Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

IGCSE – COMPUTER SCIENCE

TEST PAPER
CHAPTER 1 & 2
Name: ______________________ Time: 30 mins

Date: _______________________ Mark: /

1 Carla’s computer has a USB port.

Carla uses the USB port to connect her mobile device to her computer, to transfer her photos.

(a) Benefit

1 ..........................................................................................................................................

.............................................................................................................................................

Benefit

2 ..........................................................................................................................................

.............................................................................................................................................

Benefit

3 ..........................................................................................................................................

.............................................................................................................................................

[3]

(b) State the type of data transmission used when transferring data using a USB port.

............................................................................................................................................ [1]

2 Two error detection methods that Allison’s computer uses are check digit and checksum.

(a) Give two similarities between the check digit and checksum methods.

1 .........................................................................................................................................

............................................................................................................................................

Page | 1
2 .........................................................................................................................................

............................................................................................................................................

[2]

(b) Identify one other error detection method that Allison’s computer could use.

Describe how the method checks for errors.

Method ..............................................................................................................................

Description ........................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

[4]

3 A low-level language needs to be converted to binary before it can be processed by a computer.

(a) Give the 8-bit binary value of the two denary values:

180 ....................................................................................................................................

201 ....................................................................................................................................

[2]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Page | 2
(b) Give the 12-bit binary value of the denary value 250.

........................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(c) Binary can be represented as hexadecimal to make it easier to read.

Give the hexadecimal values of the 8-bit binary values:

10010011 ...........................................................................................................................

00011101 ...........................................................................................................................

[2]

4 Meena uses a browser to research information for her business.

(a) Give three functions of a browser.

1 ...........................................................................................................................................

2 ...........................................................................................................................................

3 ............................................................................................................................................

[3]

(b) Meena buys products for her business using the Internet.

The Transport Layer Security (TLS) protocol is used for transferring data when she buys

products.

One layer of the TLS protocol is the handshake layer.

(i) Describe the purpose of the handshake layer.

Page | 3
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................[2]

(ii) Identify another protocol that can be used to transfer data securely.

.......................................................................................................................................... [1]

(c) Meena visits a website to buy products for her business.

The browser uses a small file to store the details of the products she views. This allows the

website to display advertisements for other products she may like.

The small file also stores her log-in details.

Give the name of this type of file.

............................................................................................................................................. [1]

5 The table shows four definitions.

Complete the table giving the missing Term for each definition.

Term Definition
A data transmission method that sends data one bit at a time,
down a single wire
An address given to a device on a network.
The address is assigned by the network
The software used to render HTML and display
a web page

An address given to a device at the manufacturing stage that can


be used to identify the device on a network

[4]

Page | 4
6 All smartphones have a MAC address.

(i) State what is meant by the term MAC address.

...................................................................................................................................................

................................................................................................................................................... [1]

(ii) Describe the structure of a MAC address.

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

..................................................................................................................................................

.................................................................................................................................................. [3]

Page | 5

You might also like