
the width of each line
represents a binary
code

detects changes in
pH sensor automatic
acidity levels; data is
stock control
often in analogue form

audio device that allows


audio signals to be
converted into electric monitor soil in
scanner signals which can be a greenhouse
interpreted by a
computer after being
converted into digital

Input Device to Description Description to Application


3/4 matches – 3 marks 3/4 matches – 3 marks
2 matches – 2 marks 2 matches – 2 marks
1 match – 1 mark 1 match – 1 mark

[6]

© Cambridge International Examinations 2015

Page 344 of 400


Muhammad Qadeer (0333-8136280)
Page 5 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

4 (a) Any one from:

− secure sockets layer


− encrypts data being transmitted
− use of https
− use public and private keys
[1]

(b) 1 mark for each number in the correct order, next to the correct stage.

Sequence
Stage
number

the encrypted data is then shared securely between the web browser and the
6
web server

the web browser attempts to connect to a web site which is secured by SSL (1)

the web server sends the web browser a copy of its SSL certificate 3

the web browser requests the web server to identify itself 2

the web server will then send back some form of acknowledgement to allow the
5
SSL encrypted session to begin

the web browser checks whether the SSL certificate is trustworthy; if it is then
4
the web browser sends a message back to the web server

[5]

© Cambridge International Examinations 2015

Page 345 of 400


Muhammad Qadeer (0333-8136280)
Page 6 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

5 (a) 1 mark per correctly placed tick

Received byte Byte transmitted correctly Byte transmitted incorrectly

11001000 

01111100 

01101001 

[3]

(b) (i) byte number: 7

column number: 6
[2]

(ii) Any two from:

− letter “A”(byte 7) transmitted as odd parity (three 1s)


− column 6 has odd parity (seven 1s)
− intersection of byte 7 and column 6 indicates incorrect bit value
[2]

(c) 190
[1]

(d) Any one from:

− 2 bits interchanged (e.g. 1 → 0 and 0 → 1) that won’t change parity value


− even number of bits/digits are transposed
− If there are multiple errors in the same byte/column, that still produce the same parity bit,
the error will not be detected
[1]

© Cambridge International Examinations 2015

Page 346 of 400


Muhammad Qadeer (0333-8136280)
Page 7 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

6 (a) 1 mark per correct logic gate, correctly connected

C X

[5]

(b)

G C L Workspace X

0 0 0 0

0 0 1 0
] 1 mark
0 1 0 1

0 1 1 0
] 1 mark
1 0 0 1

1 0 1 1
] 1 mark
1 1 0 1

1 1 1 0
] 1 mark

[4]

© Cambridge International Examinations 2015

Page 347 of 400


Muhammad Qadeer (0333-8136280)
Page 8 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

(c) 1 mark for correctly completed truth table

A B C

0 0 0

0 1 1

1 0 1

1 1 0
[1]

7 (a) Maximum 5 marks in total for question part

Description of how street light is controlled: (max 4 marks)

− sensor sends signal/data to the microprocessor


− signal/data converted to digital/using ADC
− microprocessor compares value to a stored value
− if input value < stored value …
− … signal sent from microprocessor to actuator
− … and light is switched on/off
− whole process continues in an infinite loop

Avoiding frequent on/off switches: (max 2 marks)

− microprocessor continues to keep light on/off for a pre-determined period


− after pre-determined period, sensor output is again sampled

[5]

© Cambridge International Examinations 2015

Page 348 of 400


Muhammad Qadeer (0333-8136280)
Page 9 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

(b) 1 mark for correct sensor, 1 mark for its matching application
(all THREE applications must be different)

sensor application

infra-red/motion automatic doors


burglar alarm systems

temperature chemical process


central heating/air con system
greenhouse environment
oven

sound/acoustic burglar alarm systems


leak detection system
disco lighting

moisture/humidity clothes drier


environmental control (greenhouse, air con)

pressure burglar alarm system


traffic light control
chemical process

carbon dioxide/ pollution monitoring in a river


oxygen/gas greenhouse environment (growth control)
confined area (e.g. space craft)
Fish tank/Aquarium

magnetic field mobile phone


anti-lock braking
CD players

[6]

8 1 mark per correct word

Freeware

Shareware

Free software

(Computer) Ethics

Plagiarism
[5]

© Cambridge International Examinations 2015

Page 349 of 400


Muhammad Qadeer (0333-8136280)
Page 10 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

9 (a) 1 mark per correctly placed tick

statement interpreter compiler

creates an executable file that runs directly on the computer 

more likely to crash the computer since the machine code



produced runs directly on the processor

easier to debug since each line of code is analysed and



checked before being executed

slow speed of execution of program loops 

it is more difficult to modify the code since the executable



code is now in machine code format

[5]

(b) Any one from:

− code is required to be converted into machine code/binary


− code needs to be produced that can be understood by the computer
[1]

(c) Any one from:

− close to English/native/human language


− easier/faster to correct errors/read/write
− works on many different machines/operating systems (portable)
[1]

(d) Any one from:

− work directly on registers/CPU


− more control over what happens in computer
− can use machine specific functions
[1]

(e) 1 mark per correct letter, maximum 2 marks


Assembly code: B
High-level language code: C
Machine code: A
[2]

© Cambridge International Examinations 2015

Page 350 of 400


Muhammad Qadeer (0333-8136280)
Page 11 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

10 (a) 1 mark for two correct lines, 2 marks for four correct lines

L (108): 0 1 1 0 1 1 0 0

I (105): 0 1 1 0 1 0 0 1

G (103): 0 1 1 0 0 1 1 1

N (110): 0 1 1 0 1 1 1 0
[2]

(b) 1 mark for each correct binary value


1 mark for each correct hexadecimal value
hexidecimal

L: 1 1 0 1 1 0 0 0 D8

G: 1 1 0 0 1 1 1 0 CE
[4]

© Cambridge International Examinations 2015

Page 351 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
* 0 7 5 8 6 0 9 9 9 5 *

COMPUTER SCIENCE 2210/11


Paper 1 Theory May/June 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 15 printed pages and 1 blank page.

DC (LEG/CGW) 111631
© UCLES 2015 [Turn over

Page 352 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 (a) State what is meant by the terms:

Parallel data transmission .........................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Serial data transmission ...........................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) Give one benefit of each type of data transmission.

Parallel data transmission

Benefit .......................................................................................................................................

...................................................................................................................................................

Serial data transmission

Benefit .......................................................................................................................................

...................................................................................................................................................
[2]

(c) Give one application of each type of data transmission. Each application must be different.

Parallel data transmission

Application ................................................................................................................................

...................................................................................................................................................

Serial data transmission

Application ................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2015 2210/11/M/J/15

Page 353 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

2 (a) State what is meant by the term USB.

...................................................................................................................................................

...................................................................................................................................................
[1]

(b) Describe two benefits of using USB connections between a computer and a device.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2015 2210/11/M/J/15 [Turn over


Page 354 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

3 (a) Complete the truth table for the following logic circuit:

Workspace
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2015 2210/11/M/J/15

Page 355 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

(b) Draw a logic circuit which corresponds to the following logic statement:

X = 1 if ((A is NOT 1 OR B is 1) AND C is 1) OR (B is NOT 1 AND C is 1)

B X

[3]

(c) Write a logic statement which corresponds to the following logic circuit:

A
B

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2015 2210/11/M/J/15 [Turn over


Page 356 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

4 Choose six correct terms from the following list to complete the spaces in the paragraphs below:

• encryption
• file name
• firewall
• HTML tags/text
• IP address
• protocol
• proxy server
• SSL certificate
• web server name

A user enters a URL. The web browser breaks up the URL into three components:

1 ........................................................

2 ........................................................

3 ........................................................

The web server returns the selected web page.

The web browser reads the ............................................................ from the selected page and

shows the correctly formatted page on the user’s screen.

A ............................................................ is used between the user’s computer and the network to

examine the data traffic to make sure it meets certain criteria.

To speed up the access to the web pages next time, a ............................................................ is

used between the computer and web server; this device uses a cache to store the website home

page after it has been accessed for the first time.


[6]

© UCLES 2015 2210/11/M/J/15

Page 357 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

5 Five storage devices are described in the table below.

In column 2, name the storage device being described.

In columns 3, 4, or 5, tick () to show the appropriate category of storage.

1 2 3 4 5

Name of Category of storage


Description of storage device
storage device Primary Secondary Off-line
optical media which use one spiral
track; red lasers are used to read
and write data on the media surface;
makes use of dual-layering technology
to increase the storage capacity
non-volatile memory chip; contents of
the chip cannot be altered; it is often
used to store the start up routines in a
computer (e.g. the BIOS)
optical media which use concentric
tracks to store the data; this allows
read and write operations to be carried
out at the same time
non-volatile memory device which
uses NAND flash memories (which
consist of millions of transistors wired
in series on single circuit boards)
optical media which use blue laser
technology to read and write data on
the media surface; it uses a single
1.1 mm polycarbonate disc

[10]

© UCLES 2015 2210/11/M/J/15 [Turn over


Page 358 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

6 (a) Viruses, pharming and phishing are all examples of potential Internet security issues.

Explain what is meant by each of these three terms.

Virus .........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Pharming ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Phishing ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

(b) An online bank requires a client to supply an 8-digit code each time they wish to access their
account on the bank’s website.

Rather than ask the client to use a keyboard, they are requested
to use an on-screen keypad (shown on the right) to input the 2 5 1
8-digit code.
6 8 3
The position of the digits on the keypad can change each time
the website is visited. 9 0 4

The client uses a mouse or touch screen to select each of the 7


8 digits.

(i) Explain why the bank has chosen to use this method of entering the 8 digits.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2015 2210/11/M/J/15

Page 359 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

(ii) Name and describe another measure that the bank could introduce to improve the
security of their website.

Name .................................................................................................................................

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

© UCLES 2015 2210/11/M/J/15 [Turn over


Page 360 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

7 (a) One of the key features of von Neumann computer architecture is the use of buses.

Three buses and three descriptions are shown below.

Draw a line to connect each bus to its correct description.

Bus Description

this bus carries signals used


address bus to coordinate the computer’s
activities

this bi-directional bus is used


to exchange data between
control bus
processor, memory and input/
output devices

this uni-directional bus carries


signals relating to memory
data bus
addresses between processor
and memory
[2]

© UCLES 2015 2210/11/M/J/15

Page 361 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

(b) The seven stages in a von Neumann fetch-execute cycle are shown in the table below.

Put each stage in the correct sequence by writing the numbers 1 to 7 in the right hand column.
The first one has been done for you.

Sequence
Stage
number
the instruction is then copied from the memory location contained
in the MAR (memory address register) and is placed in the MDR
(memory data register)

the instruction is finally decoded and is then executed

the PC (program counter) contains the address of the next instruction


to be fetched 1
the entire instruction is then copied from the MDR (memory data
register) and placed in the CIR (current instruction register)

the address contained in the PC (program counter) is copied to the


MAR (memory address register) via the address bus

the address part of the instruction, if any, is placed in the MAR


(memory address register)

the value in the PC (program counter) is then incremented so that it


points to the next instruction to be fetched

[6]

© UCLES 2015 2210/11/M/J/15 [Turn over


Page 362 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

8 An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is represented
by an 8-bit register, A, and the number of minutes is represented by another 8-bit register, B.

(a) Identify what time is represented by the following two 8-bit registers.

A B
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1

0 0 0 1 0 0 1 0 : 0 0 1 1 0 1 0 1

Hours ............................................ Minutes .........................................

[2]

(b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the
hours and minutes of the alarm time.

Show how 07:30 would be represented by these two registers:

C D

Hours Minutes

[2]

(c) Describe how the microprocessor can determine when to sound the clock alarm.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 2210/11/M/J/15

Page 363 of 400


Muhammad Qadeer (0333-8136280)
13 www.cs2210.blogspot.com

(d) The LCD (liquid crystal display) on the clock face is back-lit using blue LEDs (light emitting
diodes). The brightness of the clock face is determined by the level of light in the room. The
amount of light given out by the LEDs is controlled by a control circuit.

Describe how the sensor, microprocessor and LEDs are used to maintain the correct
brightness of the clock face.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(e) Modern LCD monitors and televisions use LED back-lit technology.

Give two advantages of using this new technology compared to the older cold cathode
fluorescent lamp (CCFL) method.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2015 2210/11/M/J/15 [Turn over


Page 364 of 400
Muhammad Qadeer (0333-8136280)
14 www.cs2210.blogspot.com

9 Draw a line to connect each question to the correct answer.

Question Answer

What is the denary (base 10)


equivalent to the hexadecimal 8
digit E?

If 1 GB = 2x then what is the


value of X? 12

How many bits are there in one


byte? 14

If the broadband data download


rate is 40 megabits per second,
how many seconds will it take to 19
download a 60 MB file?

What is the denary (base 10)


value of the binary number
30
00100100?

What hexadecimal value


is obtained when the two
hexadecimal digits C and D 36
are added together?

[5]

© UCLES 2015 2210/11/M/J/15

Page 365 of 400


Muhammad Qadeer (0333-8136280)
15 www.cs2210.blogspot.com

10 Five statements about interpreters and compilers are shown in the table below.

Study each statement.

Tick () to show whether the statement refers to an interpreter or to a compiler.

Statement Interpreter Compiler

takes one statement at a time and executes it

generates an error report at the end of translation of the


whole program
stops the translation process as soon as the first error is
encountered

slow speed of execution of program loops

translates the entire program in one go

[5]

© UCLES 2015 2210/11/M/J/15

Page 366 of 400


Muhammad Qadeer (0333-8136280)
16 www.cs2210.blogspot.com

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 2210/11/M/J/15

Page 367 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

CAMBRIDGE INTERNATIONAL EXAMINATIONS


Cambridge Ordinary Level

MARK SCHEME for the May/June 2015 series

2210 COMPUTER SCIENCE


2210/11 Paper 1, maximum raw mark 75

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

Page 368 of 400


Muhammad Qadeer (0333-8136280)
Page 2 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

1 (a) parallel

any one from:

– 8 bits/1 byte/multiple bits sent at a time


– using many/multiple/8 wires/lines (1 mark)

serial

any one from:

– one bit sent at a time


– over a single wire (1 mark) [2]

(b) parallel

– faster rate of data transmission (1 mark)

serial

any one from:

– more accurate/fewer errors over a longer distance


– less expensive wiring
– less chance of data being skewed/out of synchronisation/order (1 mark) [2]

(c) parallel

any one from:

– sending data from a computer to a printer


– internal data transfer (buses) (1 mark)

serial

– connect computer to a modem (1 mark) [2]

© Cambridge International Examinations 2015

Page 369 of 400


Muhammad Qadeer (0333-8136280)
Page 3 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

2 (a) – universal serial bus


– description of USB [1]

(b) Any two from:

– devices are automatically detected and configured when initially attached


– impossible to connect device incorrectly/connector only fits one way
– has become the industry standard
– supports multiple data transmission speeds
– lots of support base for USB software developers
– supported by many operating systems
– backward compatible
– faster transmission compared to wireless [2]

3 (a)

Working
A B C X

1
0 0 0
] 1 mark
0
0 0 1

0
0 1 0
] 1 mark
0
0 1 1

0
1 0 0
] 1 mark
1
1 0 1

1
1 1 0
] 1 mark
1
1 1 1

[4]

© Cambridge International Examinations 2015

Page 370 of 400


Muhammad Qadeer (0333-8136280)
Page 4 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

(b) 1 mark per dotted section

[3]

(c) X is 1 if:

(A is 1 OR B is 1) (1 mark)

AND (1 mark)

(B is 1 OR C is NOT 1) (1 mark)

accept equivalent ways of writing this:

e.g. (A OR B = 1) AND (B OR NOT C = 1)

e.g. (A OR B) AND (B OR NOT C)

e.g. (A + B) (B + C) [3]

© Cambridge International Examinations 2015

Page 371 of 400


Muhammad Qadeer (0333-8136280)
Page 5 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

4 1 mark per correct word

1 protocol

2 web server name accept these three items in any order

3 file name

HTML tags/text

firewall

proxy server
[6]

5 1 mark per device, 1 mark per category

Description of storage device Name of Category of storage


storage device
Primary Secondary Off-line

optical media which uses one spiral


track; red lasers are used to read and
DVD
write data on the media surface; makes 
use of dual-layering technology to
increase the storage capacity

non-volatile memory chip; contents of


the chip cannot be altered; it is often
ROM 
used to store the start-up routines in a
computer (e.g. the BIOS)

optical media which uses concentric


tracks to store the data; this allows read
DVD-RAM  ()
and write operations to be carried out at
the same time

non-volatile memory device that uses Solid State


NAND flash memories (which consist of Drive/memory 
millions of transistors wired in series on (SSD)
single circuit boards)
(SD/XD card)
(USB storage
()
device)

optical media that uses blue laser


technology to read and write data on Blue-ray

the media surface; it uses a single 1.1
mm polycarbonate disc

[10]

© Cambridge International Examinations 2015

Page 372 of 400


Muhammad Qadeer (0333-8136280)
Page 6 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

6 (a) virus

any two from:

– program/software that replicates/copies itself


– can delete or alter files/data stored on a computer
– can make the computer “crash”/run slow

pharming

any two from:

– malicious code/software installed on a user’s hard drive/actual web server


– this code redirects user to a fake website (without their knowledge)
– to obtain personal/financial information/data

phishing

any two from:

– legitimate-looking emails sent to a user


– as soon as recipient opens/clicks on link in the email/attachment …
– … the user is directed to a fake website (without their knowledge)
– To obtain personal/financial information/data

[6]

(b) (i) Any two from:

– spyware/key logging software can only pick up key presses

– using mouse/touchscreen means no key presses to log

– the numbers on the key pad are in random/non-standard format,


which makes it more difficult to interpret [2]

© Cambridge International Examinations 2015

Page 373 of 400


Muhammad Qadeer (0333-8136280)
Page 7 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

(ii) 1 mark for name and 1 mark for description

any one from:

chip and PIN reader


– only the user and the bank know which codes can be generated

request user name


– additional security together with password/PIN

anti-virus
– removes/warns of a potential virus threat which can’t be passed on to
customers

firewall
– (helps) to protect bank computers from virus threats and hacking

encryption
– protects customer data by making any hacked information unreadable

security protocol
– governs the secure transmission of data

Biometric
– to recognise user through the use of, e.g. facial/retina/finger print

Alerts
– users IP/MAC address is registered and user is alerted through, e.g. SMS if
account is accessed through an unregistered address
[2]

7 (a)
this bus carries signals used to
address bus coordinate the computer’s
activities

this bi-directional bus is used to


exchange data between
control bus processor, memory and
input/output devices

this uni-directional bus carries


signals relating to memory
data bus
addresses between processor
and memory

2/3 matches – 2 marks


1 match – 1 mark
[2]

© Cambridge International Examinations 2015

Page 374 of 400


Muhammad Qadeer (0333-8136280)
Page 8 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

(b)

description of stage sequence


number

the instruction is then copied from the memory location contained in the
MAR (memory address register) and is placed in the MDR (memory data 3
register)

the instruction is finally decoded and is then executed 7

the PC (program counter) contains the address of the next instruction to be (1)
fetched

the entire instruction is then copied from the MDR (memory data register)
4
and placed in the CIR (current instruction register)

the address contained in the PC (program counter) is copied to the MAR


2
(memory address register) via the address bus

the address part of the instruction is placed in the MAR (memory address
6
register)

the value in the PC (program counter) is then incremented so that it points


5*
to the next instruction to be fetched

The incrementation of the program counter can appear at any stage after 2. All other
stages must be in the correct given order. [6]

8 (a) hours: 18

minutes: 53 [2]

(b)

hours (“C”) minutes (“D”)

0 0 0 0 0 1 1 1 : 0 0 0 1 1 1 1 0

[2]

© Cambridge International Examinations 2015

Page 375 of 400


Muhammad Qadeer (0333-8136280)
Page 9 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

(c) Any three from:

– reads values in registers “C” and “D”

– and checks the values against those stored in registers “A” and “B”
(NOTE: the first two statements can be interchanged, i.e. “A” and “B” read first)

– If values in corresponding registers are the same

– the microprocessor sends a signal to sound alarm/ring [3]

(d) Any three from:

– uses a light sensor

– sends signal/data back to microprocessor

– signal/data converted to digital (using ADC)

– value compared by microprocessor with pre-set/stored value

– if value < stored value, signal sent by microprocessor …

– … to the voltage supply (unit)

– … “value” of signal determines voltage supplied/brightness of LED [3]

(e) Any two from:

– no need to warm up

– whiter tint/more vivid colours/brighter image

– higher resolution

– much thinner monitors possible/lighter weight

– more reliable technology/longer lasting

– uses much less power/more efficient [2]

© Cambridge International Examinations 2015

Page 376 of 400


Muhammad Qadeer (0333-8136280)
Page 10 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

What is the denary (base 10)


equivalent to the hexadecimal
digit “E”? 8

x
If 1 GByte = 2
value of X?
then what is the
12

The number of bits in one byte 14

If the broadband data download


rate is 40 megabits/ second; how
long will it take to download a 60 19
MByte file?

What is the denary (base 10)


value of the binary number:
30
0 0 1 0 0 1 0 0?

What hexadecimal value is


obtained when the two
hexadecimal digits, C and D, are 36
added together?

5/6 matches – 5 marks


4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[5]

© Cambridge International Examinations 2015

Page 377 of 400


Muhammad Qadeer (0333-8136280)
Page 11 Mark Scheme www.cs2210.blogspot.com
Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

10 1 mark per correctly placed tick

statement interpreter compiler

takes one statement at a time and executes it 

generates an error report at the end of translation of the



whole program

stops the translation process as soon as the first error is



encountered

slow speed of execution of program loops 

translates the entire program in one go 

[5]

© Cambridge International Examinations 2015

Page 378 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level
*0123456789*

COMPUTER SCIENCE 2210/01


Paper 1 Theory For Examination from 2016
SPECIMEN PAPER
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Calculators must not be used in this paper.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.

This document consists of 14 printed pages.

© UCLES 2014 [Turn over

Page 379 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 A company selling CDs uses a unique 6-digit identification number for each CD title. The right-
most digit (position 1) is a check digit.

For example,
6 5 4 3 2 1 digit position
3 0 6 1 4 9 identification number

check digit

The validity of the number and check digit is calculated as follows:

• multiply each digit by its digit position


• add up the results of the multiplications
• divide the answer by 11
• if the remainder is 0, the identification number and check digit are valid.

(a) Show whether the following identification numbers are valid or not. You must show how you
arrived at your answer.

Identification number 1: 4 2 1 9 2 3

working:

valid or not valid?

Identification number 2: 8 2 0 1 5 6

working:

valid or not valid? [3]

© UCLES 2014 2210/01/SP/16

Page 380 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

(b) Find the check digit for this identification number.

5 0 2 4 1 __

working:

check digit: [2]

(c) Describe, with examples, two different types of data entry errors that a check digit would
detect.

[2]

2 Kamil is setting up a new computer system to record television programmes. He wants to be able
to record, view and then erase programmes that he does not want to keep. He has chosen to use
DVD-RAM as an optical storage medium.

Explain to Kamil why it is better to use DVD-RAM rather than DVD+RW or DVD-RW.

[2]

© UCLES 2014 2210/01/SP/16 [Turn over


Page 381 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

3 An alarm, Y, sends a signal (Y = 1) when certain fault conditions in a chemical process are
detected. The inputs are:

Input Binary value Condition

1 acidity > 5
A
0 acidity <= 5

1 temperature >= 120UC


T
0 temperature < 120UC

1 stirrer bar ON
S
0 stirrer bar OFF

The alarm, Y, returns a value of 1 if:

either temperature >= 120UC AND stirrer bar is OFF

or acidity > 5 AND temperature < 120UC

(a) Draw the logic circuit for the above system using these logic gates.

NOT AND OR

T Y

[5]

© UCLES 2014 2210/01/SP/16

Page 382 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

(b) Complete the truth table for this alarm system.

A T S Y

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2014 2210/01/SP/16 [Turn over


Page 383 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

4 A digital alarm clock is controlled by a microprocessor. It uses the 24-hour clock system (i.e. 6 pm
is 18:00).

Each digit in a typical display is represented by a 4-digit binary code.

For example:
0 0 0 0 1st digit (0)

1 0 0 0 2nd digit (8)


is represented by:
0 0 1 1 3rd digit (3)
(clock display)
0 1 0 1 4th digit (5)

(a) What time is shown on the clock display if the 4-digit binary codes are:

0 0 0 1

0 1 1 0

0 1 0 0
(clock display)
1 0 0 1
[2]

(b) What would be stored in the 4-digit binary codes if the clock display time was:

1st digit

2nd digit

3rd digit

4th digit

[4]

© UCLES 2014 2210/01/SP/16

Page 384 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

(c) The clock alarm has been set at 08:00.

Describe the actions of the microprocessor which enable the alarm to sound at 08:00.

[2]

5 Bytes of data transferred using a serial cable are checked for errors at the receiving end using an
even parity check.

Can these bytes of data pass the even parity check?

(a) 01010101

[1]

(b) 11001000

[1]

(c) How can any errors be corrected?

[2]

© UCLES 2014 2210/01/SP/16 [Turn over


Page 385 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

6 The conditions in a fish tank are being controlled using sensors and a microprocessor. To keep
the fish healthy, the temperature must be at 25°C and the oxygen content needs to be 20 ppm
(parts per million). The tank contains a heater and an oxygen inlet controlled by a valve.

heater oxygen supply

sensor A sensor B

microprocessor

(a) Name the two sensors used in this application.

Sensor A

Sensor B [2]

(b) Describe how the sensors and the microprocessor are used to maintain the correct
conditions in the fish tank.

[4]

(c) What safeguards are needed to stop the fish tank temperature rising too high?

[1]

© UCLES 2014 2210/01/SP/16

Page 386 of 400


Muhammad Qadeer (0333-8136280)
9 www.cs2210.blogspot.com

7 Ahmed uses the Internet for some time and is puzzled by the terminology.

(a) Draw a line to match each description to the appropriate technical term.

authoring language used to


create documents to be viewed Browser
on the World Wide Web

computer that responds to


requests to provide information HTML
and services over the Internet

defines how messages are


transmitted and formatted MAC address
over the Internet

numerical ID for each device


Internet Server
on the Internet

software that enables users


to access/view documents and IP address
other resources on the Internet

unique ID for a network


http
interface card

[5]

(b) Ahmed sees the message “Set your browser to accept cookies”.

Explain why some websites make this request.

[2]

© UCLES 2014 2210/01/SP/16 [Turn over


Page 387 of 400
Muhammad Qadeer (0333-8136280)
10 www.cs2210.blogspot.com

8 Computer memories are measured in terms of the number of bytes.

(a) (i) What is meant by the term byte?

[1]

(ii) The number of bytes in a Gigabyte can be written as 2x

What is the value of x?

[1]

(b) Flash memories and CD-RWs are used as backing media for computers.

Give two differences between these two media.

[2]

9 Andrew sends a large document to a printer.

(a) State the name for the area of memory used to store temporarily the data being sent to the
printer.

[1]

(b) The printer runs out of paper during the printing job. A signal is sent back to the computer to
stop temporarily its current task.

Name this type of signal.

[1]

© UCLES 2014 2210/01/SP/16

Page 388 of 400


Muhammad Qadeer (0333-8136280)
11 www.cs2210.blogspot.com

10 In a simple symmetric encryption system, each letter of the alphabet is substituted with another.

The plain text message:

The quick brown fox jumps over the lazy dog.

becomes the cypher text message:

Zag towvs jumpy dmh coilr mngu zag bfke qmx.

(a) (i) Decode this cypher text message.

Agbbm Pmubq

[2]

(ii) Convert these words to cypher text.

Computer Science

[2]

(b) Both the person who sends the message and the person who receives it need to know
what the substitution key is, and they need to keep this secret. A copy of the
substitution key has been sent using SSL transmission.

(i) What is meant by SSL?

[1]

(ii) How does SSL keep the copy of the key secret during transmission?

[1]

© UCLES 2014 2210/01/SP/16 [Turn over


Page 389 of 400
Muhammad Qadeer (0333-8136280)
12 www.cs2210.blogspot.com

11 Five security or data loss issues are shown on the left-hand side.

Five possible methods of data recovery or protection are shown on the right.

Draw a line to match each definition/description of Issues to the most appropriate Methods of
Data Recovery.

Issues Methods of Data Recovery

data loss caused by hard disk


anti-spyware software
head crash

hacking into files and changing


anti-virus software
or deleting data

introduction of software that


self-replicates and can cause back-up files
data loss

reading of illegally accessed


encryption
documents

software that logs/records all


key presses on your computer passwords and a firewall
without you knowing

[4]

© UCLES 2014 2210/01/SP/16

Page 390 of 400


Muhammad Qadeer (0333-8136280)
13 www.cs2210.blogspot.com

12 Look at these two pieces of code:

A: CLC B: FOR Loop = 1 TO 4


LDX #0 INPUT Number1, Number2
loop: LDA A,X Sum = Number1 + Number2
ADC B,X PRINT Sum
STA C,X NEXT
INX
CPX #16
BNE loop

(a) Which of these pieces of code is written in a high-level language?

[1]

(b) Give one benefit of writing code in a high-level language.

[1]

(c) Give one benefit of writing code in a low-level language.

[1]

(d) High-level languages can be compiled or interpreted.

Give two differences between a compiler and an interpreter.

[2]

© UCLES 2014 2210/01/SP/16 [Turn over


Page 391 of 400
Muhammad Qadeer (0333-8136280)
14 www.cs2210.blogspot.com

13 When a key is pressed on the keyboard, the computer stores the ASCII representation of the
character typed into main memory.

The ASCII representation for A is 65 (denary), for B is 66 (denary), etc.

There are two letters stored in the following memory locations:

Location 1 A

Location 2 C

(a) (i) Show the contents of Location 1 and Location 2 as binary using 8 bits.

Location 1

Location 2

[2]

(ii) Show the contents of Location 1 and Location 2 as hexadecimal.

Location 1

Location 2 [2]

(b) The following machine code instruction is stored in a location of main memory:

1 1 1 1 1 0 1 0 1 0 0 1 0 1 1 1

Convert this binary pattern into hexadecimal.

[4]

(c) Explain why a programmer would prefer to see the contents of the locations displayed as
hexadecimal rather than binary, when debugging his program that reads the key presses.

[2]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 2210/01/SP/16

Page 392 of 400


Muhammad Qadeer (0333-8136280)
www.cs2210.blogspot.com

Cambridge International Examinations


Cambridge Ordinary Level

COMPUTER SCIENCE 2210/01


Paper 1 Theory For Examination from 2016
SPECIMEN MARK SCHEME
1 hour 45 minutes

MAXIMUM MARK: 75

This document consists of 8 printed pages.

© UCLES 2014 [Turn over

Page 393 of 400


Muhammad Qadeer (0333-8136280)
2 www.cs2210.blogspot.com

1 (a) 1 mark for the correct working in BOTH parts


1 mark for valid
1 mark for not valid

Identification number 1: working


= (4 × 6) + (2 × 5) + (1 × 4) + (9 × 3) + (2 × 2) + (3 × 1)
= 24 + 10 + 4 + 27 + 4 + 3
= 72 ÷ 11
= 6 remainder 6
valid/not valid: NOT valid

Identification number 2: working


= (8 × 6) + (2 × 5) + (0 × 4) + (1 × 3) + (5 × 2) + (6 × 1)
= 48 + 10 + 0 + 3 + 10 + 6
= 77 ÷ 11
= 7 remainder 0
valid/not valid: VALID [3]

(b) 1 mark for correct working + 1 mark for check digit

working
= (5 × 6) + (0 × 5) + (2 × 4) + (4 × 3) + (1 × 2)
= 30 + 0 + 8 + 12 + 2
= 52
need to add 3 to make the total 55 (i.e. exactly divisible by 11)

check digit: 3 [2]

(c) 1 mark for each description and example

2 digits transposed
(e.g. 280419 becomes 280149/two digits have been switched)
incorrect digit
(e.g. 280419 becomes 250419/one of the digits has been mistyped) [2]

2 – direct access because of concentric tracks


– can read and write at the same time because it has a read/write head [2]

© UCLES 2014 2210/01/SM/16

Page 394 of 400


Muhammad Qadeer (0333-8136280)
3 www.cs2210.blogspot.com

3 (a) 1 mark for each logic gate correctly connected

A
AND

NOT
OR Y

T
AND

S NOT
[5]

(b)
A T S Y

]
0 0 0 0
1 mark
0 0 1 0

]
0 1 0 1
}
1 mark
0 1 1 0

]
1 0 0 1
1 mark
1 0 1 1
1

1
1

1
0

1
1

0
] 1 mark

[4]

4 (a) 1 mark for hours; 1 mark for minutes

1 6 : 4 9
1 mark 1 mark [2]

(b) 1 mark for each digit

0 0 0 1 1st digit
0 1 1 1 2nd digit
0 0 1 0 3rd digit
1 0 0 1 4th digit [4]

© UCLES 2014 2210/01/SM/16 [Turn over


Page 395 of 400
Muhammad Qadeer (0333-8136280)
4 www.cs2210.blogspot.com

(c) Any two from:


– microprocessor compares present time with stored time
– if the values are the same
– sends signal to sound alarm [2]

5 (a) Yes [1]

(b) No [1]

(c) – re-reading the byte that was sent


– request that the byte is resent [2]

6 (a) Only answers:


– temperature (sensor)
– oxygen (sensor) [2]

(b) Any four from:


– information from the sensors sent to microprocessor
– the ADC converts the analogue data into digital form
– if temperature < 25ºC OR temperature checked against stored value
– ...microprocessor sends signal to heater/actuator/valve...
– ...to switch on heater
– if oxygen level < 20 ppm OR oxygen level checked against stored value
– ...to open valve/oxygen supply
– use of DAC between microprocessor and devices
– sounds an alarm if system unable to respond
– continuously monitors sensor inputs
– any reference to feedback [4]

(c) Any one from:


– unsafe limit stored in memory
– warning sound/signal if too high a value reached
– fail safe switch off in case of a malfunction [1]

© UCLES 2014 2210/01/SM/16

Page 396 of 400


Muhammad Qadeer (0333-8136280)
5 www.cs2210.blogspot.com

7 (a)

authoring language used to


create documents to be viewed Browser
on the World Wide Web

computer that responds to


requests to provide information HTML
and services over the Internet

defines how messages are


transmitted and formatted MAC address
over the Internet

numerical ID for each device


Internet Server
on the Internet

software that enables users


to access/view documents and IP address
other resources on the Internet

unique ID for a network


http
interface card

5/6 matches – 5 marks


4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark [5]

(b) any two from:


– to enable logon information to be kept on his computer
– to provide pages customised for Ahmed the next time he logs on
– to implement shopping carts and one-click purchasing
– to be able to distinguish between new and repeat visitors to the website [2]

© UCLES 2014 2210/01/SM/16 [Turn over


Page 397 of 400
Muhammad Qadeer (0333-8136280)
6 www.cs2210.blogspot.com

8 (a) (i) Any one from:


– unit of data/memory
– 8 bits
– used to represent a character [1]

(ii) 30 [1]

(b) Any two from:

Flash memory
– solid state memory
– no formatting issues
– plugs directly into the USB port
– direct transfer of data

CD-RW
– optical media
– slower access speed/flash memory has faster access speed
– requires a separate drive
– data needs to be burnt/finalised/finished (before being used on another device) [2]

9 (a) Any one from:


– buffer
– RAM [1]

(b) – interrupt [1]

10 (a) 1 mark for each correct word

(i) Hello World [2]

(ii) Vmilozgu Rvwgyvg [2]

(b) (i) Secure Socket Layer [1]

(ii) the key itself is encrypted using strong encryption [1]

© UCLES 2014 2210/01/SM/16

Page 398 of 400


Muhammad Qadeer (0333-8136280)
7 www.cs2210.blogspot.com

11

data loss caused by hard disk


anti-spyware software
head crash

hacking into files and changing or


anti-virus software
deleting data

introduction of software that


self-replicates and can cause back-up files
data loss

reading of illegally accessed


encryption
documents

software that logs/records all


key presses on your computer passwords and a firewall
without you knowing

5/4 matches – 4 marks


3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark [4]

12 (a) code B [1]

(b) Any one from:


– no need to understand workings of a computer
– easier to understand for programmer/closer to English
– much easier to debug
– much easier to test
– one-to-many when writing commands
– not machine-specific/portable [1]

(c) Any one from:


– can address memory addresses directly
– no need for compilers/interpreters
– shorter code/code requires less storage/RAM
– can be written to run faster [1]

© UCLES 2014 2210/01/SM/16 [Turn over


Page 399 of 400
Muhammad Qadeer (0333-8136280)
8 www.cs2210.blogspot.com

(d) – compiler produces object code / interpreter doesn’t produce object code
– compiler translates whole program in one go / interpreter translates and executes line at
a time
– compiler produces list of all errors / interpreter produces error message each time an
error encountered
– compiler produces “stand alone code” / interpreter doesn’t produce “stand alone code”
– compilation process is slow but resultant code runs very quickly / interpreted code runs
slowly [2]

13 (a) (i)
Location 1 0 1 0 0 0 0 0 1

Location 2 0 1 0 0 0 0 1 1
[2]

(ii) 41
43 [2]

(b) FA97 [4]

(c) – easier to identify values


– easier to spot errors [2]

© UCLES 2014 2210/01/SM/16

Page 400 of 400

You might also like