Professional Documents
Culture Documents
OL P1 Final WS
OL P1 Final WS
PAGE 1
/VNCFSTZTUFNT
Convert the denary value 7 to a 4-bit binary value.
Working space
Working space
Working space
1 0 1 0 1 0 1 0
+ 0 1 1 1 0 1 1 1
Perform a logical binary shift UXP place to the left on this binary value.
0 1 0 0 1 1 1 1
Working space
What is the largest number that can be stored in 8 bits using two’s complement?
What is the smallest number that can be stored in 8 bits using two’s complement?
True False
Statement
() ()
Both Unicode and ASCII are examples of a character set
Unicode requires more bits per character
ASCII can represent a greater range of symbols and emojis
Unicode can represent a greater range of different languages
MUHAMMAD ALI KHAN
PAGE 3
28IZ)FYBEFDJNBMSFQSFTFOUBUJPOPGNFNPSZJTCFUUFS
28IZDPNQVUFSVTFT#JOBSZ/VNCFST0OMZ
4(E) 6WDWHoneGLIIHUHQFHEHWZHHQDNLELE\WHDQGDPHJDE\WH
>@
MUHAMMAD ALI KHAN
PAGE 4
%LQDU\YDOXH
NLELE\WH
ELWV
JLJDE\WH
ELWV
E\WH
NLORE\WHV
NLORE\WH
PHELE\WHV
JLELE\WH
9ELWV
PHJDE\WH
PHELE\WH
>@
$QLPDJHKDYLQJFRORXUVFDOFXODWHFRORXUGHSWK
>@
:KDWFRPSRQHQWRIWKHFRPSXWHUSURYLGHVLWZLWKD0$&DGGUHVV"
R $%,26
R %1,&
R &&38
R '0RWKHUERDUG
:KDWWUDQVODWHV,3DGGUHVVLQWR0$&DGGUHVV"
D 2UJDQL]DWLRQDOO\8QLTXH,GHQWLILHU
E $GGUHVV5HVROXWLRQ3URWRFRO
F 1HWZRUN,QWHUIDFH&DUG
G %XUQHG,Q$GGUHVV
1HWZRUNLQJ+DUGZDUH$GGUHVVLVUHIHUUHGZLWKBBBBBBBB
D ,3DGGUHVV
E 0$&DGGUHVV
F 1,&
G 2UJDQL]DWLRQDOO\8QLTXH,GHQWLILHU
MUHAMMAD ALI KHAN
PAGE 5
E &KDUDFWHULVDQRWKHUW\SHRIGDWD
7KHIROORZLQJWDEOHVVKRZSDUWRIWKH$6&,,FRGHFKDUDFWHUVHW
L 'HVFULEHKRZWKHFRPSXWHUXVHV$6&,,FRGHVWRUHSUHVHQWFKDUDFWHUV
>@
LL &RQYHUWWKHIROORZLQJVWULQJLQWR$6&,,FRGHV
%HG
>@
LLL *LYHWKHGHQDU\$6&,,FRGHIRUWKHIROORZLQJFKDUDFWHU
>@
MUHAMMAD ALI KHAN
PAGE 6
2When converting an image to binary, the resolution and colour depth are set.
Colour depth
The number of pixels in an image
2 What will be the effect on an image if the colour depth is reduced?
2 A student has five images. Each image has a resolution of 1024 pixels wide by 512 pixels high. Each image has a colour
depth of 16 bits.
Calculatethe file size needed to store the images in mebibytes (MiB). Remember to show all your working.
Answer: MiB
MUHAMMAD ALI KHAN
PAGE 7
(a) The designer creates a 6-colour bitmap image for the poster as shown.
R R P P P G
B R R P G G
B W B B O O
B W W P P O
B B R P G O
B R R P G O
(i) State the minimum number of bits needed to represent each pixel in the image in part (a).
.......................................................................................................................................[1]
(ii) Calculate the minimum file size of the image shown in part (a). Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(b) (i) The designer takes a photograph to put on the poster. The photograph has a resolution of
50 000 pixels by 50 000 pixels. The colours are represented using 4 bytes per pixel.
Estimate the file size of the photograph in gigabytes. Show your working.
Working ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
4 Xander creates a presentation that includes images, video and sound.
(a) The images are bitmap images. A bitmap image can be made up of any number of colours.
Each colour is represented by a unique binary number.
Draw one line from each box on the left, to the correct box on the right to identify the minimum
number of bits needed to store each maximum number of colours.
1
68
2
256
127
2
8
249
9
[3]
MUHAMMAD ALI KHAN
PAGE 9
2Sometimes, files are compressed before they are stored. There are two methods of compression: lossy and
True False
Statement
() ()
Compression reduces the size of the file
A compressed file will be transmitted slower
A compressed file uses less bandwidth when transmitted
A compressed file will take up less storage space
2 A student has several large images to send to a friend. They use lossy compression to
reduce the size of the images before sending them.List ways that lossy
compression will reduce the size of the images.
2&YQMBJOIPX3-&XPSLTPO*NBHFT
MUHAMMAD ALI KHAN
PAGE 10
4 The photograph needs to be sent by email but the file size is too big. It needs to be
compressed.
The table lists several methods of making an image file size smaller.
Tick () one box on each row to indicate whether each method is lossy or lossless.
[4]
F -XOLDXVHVD86%FRQQHFWLRQWRWUDQVIHUGDWDRQWRKHU86%IODVKPHPRU\GULYH
L 2QHEHQHILWRIXVLQJD86%FRQQHFWLRQLVWKDWLWLVDXQLYHUVDOFRQQHFWLRQ
6WDWHWZRRWKHUEHQHILWVRIXVLQJD86%FRQQHFWLRQ
%HQHILW
%HQHILW
>@
LL ,GHQWLI\WKHW\SHRIGDWDWUDQVPLVVLRQXVHGLQD86%FRQQHFWLRQ
>@
MUHAMMAD ALI KHAN
PAGE 11
4
,-5;1.@>0-;0-9;0-four:;);-4-5;:)*6<;.13-+6479-::165)9-+699-+;*@>91;15/#!$69"
15;0-.6336>15/;)*3-
.13-:)9--?)473-:6.36::3-::.13-+6479-::165
.13-:)9-65)=-9)/-:4)33-9;0)5;0-4<:1+.13-:
:;69-,65)
.13-:)9--?)473-:6.36::@.13-+6479-::165
' (
4 );).13-:)9-:;69-,15,1..-9-5;.13-.694);:
6473-;-;0-;)*3-*@796=1,15/):<1;)*3-.13-.694);.69-)+0.13-;@7-#0-.19:;65-0):*--5
,65-.69@6<
Benefits Drawbacks
larger dynamic range produces larger file size
$GLJLWDODXGLRPHVVDJHQHHGVWREHUHFRUGHG
(a) 7LFN 9 one ER[ LQ HDFK URZ WR LGHQWLI\ WKH HIIHFW RI HDFK DFWLRQ RQ WKH DFFXUDF\ RI WKH
UHFRUGLQJ
(b) 7KHDXGLRPHVVDJHLVUHFRUGHGZLWKDVDPSOLQJUDWHRIN+]DQGDVDPSOLQJUHVROXWLRQRI
ELWV
7KHUHFRUGLQJLVPLQXWHVLQOHQJWK
&DOFXODWHWKHILOHVL]HRIWKHUHFRUGLQJ
*LYH\RXUDQVZHULQPHJDE\WHVandVKRZ\RXUZRUNLQJ
:RUNLQJ
$QVZHUPHJDE\WHV
>@
MUHAMMAD ALI KHAN
PAGE 13
$FRPSXWHUVWRUHVGDWDLQELQDU\IRUP
(a) 'UDZoneOLQHIURPHDFKGHVFULSWLRQWRLWVPDWFKLQJGHQDU\YDOXH
7KHVPDOOHVWLQWHJHUWKDWFDQEH
UHSUHVHQWHGLQELWWZR¶VFRPSOHPHQW
7KHODUJHVWLQWHJHUWKDWFDQEH
UHSUHVHQWHGLQELWWZR¶VFRPSOHPHQW
7KHODUJHVWXQVLJQHGLQWHJHUWKDWFDQEH
UHSUHVHQWHGLQELWV
>@
MUHAMMAD ALI KHAN
PAGE 14
%BUBQBDLFUT
MUHAMMAD ALI KHAN
PAGE 15
The structure of a packet of data has three elements. One element is the packet header.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
MUHAMMAD ALI KHAN
PAGE 19
4
.FUIPETPGFSSPSEFUFDUJPO
A 7-digit number has an extra digit on the right, called the check digit.
digit position: 1 2 3 4 5 6 7 8
digit: – – –
check digit
(a) Calculate the check digit for the following number. Show all your working.
4
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
correct incorrect
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
MUHAMMAD ALI KHAN
PAGE 20
2Datais transmitted from one device to another using the serial or parallel method.Tick () to show
Tick () to show how many wires are used in parallel data transmission.
2 Describe the benefit of using parallel data transmission, instead of serial data transmission.
2 List two benefits of using serial data transmission, instead of parallel data transmission.
2 Which error detection method adds an 8th bit to 7 bits of data, to make each byte meet an odd or even check?
Circle the answer.
Parity check Checksum Echo check
2 In which error detection method does the receiver send data back to the sender, to compare the two versions of the data?
Circle the answer.
Parity check Checksum Echo check
Which error detection method uses an algorithm to calculate a value from the data?This value is transmitted with the data
to the receiver. Circle the answer.
• type of transmission
• method of transmission
Description 1:
Tick Tick
Type Method
() ()
Data is transmitted several bits at
a time down several wires in both simplex serial
directions simultaneously.
half-duplex parallel
full-duplex
Description 2:
Tick Tick
Type Method
() ()
Data is transmitted in one direction
only, one bit at a time, down a simplex serial
single wire.
half-duplex parallel
full-duplex
Description 3:
Tick Tick
Type Method
() ()
Data is transmitted one bit at a
time down a single wire; the data simplex serial
is transmitted in both directions
but not at the same time.
half-duplex parallel
full-duplex
[6]
MUHAMMAD ALI KHAN
PAGE 24
The structure of a packet of data has three elements. One element is the packet header.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
MUHAMMAD ALI KHAN
PAGE 25
(b) Computer A needs to be directly connected to a router that is located in a different room.
(i) Tick () one box to identify whether serial data transmission or parallel data transmission
is more suitable for this connection.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
[Turn over
MUHAMMAD ALI KHAN
PAGE 26
10
(i) The bytes need to be sent using an even parity byte check.
Parity
bit
Byte A 1 1 0 0 0 1 1
Byte B 0 0 0 0 0 0 0
[2]
(ii) A parity block check can be used instead of a parity byte check.
Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
MUHAMMAD ALI KHAN
PAGE 27
11
(iii) The data was sent using an even parity block check. One of the bits has been transmitted
incorrectly.
Parity
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7
bit
Byte 0 1 1 1 0 1 0 0 0
Byte 1 0 0 1 0 0 1 0 0
Byte 2 1 0 1 1 0 0 0 1
Byte 3 1 1 0 0 1 1 1 1
Byte 4 1 0 1 0 0 0 1 0
Byte 5 0 0 0 0 0 0 0 0
Byte 6 0 1 1 1 1 0 0 0
Parity
0 1 1 0 1 0 1 0
byte
Identify the bit number and the byte number of the incorrect bit.
[Turn over
MUHAMMAD ALI KHAN
PAGE 28
4 Five computer terms and seven descriptions are shown below.
Parallel, half-duplex
data transmission
An even or odd number of bits set to 1
in a byte, used to check if the byte has
been transmitted correctly
&ODSZQUJPO
4 A message is encrypted using a private key and sent to an individual using asymmetric encryption.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
4 (a) State two differences between symmetric and asymmetric encryption.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
2 What is the name given to the data before encryption?
2 Name the encryption algorithm that is used to encrypt the data.
(a) Wiktor is an employee of a travel agent. He uses asymmetric encryption to send confidential
information to his manager.
data. When Wiktor sends a message to his manager, the message is encrypted into
:KHQWKHPDQDJHUUHSOLHVWKHPHVVDJHLVHQFU\SWHGXVLQJ:LNWRU·V«««««««««««
key, and when Wiktor receives the message, it is decrypted into …………………………….
(b) When customers pay for their travel booking online, a secure connection is established using
Secure Socket Layer (SSL).
([SODLQKRZWKHFXVWRPHU·VEURZVHUDQGWKHVHUYHUXVHGWRFROOHFWWKHSD\PHQWZLOOHVWDEOLVK
a secure connection.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
MUHAMMAD ALI KHAN
PAGE 31
$PNQPOFOUTXJUIJOUIF$16
2Tick () to show which of the following components are an example of a register.
Component Tick
Program counter
Address bus
Memory address register
Data bus
Memory data register
Control bus
Arithmetic logic unit
Control unit
Current instruction register
Accumulator
2Which register stores the address of the next instruction to be fetched into the CPU?
2When an instruction is fetched into the CPU, which component is it sent to first?
Certain factors can affect the performance of the CPU, including the number of cores, the size of the cache, and the speed
of the clock.
$PNQPOFOU %FGJOJUJPO
4 $FRPSXWHUKDVV\VWHPVRIWZDUH
D 7KH2SHUDWLQJ6\VWHPKDQGOHVLQWHUUXSWV
7LFN 9 RQH ER[ LQ HDFK URZ WR LGHQWLI\ ZKHWKHU HDFK HYHQW LV DQ H[DPSOH RI D KDUGZDUH
LQWHUUXSWRUDVRIWZDUHLQWHUUXSW
4
accumulator (ACC)
address bus
arithmetic logic unit (ALU)
control unit (CU)
data bus
executed
fetches
immediate access store (IAS)
memory address register (MAR)
memory data register (MDR)
program counter (PC)
saved
transmits
Any calculations that are carried out on the data are done by the
([SODLQ KRZ WKH &8 V\VWHP FORFN DQG FRQWURO EXV RSHUDWH WR WUDQVIHU GDWD EHWZHHQ WKH
FRPSRQHQWVRIWKHFRPSXWHUV\VWHP
>@
MUHAMMAD ALI KHAN
PAGE 35
1
< <<
MUHAMMAD ALI KHAN
PAGE 36
Some are part of the central processing unit (CPU) of the Von Neumann model for a computer
system.
Tick () to show if each component is a CPU component or is Not a CPU component.
Sensor Scenario
[4]
[Turn over
MUHAMMAD ALI KHAN
PAGE 37
4 (a) State what is meant by the stored program concept in the Von Neumann
model of a computer system.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) A Central Processing Unit (CPU) contains several special purpose registers and other
components.
...........................................................................................................................................
...........................................................................................................................................
*"4 ............................................................................................................
...........................................................................................................................................
...........................................................................................................................................
$PSF .........................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Tick (9) one box in each row to identify the system bus used by each CPU component.
System clock
[1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
MUHAMMAD ALI KHAN
PAGE 38
2
Six statements are shown on the left and nine computer terms on the right.
Draw lines to link each statement with its correct computer term.
search engine
machine learning
contains the inference rules used to determine any matches expert system
between input data and stored data
knowledge base
Describe two ways the performance of the computer can be improved. Why would this improve the performance?
'UDZ one OLQH IURP HDFK 2SHUDWLQJ 6\VWHP 26 PDQDJHPHQW WDVN WR LWV PRVW DSSURSULDWH
GHVFULSWLRQ
G\QDPLFDOO\DOORFDWHVPHPRU\WR
SURFHVVHV
KDUGZDUHPDQDJHPHQW
PDUNVXQDOORFDWHGILOHVWRUDJH
IRUDYDLODELOLW\
VHFXULW\PDQDJHPHQW
LQVWDOOVSURJUDPVIRUGHYLFHV
FRQQHFWHGWRH[WHUQDOSRUWV
PHPRU\PDQDJHPHQW
YDOLGDWHVXVHUDQG
SURFHVVDXWKHQWLFLW\
SURFHVVPDQDJHPHQW
DOORZVSURFHVVHVWRWUDQVIHU
GDWDWRDQGIURPHDFKRWKHU
>@
MUHAMMAD ALI KHAN
PAGE 40
*OQVUBOEPVUQVUEFWJDFT
1
2
3
2Tick () to show whether each device is an example of an input device or an output device.
2 Eight types of sensor are shown on the left and eight potential sensor applications on the right.
Draw lines to connect each sensor to an appropriate application. Only one application can be
assigned to each sensor.
5&.1&3"563&4&/403
NFBTVSFTUFNQFSBUVSFPGUIFTVSSPVOEJOHTCZ
TFOEJOHTJHOBMT
Moisture sensor
USBOTEVDFSBOEHFOFSBUFTEJGGFSFOUFMFDUSJD
DVSSFOUTEFQFOEJOHPOUIFQSFTTVSFBQQMJFE
)VNJEJUZ
UIFTFTFOTPSTEFUFDUUIFQSFTFODFPGBOFBSCZ
PCKFDU
-JHIU4FOTPS
NFBTVSFTXBUFSMFWFMTJO GPSFYBNQMF TPJM
1SFTTVSF4FOTPS UIFTFVTFBOJOWJTJCMFCFBNPGJOGSBSFE
SBEJBUJPOQJDLFEVQCZBEFUFDUPS
Q)4FOTPS USBOTEVDFSBOEHFOFSBUFTEJGGFSFOUFMFDUSJDDVSSFOUT
EFQFOEJOHPOUIFQSFTTVSFBQQMJFE
UIFTFNFBTVSFBDJEJUZUISPVHIDIBOHFTJO
"DDFMFSPNFUFS WPMUBHFTJO GPSFYBNQMF TPJM
5VSOPOTUSFFUMJHIUTBVUPNBUJDBMMZ
1SPYJNJUZ4FOTPS
VTFEJOBOUJMPDLCSBLJOHTZTUFNTJODBST
'MPX4FOTPS
EFUFDUFETPVOEJOUPFMFDUSJDTJHOBMTQVMTFT
-FWFM4FOTPS
NFBTVSFBDDFMFSBUJPOBOENPUJPOPGBO
BQQMJDBUJPO
Magnetic field sensor
NFBTVSFHBTGMPXTJOQJQFT GPS
FYBNQMF OBUVSBMHB
("4
NFUIPETUPEFUFDUUIFHBTCFJOHNPOJUPSFE
BOEQSPEVDF
MUHAMMAD ALI KHAN
PAGE 42
: :/14&1:,!9/:*#,52.:#/:*'::$/:*&/*":
!,)",)2!22( 2#-)12"!)!$"2
",)2!22$2!"122 )!22!",)$2
2
2 22
MUHAMMAD ALI KHAN
PAGE 43
-79$(/90*9*))199/.+0!*)90*909*..090-&9
*+1 $9
.*( //9/+*")97*.9+11.(/9
.1.9
)9*&+-/91&91*9+10-)/9
-*)0*(9
/1*.9 (9&&*.89
9
4/9*9&(419$1.*)96/9
*+1 $9&.#9
*(0( (9& .*+9(9)1((9
-*)0*(9
119(99.9-*'9/1(/94+9
9
1*9 9 &1./9
- *9
41*&1 919*%$1*(95/ (9 -,5)89
/(/*./9 (1 1 *(9
9
/8/0'9119./9+) $9*-9+(9
6* 9
&."/9*(99+ 9*9++.9)9
-*)0*(9
+-1-' (9+*/!1 *(/9
MUHAMMAD ALI KHAN
PAGE 44
5ZQFTPGTUPSBHF
2 Which input device would be most suitable to enter a password into a computer?
2 Which input device would be most suitable to convert a hard copy of a document into a digital copy?
2 Which output device would be most suitable to allow shoppers to listen to an announcement in a supermarket?
Computers use different types of storage, including primary and secondary storage. Primary storage is directly accessed by the
CPU and secondary storage is not directly accessed by the CPU.
2Tick () to show whether each example is primary storage or secondary storage.
Primary Secondary
Storage example
storage storage
Read only memory (ROM)
Hard disk drive (HDD)
Random access memory (RAM)
Solid state drive (SSD)
2 Can you name three storage examples that are described as non-volatile because they do not lose the data they store when
power is turned off?
MUHAMMAD ALI KHAN
PAGE 45
2 Why does a computer system need both RAM and ROM?
Tick() to show whether the statement about magnetic storage is true or false.
2
Cloud storage is another way to store data. Physical servers and storage devices are still used to store data in the cloud, but these
belong to a third party, rather than the individual or company that owns the data.
2
Circle all the examples of applications software.
4 $IDFWRU\PDNHVFKRFRODWHEDUV
7KHIDFWRU\XVHVDFRQYH\RUEHOWWKDWPRYHVWKHSURGXFWVIURPRQHVWDJHRISURGXFWLRQWRWKHQH[W
VWDJH
D $QDXWRPDWHGV\VWHPFRXQWVWKHQXPEHURIFKRFRODWHEDUVPDGHDWWKHHQGRISURGXFWLRQ
7KHV\VWHPLQFOXGHVDVHQVRUSRVLWLRQHGDERYHWKHFRQYH\RUEHOW
,GHQWLI\RQHDSSURSULDWHW\SHRIVHQVRUWKDWFDQEHXVHG
>@
E $ VHFRQG DXWRPDWHG V\VWHP UHPRYHV FKRFRODWH EDUV ZLWK DQ LQFRUUHFW ZHLJKW IURP WKH
SURGXFWLRQOLQH
'HVFULEHWKHUROHRIDQDFWXDWRULQWKLVVHFRQGV\VWHP
>@
F 7KHIDFWRU\KDVPDQ\GLIIHUHQWPDFKLQHVZLWKHPEHGGHGV\VWHPV
L ,GHQWLI\WZRIHDWXUHVRIHPEHGGHGV\VWHPV
>@
LL ,GHQWLI\RQHGUDZEDFNRIHPEHGGHGV\VWHPV
>@
2
PAGE 50
[Turn over
MUHAMMAD ALI KHAN
PAGE 52
1
2(f,L?@L`6F.f?6VYfV2L`Vf-6_(fVZLQ/(fC(&6 f
e
e
e 7GY(RK@f3R'f&7V=
e (bY(SI@f2S'f'7V=
e +@V2fC(DLTc
2(f[!?(f"(?L`fV2L`Vf-7_(fOOA7#Y8LGV
MRf(#2fOO@7#[6MHf$4LLW(f[2(fEMV[fOOTNOT6[(fW[NQ0(fC('6\Cf+TLCf[4(f@9VY
fOQN/UCC6I.f[(bYf"LL=fOSL_7'(&f`7[4f
XCP@(f#L'(f7Gf(@(#[QLF6#f,LQCf
YMQ/(fN+fP2LYM.TP2Wf6Hff&6.7[@f#C)Rf
f"#=\OfL,fY4(f#LCO@)Y(f f,:?(fVcV[(C f
YLf!(f >(OYfL++?9I(f
ZLQ.(fL+fLO(QZ7J/fVcVY(CfH'f
PPB6%[;LFVfVL+[`S(f
6D]@[G(N^VfR*$LT&7I.fF&fP@c"$>fL,f
_9&(Nf,9?(Vf`9Y2fR(CL_"@)fLOY9# ?fD)'<f
6_(f "(G(,7YWfL-f\V6J0fVN?7'fVYY(fE(CLR7(V
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
4-2'%)!/**))!/!$/!-(/**--!/ !"%)%/%*)
+-*#-(/$/''*2.0.!-/*1%!2
-*2.!-
2!+#!.
*(+)4/$/+-*1% !.*))!/%*)/*
-!..
!../$!)/!-)!/
MUHAMMAD ALI KHAN
PAGE 54
2%JGGFSFOUJBUFCFUXFFO*1BEESFTTBOE."$"EESFTT
4Five.//!(!)/.-!#%1!)*0/**&%!.
Tick/*.$*2%"/$!.//!(!)/%.True*-False
True False
Statement
() ()
**&%!.2%''*--0+//$! /*)0./*(!-5.*(+0/!-
2
An interrupt is a type of signal that tells the CPU something requires its attention. Each interrupt has a priority level that tells
the CPU how important it is. Interrupts are generated and handled constantly within a computer system, and there can be
hardware or software interrupts
Example 1
Example 2
Example 1
Example 2
2 Here are the stages that occur when an interrupt is serviced by the CPU. Order the stages. The first one has been done for you.
Stage Order
number
The CPU checks the priority of the next interrupt to see if it has a higher priority
than the current task being processed.
If the priority is lower, it leaves the interrupt in the interrupt queue and carries on
processing. If it is higher, the CPU stops and stores the current task being processed
and fetches the interrupt into the CPU to be processed.
When the CPU completes its current fetch-decode-execute cycle, it checks the
1
interrupt at the front of the interrupt queue.
The interrupt service routine (ISR) is called to handle the interrupt
When the interrupt is serviced, the CPU either fetches the task it stored back into
the CPU to be processed, or services another interrupt from the queue if it has a
higher priority.
The CPU checks the source of the interrupt.
MUHAMMAD ALI KHAN
PAGE 56
E ,3DGGUHVVHVFDQEHVWDWLFRUG\QDPLF
>@
MUHAMMAD ALI KHAN
PAGE 57
AURL is a text-based address for a website. It is entered into the address bar in a web browser to access the website.
https://www.bbc.co.uk/news
2HTTP is a protocol used to transmit the data for webpages across the internet. A protocol is a set of rules that must be
followed when completing a task. So, the HTTP makes sure that data is transmitted from device to device following the
set rules. What is the difference between HTTP and HTTPS?
2 A web browser is used to view web pages that are sent using the internet. Its main function is to display these web
pages, and it does this by rendering the HTML files and other program code used to create the website. Name three other
functions of a web browser.
Function 1
Funct
Function 3
MUHAMMAD ALI KHAN
PAGE 58
4$ZHEVHUYHUKDVDSXEOLF,3YDGGUHVV
D 'UDZOLQHVWROLQNHDFKFKDUDFWHULVWLFWRLWVDSSURSULDWH,3DGGUHVV
&KDUDFWHULVWLF ,3DGGUHVV
&DQXVHKH[DGHFLPDOQRWDWLRQ
(DFKJURXSRIGLJLWVLVDQXPEHU
EHWZHHQDQG
,3Y
&RQVLVWVRIIRXUJURXSVRIGLJLWV
,3Y
8VHVGRXEOHFRORQV
7KHWRWDOOHQJWKRIWKHDGGUHVVLVELWV
>@
LLL 7KHURXWHUKDVDQ,3YDGGUHVV
*LYHWKUHHGLIIHUHQFHVEHWZHHQWKHIRUPDWRIDQ,3YDGGUHVVDQGDQ,3YDGGUHVV
>@
MUHAMMAD ALI KHAN
PAGE 59
10
9 Three Internet terms are browser, Internet Protocol (IP) address and
Uniform Resource Locator (URL).
Tick () to show which statements apply to each Internet term. Some statements may apply to
more than one Internet term.
it is a type of software
it is a type of address
it stores cookies
[5]
Feature 1 ..........................................................................................................................................
..........................................................................................................................................................
Feature 2 ..........................................................................................................................................
..........................................................................................................................................................
Feature 3 ..........................................................................................................................................
..........................................................................................................................................................
[3]
MUHAMMAD ALI KHAN
PAGE 60
4 Ava needs to view a website and she knows the Uniform Resource Locator (URL).
1 ..................................................
3 ..................................................
4 ..................................................
1 .........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
[2]
1 .........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
[2]
MUHAMMAD ALI KHAN
PAGE 61
2 What is the name of the digital ledger process used in tracking cryptocurrency?
2 Complete the missing terms and definitions of cyber security threats.
Term Definition
Packets of data are intercepted as they are sent across a network, often using a
packet sniffer.
A collective name for different types of malicious code that is downloaded onto a
user’s computer.
Brute-force attack
2 a Indicate whether the following six statements about blockchaining are true or false by
placing a tick () in the correct box.
Blockchaining statement True () False ()
All digital currency systems use blockchaining
Blockchaining uses a decentralised database
The last block in a blockchain is known as the 'genesis block'
New hash values are only generated when data in a block is altered
Tampering of data in a block by a hacker would cause the hash value to change
Blocks are 'policed' by network users called 'miners'
1
2
3
2
PAGE 63
i Complete the diagram below to show how the six blocks are connected to form a
blockchain network. Use arrows to show any hash value links.
1 2 3 4 5 6
ii Describe what happens if block '4' was hacked and the hash value was changed to DD22.
......................................................................................................................................................................
......................................................................................................................................................................
......................................................................................................................................................................
......................................................................................................................................................................
......................................................................................................................................................................
......................................................................................................................................................................
............................................................................................................................................................................
............................................................................................................................................................................
............................................................................................................................................................................
............................................................................................................................................................................
............................................................................................................................................................................
............................................................................................................................................................................
MUHAMMAD ALI KHAN
PAGE 65
2 Eight descriptions and ten computer terms are shown in the diagram below.
Knowledge base
A form of AI that has been developed to mimic human knowledge and
expertise
Autonomous
Robots that roam the internet, scanning websites and categorising them
for search purposes
Chat bot
A repository of facts and expertise in the form of a collection of objects Expert system
and their attributes
A Software that activates a webcam and transmits the video to a third party
that outputs it live on a website.
B Software that detects when a password is being entered and then emails
the password to a third party.
C Software that records all data entered into a computer, analyses this data
to find email addresses and passwords, then posts these to a website.
D Software that records all key presses and transmits these to a third party.
[1]
(b) Complete the table by identifying and describing two other examples of malware.
Malware Description
...........................................................................................................
...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................
...........................................................................................................
[6]
MUHAMMAD ALI KHAN
PAGE 67
Identify two similarities and one difference between proxy-servers and firewalls.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
[Turn over
MUHAMMAD ALI KHAN
PAGE 68
12
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) One way a user can check a website uses HTTPS is to check whether the
Uniform Resource Locator (URL) begins with HTTPS.
Give one other way a user can check if a website uses HTTPS.
...........................................................................................................................................
..................................................................................................................................... [1]
(b) There is a risk that people that use the Internet to access websites can have their stored data
maliciously damaged.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
MUHAMMAD ALI KHAN
PAGE 69
2 Secure socket layer (SSL) is a security protocol used to keep data secure when it is transmitted over the internet.
The table contains the stages that occur during the process of using SSL to secure and transmit data for an online
purchase over the internet. Put these stages in order, starting from 1.
2 Firewalls are a common security measure that can help prevent against the use of several cyber security threats.
Tick() to show whether each statement about a firewall is true or false.
2 A school has a firewall as a security measure to protect students and their data.
The user can also set a of websites. These will be the only websites that can be
accessed from the computer.
MUHAMMAD ALI KHAN
PAGE 70
F 7ZRPDOZDUHWKUHDWVDUHVS\ZDUHDQGYLUXVHV
*LYHWZRVLPLODULWLHVDQGRQHGLIIHUHQFHEHWZHHQVS\ZDUHDQGDYLUXV
6LPLODULW\
6LPLODULW\
'LIIHUHQFH
>@
MUHAMMAD ALI KHAN
PAGE 71
Characteristic 1
Characteristic 2
Characteristic 3
2 Can you name the four main parts of an expert system?
Part 1
Part 2
Part 3
Part 4
MUHAMMAD ALI KHAN
PAGE 72
4
2Tick () to show whether each statement about interpreters is true or false.
Function 1
Function 2
Function 3
Function 4
MUHAMMAD ALI KHAN
PAGE 74
True False
Statement
() ()
High-level languages need to be translated into machine code to run on a
computer
High-level languages are written using mnemonic codes
+LJKOHYHOODQJXDJHVDUHVSHFLILFWRWKHFRPSXWHU·VKDUGZDUH
High-level languages are portable languages
[4]
(b) Tick () to show which of the following is an example of a high-level language program.
Tick
Example program
()
1011100000110000
0000011011100010
INP
STA ONE
INP
STA TWO
ADD ONE
a = input()
b = input()
if a == b:
print("Correct")
else:
print("Incorrect")
[1]
[Turn over
MUHAMMAD ALI KHAN
PAGE 75
7 David is writing a program using a high-level language. The program will be published and sold for
profit.
Feature 1 ..................................................................................................................................
...................................................................................................................................................
Feature 2 ..................................................................................................................................
...................................................................................................................................................
Feature 3 ..................................................................................................................................
...................................................................................................................................................
[3]
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
MUHAMMAD ALI KHAN
PAGE 76
He needs to send just the machine code for the program to his friend, electronically.
Identify which translator will be most suitable for Dimitri to use. Explain your choice.
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
.............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
MUHAMMAD ALI KHAN
PAGE 77
1
$-
% -$-'%-)#-- -!) -
## -
3 Five descriptions of different input or output devices are given in the table.
Complete the table by stating the name of each input or output device.
...................................................
[5]
MUHAMMAD ALI KHAN
PAGE 79
PAGE 723
15
(d) The robot needs to find its way through different puzzles. Each puzzle has a series of paths
that the robot needs to follow to find its way to the end of the puzzle. The puzzle contains
dead ends and obstacles, so the robot needs to decide which way to go.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
MUHAMMAD ALI KHAN
PAGE 80
21Draw a diagram to represent how data is transmitted across a network using packet switching. Your diagram should include
a minimum of two devices and four routers.
32 Draw a diagram to show how data is transmitted using half-duplex data transmission.
MUHAMMAD ALI KHAN
PAGE 81
Computers sometimes use a type of memory called virtual memory. This allows the computer to continue processing data
when the RAM is full.
25 Complete the diagram to show the hierarchy in which these are run (e.g. part A is run on part B) so that the computer can
be fully operational.
Key parts within a computer are the hardware, the applications software, the operating system and the firmware. These are
required for the computer to be fully operational.
MUHAMMAD ALI KHAN
PAGE 82
4
D Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The
direction of the data transmission must be fully labelled.
Computer A Computer B
Computer A Computer B
Computer A Computer B
[6]
(b) State a use for the following data transmission methods. The use must be different for each
data transmission method.
Simplex .....................................................................................................................................
...................................................................................................................................................
Duplex ......................................................................................................................................
...................................................................................................................................................
[2]
MUHAMMAD ALI KHAN
PAGE 83
2
1BDLFU
Header Trailer
Some form of
The actual data
IP address of Size of the error checking
in the packets
the source packet (in to ensure
(~64 KiB) – the
device (sender) bytes) packet arrives
payload
error-free
2
PAGE 84
Data is sent
Ports
Control bus
Address bus
Data bus
System bus
Core 1 Core 2
(6 channels)
Core 3 Core 4
V Figure 3.5
RAM
Aerial input
HDMI output
Set-top box
Cable input Front end Interface
controller
Analogue
Satellite input audio output
SSD Front
panel Remote signal
Manual input
Security systems
Embedded systems are used in many security devices:
SSD RAM
Temperature
Acoustic
Keypad
interface
Control gate
Dielectric coating (insulation)
Floating gate
Tunnel oxide coating
(allows electrons through) Electron source
Substrate
SOFTWARE
SYSTEM APPLICATION
SOFTWARE SOFTWARE
2%SBX5-4)FBEFS