Download as pdf or txt
Download as pdf or txt
You are on page 1of 85

MUHAMMAD ALI KHAN

PAGE 1

 /VNCFSTZTUFNT
 Convert the denary value 7 to a 4-bit binary value.

Denary 4-bit binary


7

Working space

 Convert the denary value 2001 to a 12-bit binary value

Denary 12-bit binary


2090

Working space

 Convert the hexadecimal value 3B0 to 12-bit binary.

Hexadecimal 12-bit binary


3B0

Working space

  Add the 8-bit binary values 10101010 and 01110111.

1 0 1 0 1 0 1 0

+ 0 1 1 1 0 1 1 1

 Name the error caused by this binary addition.

 Why does this type of error happen?


MUHAMMAD ALI KHAN
PAGE 2

 Perform a logical binary shift UXP place to the left on this binary value.

0 1 0 0 1 1 1 1

Whateffect did the logical shift have on the binary value?

 Convert the denary number -75 to two’s complement 8-bit binary.

Denary Two’s complement 8-bit binary


-75

Working space

 What is the largest number that can be stored in 8 bits using two’s complement?

 What is the smallest number that can be stored in 8 bits using two’s complement?

 What is a character set?

Tick () to show whether each statement is true or false.

True False
Statement
() ()
Both Unicode and ASCII are examples of a character set
Unicode requires more bits per character
ASCII can represent a greater range of symbols and emojis
Unicode can represent a greater range of different languages
MUHAMMAD ALI KHAN
PAGE 3

2Two differences and one similarity between"4$**$PEFTBOE6OJ$PEFT 













28IZ)FYBEFDJNBMSFQSFTFOUBUJPOPGNFNPSZJTCFUUFS 













28IZDPNQVUFSVTFT#JOBSZ/VNCFST0OMZ 







4(E) 6WDWHoneGLIIHUHQFHEHWZHHQDNLELE\WHDQGDPHJDE\WH


  >@
MUHAMMAD ALI KHAN
PAGE 4

4 D  'UDZRQHOLQHIURPHDFKELQDU\YDOXHWRLWVHTXLYDOHQW VDPH YDOXHRQWKHULJKW

%LQDU\YDOXH
NLELE\WH

ELWV

JLJDE\WH

ELWV

E\WH

NLORE\WHV

NLORE\WH

PHELE\WHV

JLELE\WH

9ELWV

PHJDE\WH

PHELE\WH

>@

$QLPDJHKDYLQJFRORXUVFDOFXODWHFRORXUGHSWK



  >@

 :KDWFRPSRQHQWRIWKHFRPSXWHUSURYLGHVLWZLWKD0$&DGGUHVV"
R $%,26
R %1,&
R &&38
R '0RWKHUERDUG
 :KDWWUDQVODWHV,3DGGUHVVLQWR0$&DGGUHVV"
D 2UJDQL]DWLRQDOO\8QLTXH,GHQWLILHU
E $GGUHVV5HVROXWLRQ3URWRFRO
F 1HWZRUN,QWHUIDFH&DUG
G %XUQHG,Q$GGUHVV
 1HWZRUNLQJ+DUGZDUH$GGUHVVLVUHIHUUHGZLWKBBBBBBBB
D ,3DGGUHVV
E 0$&DGGUHVV
F 1,&
G 2UJDQL]DWLRQDOO\8QLTXH,GHQWLILHU
MUHAMMAD ALI KHAN
PAGE 5

E &KDUDFWHULVDQRWKHUW\SHRIGDWD

7KHIROORZLQJWDEOHVVKRZSDUWRIWKH$6&,,FRGHFKDUDFWHUVHW

&KDUDFWHU 'HQDU\YDOXH &KDUDFWHU 'HQDU\YDOXH


$  D 
%  E 
&  F 
'  G 
(  H 

L 'HVFULEHKRZWKHFRPSXWHUXVHV$6&,,FRGHVWRUHSUHVHQWFKDUDFWHUV







 >@

LL &RQYHUWWKHIROORZLQJVWULQJLQWR$6&,,FRGHV

%HG



 >@

LLL *LYHWKHGHQDU\$6&,,FRGHIRUWKHIROORZLQJFKDUDFWHU

 >@
MUHAMMAD ALI KHAN
PAGE 6

 5FYU TPVOEBOEJNBHFT

2When converting an image to binary, the resolution and colour depth are set.

Draw a line from each term to its correct definition.

Colour depth
The number of pixels in an image

Resolution The number of bits used to represent


each colour in an image

The small squares of colour that make


Pixels
up an image

2 What will be the effect on an image if the colour depth is reduced?

2 A student has five images. Each image has a resolution of 1024 pixels wide by 512 pixels high. Each image has a colour
depth of 16 bits.
Calculatethe file size needed to store the images in mebibytes (MiB). Remember to show all your working.

Answer: MiB
MUHAMMAD ALI KHAN
PAGE 7

4 A product designer is creating a poster.

(a) The designer creates a 6-colour bitmap image for the poster as shown.

Each colour is represented by a letter, for example, R = red, B = blue.

R R P P P G

B R R P G G

B W B B O O

B W W P P O

B B R P G O

B R R P G O

(i) State the minimum number of bits needed to represent each pixel in the image in part (a).

.......................................................................................................................................[1]

(ii) Calculate the minimum file size of the image shown in part (a). Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

File size .............................................................................................................................


[3]

(b) (i) The designer takes a photograph to put on the poster. The photograph has a resolution of
50 000 pixels by 50 000 pixels. The colours are represented using 4 bytes per pixel.

Estimate the file size of the photograph in gigabytes. Show your working.

Working ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Estimated file size ..............................................................................................................


[4]
MUHAMMAD ALI KHAN
PAGE 8

4 Xander creates a presentation that includes images, video and sound.

(a) The images are bitmap images. A bitmap image can be made up of any number of colours.
Each colour is represented by a unique binary number.

Draw one line from each box on the left, to the correct box on the right to identify the minimum
number of bits needed to store each maximum number of colours.

Maximum number of colours Minimum number of bits

1
68

2
256

127

2
8

249
9

[3]
MUHAMMAD ALI KHAN
PAGE 9

2 Number the data storage units from 1 (smallest) to 9 (largest).


Thefirst one has been done for you.

Data storage unit Number


Byte
Kibibyte (KiB)
Gibibyte (GiB)
Nibble
Exbibyte (EiB)
Mebibyte (MiB)
Tebibyte (TiB)
Bit 1
Pebibyte (PiB)

2Sometimes, files are compressed before they are stored. There are two methods of compression: lossy and

lossless.Tick () to show whether each statement is true or false.

True False
Statement
() ()
Compression reduces the size of the file
A compressed file will be transmitted slower
A compressed file uses less bandwidth when transmitted
A compressed file will take up less storage space

2 A student has several large images to send to a friend. They use lossy compression to
reduce the size of the images before sending them.List ways that lossy
compression will reduce the size of the images.

2&YQMBJOIPX3-&XPSLTPO*NBHFT 












MUHAMMAD ALI KHAN
PAGE 10

4 The photograph needs to be sent by email but the file size is too big. It needs to be
compressed.

The table lists several methods of making an image file size smaller.

Tick () one box on each row to indicate whether each method is lossy or lossless.

Compression method Lossy Lossless

Cropping the image

Reducing the resolution of the image

Using run-length encoding (RLE)

Reducing the colour depth of the image

[4]
F -XOLDXVHVD86%FRQQHFWLRQWRWUDQVIHUGDWDRQWRKHU86%IODVKPHPRU\GULYH

L 2QHEHQHILWRIXVLQJD86%FRQQHFWLRQLVWKDWLWLVDXQLYHUVDOFRQQHFWLRQ

6WDWHWZRRWKHUEHQHILWVRIXVLQJD86%FRQQHFWLRQ

%HQHILW



%HQHILW


>@

LL ,GHQWLI\WKHW\SHRIGDWDWUDQVPLVVLRQXVHGLQD86%FRQQHFWLRQ

  >@
MUHAMMAD ALI KHAN
PAGE 11

4

 ,-5;1.@>0-;0-9;0-four:;);-4-5;:)*6<;.13-+6479-::165)9-+699-+;*@>91;15/#!$69"
15;0-.6336>15/;)*3-

Statement TRUE or FALSE

Text files can be lossy compression

.13-:)9--?)473-:6.36::3-::.13-+6479-::165

 .13-:)9-65)=-9)/-:4)33-9;0)5;0-4<:1+.13-:
:;69-,65)

 .13-:)9--?)473-:6.36::@.13-+6479-::165

' (

4 );).13-:)9-:;69-,15,1..-9-5;.13-.694);:

6473-;-;0-;)*3-*@796=1,15/):<1;)*3-.13-.694);.69-)+0.13-;@7-#0-.19:;65-0):*--5
,65-.69@6<

File type File format


1+;<9-: 
#-?;
"6<5,
%1,-6
' (

W The benefits and drawbacks of using a larger sampling resolution whenrecording


sound

Benefits Drawbacks
larger dynamic range produces larger file size

better sound quality takes longer to transmit/download music files

less sound distortion requires greater processing power


MUHAMMAD ALI KHAN
PAGE 12

 $GLJLWDODXGLRPHVVDJHQHHGVWREHUHFRUGHG

(a) 7LFN 9  one ER[ LQ HDFK URZ WR LGHQWLI\ WKH HIIHFW RI HDFK DFWLRQ RQ WKH DFFXUDF\ RI WKH
UHFRUGLQJ

Accuracy Accuracy Accuracy does


Action
increases decreases not change
&KDQJHWKHVDPSOLQJUDWHIURPN+]
WRN+]
&KDQJHWKHGXUDWLRQRIWKHUHFRUGLQJ
IURPPLQXWHVWRPLQXWHV
&KDQJHWKHVDPSOLQJUHVROXWLRQIURP
ELWVWRELWV
>@

(b) 7KHDXGLRPHVVDJHLVUHFRUGHGZLWKDVDPSOLQJUDWHRIN+]DQGDVDPSOLQJUHVROXWLRQRI
ELWV

7KHUHFRUGLQJLVPLQXWHVLQOHQJWK

&DOFXODWHWKHILOHVL]HRIWKHUHFRUGLQJ

*LYH\RXUDQVZHULQPHJDE\WHVandVKRZ\RXUZRUNLQJ

:RUNLQJ







$QVZHUPHJDE\WHV
>@
MUHAMMAD ALI KHAN
PAGE 13

$FRPSXWHUVWRUHVGDWDLQELQDU\IRUP

(a) 'UDZoneOLQHIURPHDFKGHVFULSWLRQWRLWVPDWFKLQJGHQDU\YDOXH

Description Denary value




7KHVPDOOHVWLQWHJHUWKDWFDQEH
UHSUHVHQWHGLQELWWZR¶VFRPSOHPHQW



7KHODUJHVWLQWHJHUWKDWFDQEH
UHSUHVHQWHGLQELWWZR¶VFRPSOHPHQW



7KHODUJHVWXQVLJQHGLQWHJHUWKDWFDQEH
UHSUHVHQWHGLQELWV




>@
MUHAMMAD ALI KHAN
PAGE 14

%BUBQBDLFUT
MUHAMMAD ALI KHAN
PAGE 15

 A website allows users to purchase items.

Computer A sends a request for the homepage to the website’s server.

(a) The request is sent using packet switching.

The structure of a packet of data has three elements. One element is the packet header.

(i) Identify two items of data contained in a packet header.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify the two other elements of a packet.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]
MUHAMMAD ALI KHAN
PAGE 19

4
 .FUIPETPGFSSPSEFUFDUJPO

 Check digits are used to ensure the accuracy of entered data.

A 7-digit number has an extra digit on the right, called the check digit.

digit position: 1 2 3 4 5 6 7 8

digit: – – –

check digit

The check digit is calculated as follows:

• each digit in the number is multiplied by its digit position


• the seven results are then added together
• this total is divided by 11
• the remainder gives the check digit (if the remainder = 10, the check digit is X)

(a) Calculate the check digit for the following number. Show all your working.

4      
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Check digit ................................................................................................................................


[2]

(b) An operator has just keyed in the following number:

3 2     


Circle below correct if the check digit is correct OR incorrect if the check digit is incorrect.

correct incorrect

Explain your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]
MUHAMMAD ALI KHAN
PAGE 20

2Datais transmitted from one device to another using the serial or parallel method.Tick () to show

which method transmits data one bit at a time.

  Tick () to show how many wires are used in parallel data transmission.

Number of wires Tick ()


Single wire
Multiple wires

Data transmission method Tick ()


Serial
Parallel

2 Describe the benefit of using parallel data transmission, instead of serial data transmission.

2 List two benefits of using serial data transmission, instead of parallel data transmission.

2 Which error detection method adds an 8th bit to 7 bits of data, to make each byte meet an odd or even check?
Circle the answer.
Parity check Checksum Echo check

2 In which error detection method does the receiver send data back to the sender, to compare the two versions of the data?
Circle the answer.
Parity check Checksum Echo check

 Which error detection method uses an algorithm to calculate a value from the data?This value is transmitted with the data
to the receiver. Circle the answer.

Parity check Checksum Echo check


PAGE 21

MUHAMMAD ALI KHAN


PAGE 22

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 23

4 (a) Three descriptions of data transmission are given below.

Tick () the appropriate box in each table to show the:

• type of transmission
• method of transmission

Description 1:
Tick Tick
Type Method
() ()
Data is transmitted several bits at
a time down several wires in both simplex serial
directions simultaneously.
half-duplex parallel

full-duplex

Description 2:
Tick Tick
Type Method
() ()
Data is transmitted in one direction
only, one bit at a time, down a simplex serial
single wire.
half-duplex parallel

full-duplex

Description 3:
Tick Tick
Type Method
() ()
Data is transmitted one bit at a
time down a single wire; the data simplex serial
is transmitted in both directions
but not at the same time.
half-duplex parallel

full-duplex

[6]

MUHAMMAD ALI KHAN
PAGE 24

 A website allows users to purchase items.

Computer A sends a request for the homepage to the website’s server.

(a) The request is sent using packet switching.

The structure of a packet of data has three elements. One element is the packet header.

(i) Identify two items of data contained in a packet header.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]

(ii) Identify the two other elements of a packet.

1 ........................................................................................................................................

2 ........................................................................................................................................
[2]
MUHAMMAD ALI KHAN
PAGE 25

(b) Computer A needs to be directly connected to a router that is located in a different room.

(i) Tick () one box to identify whether serial data transmission or parallel data transmission
is more suitable for this connection.

Explain the reasons for your choice.

Serial data transmission

Parallel data transmission

Reasons for your choice ...................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) The connection will also use full-duplex data transmission.

Define full-duplex data transmission.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

[Turn over
MUHAMMAD ALI KHAN
PAGE 26

10

(c) The data transmission will use parity checks.

(i) The bytes need to be sent using an even parity byte check.

Complete the parity bit for each byte.

Parity
bit

Byte A 1 1 0 0 0 1 1

Byte B 0 0 0 0 0 0 0

[2]

(ii) A parity block check can be used instead of a parity byte check.

Explain how a parity block check might detect an error in transmission that would not be
detected by a parity byte check.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
MUHAMMAD ALI KHAN
PAGE 27

11

(iii) The data was sent using an even parity block check. One of the bits has been transmitted
incorrectly.

Parity
Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7
bit

Byte 0 1 1 1 0 1 0 0 0

Byte 1 0 0 1 0 0 1 0 0

Byte 2 1 0 1 1 0 0 0 1

Byte 3 1 1 0 0 1 1 1 1

Byte 4 1 0 1 0 0 0 1 0

Byte 5 0 0 0 0 0 0 0 0

Byte 6 0 1 1 1 1 0 0 0

Parity
0 1 1 0 1 0 1 0
byte

Identify the bit number and the byte number of the incorrect bit.

Bit number ......................................

Byte number ......................................


[2]

[Turn over
MUHAMMAD ALI KHAN
PAGE 28

4 Five computer terms and seven descriptions are shown below.

Draw a line to connect each computer term to its correct description.

Computer term Description

Several bits of data sent down several


wires, in both directions, but not at the
same time
Serial, simplex data
transmission

Several bits of data sent down several


wires, in both directions, at the same
time

Parallel, half-duplex
data transmission
An even or odd number of bits set to 1
in a byte, used to check if the byte has
been transmitted correctly

One bit sent at a time, over a single wire


Parity check in one direction only

An additional digit placed at the end of a


number to check if the number has been
entered correctly
Automatic repeat
request (ARQ)

A value transmitted at the end of a block


of data; it is calculated using the other
elements in the data stream and is used
to check for transmission errors

Checksum An error detection method that uses


response and time out when transmitting
data; if a response is not sent back to
the sender in an agreed amount of time,
then the data is re-sent
MUHAMMAD ALI KHAN
PAGE 29

 &ODSZQUJPO

4 A message is encrypted using a private key and sent to an individual using asymmetric encryption.

(a) State what is meant by a private key.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe the process of asymmetric encryption.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

4 (a) State two differences between symmetric and asymmetric encryption.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
2 What is the name given to the data before encryption?

2 Name the encryption algorithm that is used to encrypt the data.

2 What is the name given to the data after encryption?


MUHAMMAD ALI KHAN
PAGE 30

 (a) Wiktor is an employee of a travel agent. He uses asymmetric encryption to send confidential
information to his manager.

Fill in the spaces with an appropriate term to complete the descriptions.

Asymmetric encryption uses different ……………………………. for encrypting and decrypting

data. When Wiktor sends a message to his manager, the message is encrypted into

««««««««««« XVLQJ KLV PDQDJHU·V ««««««««««« NH\ :KHQ WKH

manager receives the message, it is decrypted using her ……………………………. key.

:KHQWKHPDQDJHUUHSOLHVWKHPHVVDJHLVHQFU\SWHGXVLQJ:LNWRU·V«««««««««««

key, and when Wiktor receives the message, it is decrypted into …………………………….

using his ……………………………. key. [5]

(b) When customers pay for their travel booking online, a secure connection is established using
Secure Socket Layer (SSL).

([SODLQKRZWKHFXVWRPHU·VEURZVHUDQGWKHVHUYHUXVHGWRFROOHFWWKHSD\PHQWZLOOHVWDEOLVK
a secure connection.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]
MUHAMMAD ALI KHAN
PAGE 31

$PNQPOFOUTXJUIJOUIF$16

2Tick () to show which of the following components are an example of a register.

Component Tick 
Program counter
Address bus
Memory address register
Data bus
Memory data register
Control bus
Arithmetic logic unit
Control unit
Current instruction register
Accumulator

2Which register stores the address of the next instruction to be fetched into the CPU?

2What is the purpose of the memory address register (MAR)?

2When an instruction is fetched into the CPU, which component is it sent to first?

2What is the purpose of the control unit?


MUHAMMAD ALI KHAN
PAGE 32

Certain factors can affect the performance of the CPU, including the number of cores, the size of the cache, and the speed
of the clock.

2Draw a line from a component to its correct definition.

$PNQPOFOU %FGJOJUJPO

The component within the CPU responsible for


Clock
performing a single fetch-decode-execute cycle

The component that regulates the timing and


Core
speed of a computer

The component that stores frequently used


Cache
data and instructions

4 $FRPSXWHUKDVV\VWHPVRIWZDUH

D 7KH2SHUDWLQJ6\VWHPKDQGOHVLQWHUUXSWV

7LFN 9 RQH ER[ LQ HDFK URZ WR LGHQWLI\ ZKHWKHU HDFK HYHQW LV DQ H[DPSOH RI D KDUGZDUH
LQWHUUXSWRUDVRIWZDUHLQWHUUXSW

(YHQW +DUGZDUHLQWHUUXSW 6RIWZDUHLQWHUUXSW


%XIIHUIXOO
3ULQWHULVRXWRISDSHU
8VHUKDVSUHVVHGDNH\RQWKHNH\ERDUG
'LYLVLRQE\]HUR
3RZHUIDLOXUH
6WDFNRYHUIORZ
>@
MUHAMMAD ALI KHAN
PAGE 33

4

 Kelvin correctly answers an examination question about the Von Neumann

model.from his answer.


Eight different terms have been removed

           

Not all items in the list need to be used.

‡ accumulator (ACC)
‡ address bus
‡ arithmetic logic unit (ALU)
‡ control unit (CU)
‡ data bus
‡ executed
‡ fetches
‡ immediate access store (IAS)
‡ memory address register (MAR)
‡ memory data register (MDR)
‡ program counter (PC)
‡ saved
‡ transmits

The central processing unit (CPU) ....................................................................................

the data and instructions needed and stores them in the

.................................................................................... to wait to be processed.

The .................................................................................... holds the address of the next

instruction. This address is sent to the .................................................................................... .

The data from this address is sent to the .................................................................................... .

The instruction can then be decoded and .................................................................................... .

Any calculations that are carried out on the data are done by the

.................................................................................... . During calculations, the data is temporarily

held in a register called the .................................................................................... .


[8]
MUHAMMAD ALI KHAN
PAGE 34

(b) 7KHFRPSXWHUKDVD&RQWURO8QLW &8 V\VWHPFORFNDQGFRQWUROEXV

([SODLQ KRZ WKH &8 V\VWHP FORFN DQG FRQWURO EXV RSHUDWH WR WUDQVIHU GDWD EHWZHHQ WKH
FRPSRQHQWVRIWKHFRPSXWHUV\VWHP















  >@
MUHAMMAD ALI KHAN
PAGE 35

1

 
 

    

    




 
   

    


$ <(#1+</9 <4$/:4<<4(,0)'!( <"/2,</!<02/ 44/2<1%'5 672 <

, <6$ <5$3 <74 4<) *) < < <-<<

 

< <<

 
MUHAMMAD ALI KHAN
PAGE 36

 Six components of a computer are given.

Some are part of the central processing unit (CPU) of the Von Neumann model for a computer
system.

Tick () to show if each component is a CPU component or is Not a CPU component.

CPU Not a CPU


Component component component
() ()
Arithmetic logic unit (ALU)
Hard disk drive (HDD)
Memory address register (MAR)
Random access memory (RAM)
Solid state drive (SSD)
Control unit (CU)
[6]

 Four scenarios are given.

Identify the most suitable sensor for each scenario.

A different sensor must be used for each scenario.

Sensor Scenario

Detecting when a person is approaching an automatic


door system

Monitoring the pollution level in a river

Checking if a tropical aquarium is 25 degrees Celsius

Counting the number of cars that cross a bridge

[4]

[Turn over
MUHAMMAD ALI KHAN
PAGE 37

4 (a) State what is meant by the stored program concept in the Von Neumann
model of a computer system.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) A Central Processing Unit (CPU) contains several special purpose registers and other
components.

(i) State the role of the following registers.

Program Counter (PC) ......................................................................................................

...........................................................................................................................................

...........................................................................................................................................

*"4 ............................................................................................................

...........................................................................................................................................

...........................................................................................................................................

$PSF .........................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Tick (9) one box in each row to identify the system bus used by each CPU component.

CPU component Data bus Address bus Control bus

System clock

Memory Address Register (MAR)

[1]

(iii) Describe the purpose of .FNPSZ6OJU.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
MUHAMMAD ALI KHAN
PAGE 38

2

Six statements are shown on the left and nine computer terms on the right.
Draw lines to link each statement with its correct computer term.

branch of computer science where cognitive behaviour rules base


of the human brain is studied

search engine

when a machine shows superior performance to a human in


many tasks
strong AI

application that uses knowledge and inference to solve artificial intelligence


problems that would require human expertise

machine learning

repository of facts that is a collection of objects and their


attributes
robotics

contains the inference rules used to determine any matches expert system
between input data and stored data

knowledge base

sub-set of AI in which the algorithms are ‘trained’ and learn


from past experience and examples user interface

Task Control Monitor Expert


system

automatic control of the atmosphere in a large greenhouse (to ensure


ideal growing conditions)

self-parking system in a car

playing a strategy game, such as chess

an automatic weather station sending data to pilots flying near an


airport

a 24/7 check on patients in an intensive care unit of a hospital

automatic system used to diagnose the illness of a patient

automatic closing and opening of the doors on a train

fault identification in electronic devices together with suggested


actions to rectify the fault
MUHAMMAD ALI KHAN
PAGE 39

2 A student has a computer with the following specification:


O 2 GHz processor
O Dual core processor
O 32 kB cache

Describe two ways the performance of the computer can be improved. Why would this improve the performance?

 'UDZ one OLQH IURP HDFK 2SHUDWLQJ 6\VWHP 26  PDQDJHPHQW WDVN WR LWV PRVW DSSURSULDWH
GHVFULSWLRQ

OS Management task Description

G\QDPLFDOO\DOORFDWHVPHPRU\WR
SURFHVVHV

KDUGZDUHPDQDJHPHQW

PDUNVXQDOORFDWHGILOHVWRUDJH
IRUDYDLODELOLW\

VHFXULW\PDQDJHPHQW

LQVWDOOVSURJUDPVIRUGHYLFHV
FRQQHFWHGWRH[WHUQDOSRUWV

PHPRU\PDQDJHPHQW

YDOLGDWHVXVHUDQG
SURFHVVDXWKHQWLFLW\

SURFHVVPDQDJHPHQW

DOORZVSURFHVVHVWRWUDQVIHU
GDWDWRDQGIURPHDFKRWKHU

>@
MUHAMMAD ALI KHAN
PAGE 40

 *OQVUBOEPVUQVUEFWJDFT

 A security system uses three different types of sensor to detect intruders.

a Name three types of sensor that could be used.

1  

2  

3  

2Tick () to show whether each device is an example of an input device or an output device.

Device Input  Output 


Keyboard
Speaker
3D printer
Barcode scanner
Mouse
Monitor
Actuator
Sensor
MUHAMMAD ALI KHAN
PAGE 41

2 Eight types of sensor are shown on the left and eight potential sensor applications on the right.

Draw lines to connect each sensor to an appropriate application. Only one application can be
assigned to each sensor.
5&.1&3"563&4&/403
NFBTVSFTUFNQFSBUVSFPGUIFTVSSPVOEJOHTCZ
TFOEJOHTJHOBMT
Moisture sensor
USBOTEVDFSBOEHFOFSBUFTEJGGFSFOUFMFDUSJD
DVSSFOUTEFQFOEJOHPOUIFQSFTTVSFBQQMJFE
)VNJEJUZ
UIFTFTFOTPSTEFUFDUUIFQSFTFODFPGBOFBSCZ
PCKFDU

-JHIU4FOTPS
NFBTVSFTXBUFSMFWFMTJO GPSFYBNQMF TPJM

*OGSB3FE4FOTPS UIFTFTFOTPSTVTFVMUSBTPOJDT UPEFUFDUDIBOHJOH


MJRVJEMFWFMTJO GPSFYBNQMF BUBOL 

1SFTTVSF4FOTPS UIFTFVTFBOJOWJTJCMFCFBNPGJOGSBSFE
SBEJBUJPOQJDLFEVQCZBEFUFDUPS

Q)4FOTPS USBOTEVDFSBOEHFOFSBUFTEJGGFSFOUFMFDUSJDDVSSFOUT
EFQFOEJOHPOUIFQSFTTVSFBQQMJFE

UIFTFNFBTVSFBDJEJUZUISPVHIDIBOHFTJO
"DDFMFSPNFUFS WPMUBHFTJO GPSFYBNQMF TPJM

5VSOPOTUSFFUMJHIUTBVUPNBUJDBMMZ
1SPYJNJUZ4FOTPS

VTFEJOBOUJMPDLCSBLJOHTZTUFNTJODBST
'MPX4FOTPS

EFUFDUFETPVOEJOUPFMFDUSJDTJHOBMTQVMTFT
-FWFM4FOTPS
NFBTVSFBDDFMFSBUJPOBOENPUJPOPGBO
BQQMJDBUJPO
Magnetic field sensor
NFBTVSFHBTGMPXTJOQJQFT GPS
FYBNQMF OBUVSBMHB
("4

NFUIPETUPEFUFDUUIFHBTCFJOHNPOJUPSFE
BOEQSPEVDF
MUHAMMAD ALI KHAN
PAGE 42

: :/14&1:,!9/:*#,52.:#/:*'::$/:*&/*":

 (1 9: )-41:8 0:':  *51,61:8 :40: (::%0:+'0+"

&,61:8 : : ::

&,71:8 : :   ::

51,63:8 : ::


 :

 2)2  (,)2 ",)2!$2!,)",)2/2!$22!2)2!!0 2,((

/22$ )2/2 2   (

         

 ",)2!2$)2$2 ,$2 )!2 2!  2!$2

()! 2!2 2!")! 2)2 2$"!%)2 !&)! 2!(2

!,)",)2!22( 2#-)12"!)!$"2

!,)".)2!2 (/'2, $2#,)12*(2

 ",)2!22$2!"122 )!22!",)$2

2

 2!2)2-((2 2  /!/2)2 ",)2!$2!,)",)2!2)

 ($2*!(2!2"'/ ) 2 )2!((2!2)

 

2 22

                                                                                                                                  

  ($2 012!2 (,$ 2)2(-$*12!2)2+2 ()2!-(22


MUHAMMAD ALI KHAN
PAGE 43

-79$(/90*9*))199/.+0!*)90*909*..090-&9

. )909 .1%89.*&9.9


*+89)9*)6-2(9 )1*9%1.*) 9  *'0- /9
*&+30-.$9*.&9

4/9*9 (.+. (19/)/9-1(9


/(/99)1  1 *)919/99
19$* )9
789*9 (0 8 (99+./*(9
4),4%89

*+1 $9
.*( //9/+*")97*.9+11.(/9
.1.9
)9*&+-/91&91*9+10-)/9
-*)0*(9
/1*.9 (9&&*.89
 9

4/9*9&(419$1.*)96/9
*+1 $9&.#9
*(0( (9& .*+9(9)1((9
-*)0*(9
119(99.9-*'9/1(/94+9
9
1*9 9 &1./9

- *9
41*&1 919*%$1*(95/ (9 -,5)89
/(/*./9 (1 1 *(9
  9

/8/0'9119./9+) $9*-9+(9
6* 9
&."/9*(99+ 9*9++.9)9
-*)0*(9
+-1-' (9+*/!1 *(/9

 
MUHAMMAD ALI KHAN
PAGE 44

5ZQFTPGTUPSBHF
2 Which input device would be most suitable to enter a password into a computer?

2 Which input device would be most suitable to convert a hard copy of a document into a digital copy?

2 Which output device would be most suitable to allow shoppers to listen to an announcement in a supermarket?

Computers use different types of storage, including primary and secondary storage. Primary storage is directly accessed by the
CPU and secondary storage is not directly accessed by the CPU.

2Tick () to show whether each example is primary storage or secondary storage.

Primary Secondary
Storage example
storage  storage 
Read only memory (ROM)
Hard disk drive (HDD)
Random access memory (RAM)
Solid state drive (SSD)

2 Which storage examples are directly connected to the CPU?

2 Can you name three storage examples that are described as non-volatile because they do not lose the data they store when
power is turned off?
MUHAMMAD ALI KHAN
PAGE 45

2 Why does a computer system need both RAM and ROM?

2 Storage can be magnetic, optical, or solid state.

Tick() to show whether the statement about magnetic storage is true or false.

Magnetic storage True  False 


Uses lasers to create pits and lands on the surface of a disk
Data is stored on platters that are divided into tracks and sectors
An HDD is a type of magnetic storage
Uses transistors and control gates and floating gates
Has a read/write head that is moved across circular plates to read/write data
PAGE 46

MUHAMMAD ALI KHAN


PAGE 47

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 48

2
Cloud storage is another way to store data. Physical servers and storage devices are still used to store data in the cloud, but these
belong to a third party, rather than the individual or company that owns the data.

In a cloud storage system is data stored locally or remotely?

List two benefits to storing data in a cloud storage system.





List two drawbacks of storing data in a cloud storage system.





2
Circle all the examples of applications software.

Word processor Anti-virus Web browser

Database Disk Defragmenter Spreadsheet

Compression software Back-up software Graphics editing software

Presentation software Anti-malware Disk repair software


MUHAMMAD ALI KHAN
PAGE 49

4 $IDFWRU\PDNHVFKRFRODWHEDUV

7KHIDFWRU\XVHVDFRQYH\RUEHOWWKDWPRYHVWKHSURGXFWVIURPRQHVWDJHRISURGXFWLRQWRWKHQH[W
VWDJH

D $QDXWRPDWHGV\VWHPFRXQWVWKHQXPEHURIFKRFRODWHEDUVPDGHDWWKHHQGRISURGXFWLRQ

7KHV\VWHPLQFOXGHVDVHQVRUSRVLWLRQHGDERYHWKHFRQYH\RUEHOW

,GHQWLI\RQHDSSURSULDWHW\SHRIVHQVRUWKDWFDQEHXVHG

  >@

E $ VHFRQG DXWRPDWHG V\VWHP UHPRYHV FKRFRODWH EDUV ZLWK DQ LQFRUUHFW ZHLJKW IURP WKH
SURGXFWLRQOLQH

'HVFULEHWKHUROHRIDQDFWXDWRULQWKLVVHFRQGV\VWHP







  >@

F 7KHIDFWRU\KDVPDQ\GLIIHUHQWPDFKLQHVZLWKHPEHGGHGV\VWHPV

L ,GHQWLI\WZRIHDWXUHVRIHPEHGGHGV\VWHPV








>@

LL ,GHQWLI\RQHGUDZEDFNRIHPEHGGHGV\VWHPV



  >@
2
PAGE 50

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 51

[Turn over
MUHAMMAD ALI KHAN
PAGE 52

1

2(f,L?@L`6F.f?6VYfV2L`Vf-6_(fVZLQ/(fC(&6 f

e 
e 
e 7GY(RK@f3R'f&7V=
e (bY(SI@f2S'f'7V=
e +@V2fC(DLTc

 2(f[!?(f"(?L`fV2L`Vf-7_(fOOA7#Y8LGV

MRf(#2fOO@7#[6MHf$4LLW(f[2(fEMV[fOOTNOT6[(fW[NQ0(fC('6\Cf+TLCf[4(f@9VY

        

fOQN/UCC6I.f[(bYf"LL=fOSL_7'(&f`7[4f
XCP@(f#L'(f7Gf(@(#[QLF6#f,LQCf

YMQ/(fN+fP2LYM.TP2Wf6Hff&6.7[@f#C)Rf

f"#=\OfL,fY4(f#LCO@)Y(f f,:?(fVcV[(C f
YLf!(f >(OYfL++?9I(f

ZLQ.(fL+fLO(QZ7J/fVcVY(CfH'f
PPB6%[;LFVfVL+[`S(f

6D]@[G(N^VfR*$LT&7I.fF&fP@c"$>fL,f
_9&(Nf,9?(Vf`9Y2fR(CL_"@)fLOY9# ?fD)'<f



  D(fY2(fVYLS1(fD('7]Cfa56#2f7WfHf(bDP@(fL+ffVL?6&fV[[(fD(DLQdf

 

  6_(f "(G(,7YWfL-f\V6J0fVN?7'fVYY(fE(CLR7(V

 

f     ff

          


MUHAMMAD ALI KHAN
PAGE 53

(iii) One drawback of using virtual memory is disk thrashing.

Describe what is meant by the term disk thrashing.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

4-2'%)!/**))!/!$/!-(/**--!/ !"%)%/%*)

Internet term Definition

+-*#-(/$/''*2.0.!-/*1%!2
-*2.!-
2!+#!.

)/!-)!/!-1%!-*1% !- $!(%)+-*/**'/$/#*1!-)./$!


 /-).(%..%*)*" /0.%)#/$!)/!-)!/

4+!-!3/-)."!--*/**' $!2!.%/! -!../$/%./4+! %)/*/$!


  -!..-

)%"*-(!.*0-!*/*- ) -!..#%1!)/*!$ !1%!*))!/2*-&


 /%.+-*1% ! 4/$!)!/2*-&

0)%,0! -!..#%1!)/* !1%!*)


  -!..
)!/2*-&/%.+-*1% ! 4/$!()0"/0-!-

*(+)4/$/+-*1% !.*))!/%*)/*
 -!..
!../$!)/!-)!/


MUHAMMAD ALI KHAN
PAGE 54

2%JGGFSFOUJBUFCFUXFFO*1BEESFTTBOE."$"EESFTT 










4Five.//!(!)/.-!#%1!)*0/**&%!.

Tick/*.$*2%"/$!.//!(!)/%.True*-False

True False
Statement
() ()

**&%!.)!0.! /*./*-!0./*(!-5.-! %/-  !/%'.

**&%!.)!0.! /*/-&/$!%/!(.0./*(!-$.1%!2! *)2!.%/!

**&%!.2%''*--0+//$! /*)0./*(!-5.*(+0/!-

**&%!.-! *2)'* ! *)/*0./*(!-5.*(+0/!-

**&%!.)! !'!/! "-*(0./*(!-5.*(+0/!-



Study each statement.

Tick () to show whether the statement is true or false.

Statement True False


they are a form of spyware
they are used only in advertising
they are used to track browser use
they act in the same way as a virus
[4]
MUHAMMAD ALI KHAN
PAGE 55

2

An interrupt is a type of signal that tells the CPU something requires its attention. Each interrupt has a priority level that tells
the CPU how important it is. Interrupts are generated and handled constantly within a computer system, and there can be
hardware or software interrupts

  What are two examples of a hardware interrupt?

Example 1

Example 2

  What are two examples of a software interrupt?

Example 1

Example 2

2 Here are the stages that occur when an interrupt is serviced by the CPU. Order the stages. The first one has been done for you.

Stage Order
number
The CPU checks the priority of the next interrupt to see if it has a higher priority
than the current task being processed.
If the priority is lower, it leaves the interrupt in the interrupt queue and carries on
processing. If it is higher, the CPU stops and stores the current task being processed
and fetches the interrupt into the CPU to be processed.
When the CPU completes its current fetch-decode-execute cycle, it checks the
1
interrupt at the front of the interrupt queue.
The interrupt service routine (ISR) is called to handle the interrupt
When the interrupt is serviced, the CPU either fetches the task it stored back into
the CPU to be processed, or services another interrupt from the queue if it has a
higher priority.
The CPU checks the source of the interrupt.
MUHAMMAD ALI KHAN
PAGE 56

E ,3DGGUHVVHVFDQEHVWDWLFRUG\QDPLF

Differentiate between VWDWLFLQVWHDGRIDG\QDPLF,3DGGUHVV











  >@
MUHAMMAD ALI KHAN
PAGE 57

2 Label the three different parts of this URL:

AURL is a text-based address for a website. It is entered into the address bar in a web browser to access the website.
https://www.bbc.co.uk/news

2HTTP is a protocol used to transmit the data for webpages across the internet. A protocol is a set of rules that must be
followed when completing a task. So, the HTTP makes sure that data is transmitted from device to device following the
set rules. What is the difference between HTTP and HTTPS?

2 A web browser is used to view web pages that are sent using the internet. Its main function is to display these web
pages, and it does this by rendering the HTML files and other program code used to create the website. Name three other
functions of a web browser.

Function 1

Funct

Function 3
MUHAMMAD ALI KHAN
PAGE 58

4$ZHEVHUYHUKDVDSXEOLF,3YDGGUHVV

D 'UDZOLQHVWROLQNHDFKFKDUDFWHULVWLFWRLWVDSSURSULDWH,3DGGUHVV

&KDUDFWHULVWLF ,3DGGUHVV

&DQXVHKH[DGHFLPDOQRWDWLRQ

(DFKJURXSRIGLJLWVLVDQXPEHU
EHWZHHQDQG
,3Y

&RQVLVWVRIIRXUJURXSVRIGLJLWV

,3Y

8VHVGRXEOHFRORQV 

7KHWRWDOOHQJWKRIWKHDGGUHVVLVELWV

>@

LLL 7KHURXWHUKDVDQ,3YDGGUHVV

*LYHWKUHHGLIIHUHQFHVEHWZHHQWKHIRUPDWRIDQ,3YDGGUHVVDQGDQ,3YDGGUHVV












>@
MUHAMMAD ALI KHAN
PAGE 59

10

9 Three Internet terms are browser, Internet Protocol (IP) address and
Uniform Resource Locator (URL).

Five statements are given about the Internet terms.

Tick () to show which statements apply to each Internet term. Some statements may apply to
more than one Internet term.

Browser IP address URL


Statement
() () ()

it contains the domain name

it is a type of software

it converts Hypertext Markup Language (HTML)


to display web pages

it is a type of address

it stores cookies

[5]

10 Many devices have a Media Access Control (MAC) address.

Give three features of a MAC address.

Feature 1 ..........................................................................................................................................

..........................................................................................................................................................

Feature 2 ..........................................................................................................................................

..........................................................................................................................................................

Feature 3 ..........................................................................................................................................

..........................................................................................................................................................
[3]
MUHAMMAD ALI KHAN
PAGE 60

4 Ava needs to view a website and she knows the Uniform Resource Locator (URL).

(a) Complete the series of steps that take place.

Write the letter of the appropriate statement in each space.

A DNS finds corresponding IP

B DNS looks up URL in table

C Ava types the URL into a web browser

1 ..................................................

2 Web browser sends URL to Domain Name Service (DNS)

3 ..................................................

4 ..................................................

5 DNS returns IP address to web browser


[2]

(b) (i) An IPv4 address has been entered as 12.258.3

Give two reasons why this IP address is invalid.

1 .........................................................................................................................................

...........................................................................................................................................

2 .........................................................................................................................................

...........................................................................................................................................
[2]

(ii) An IPv6 address has been entered as 15EF:5L63::2014:BB::60AA

Give two reasons why this IP address is invalid.

1 .........................................................................................................................................

...........................................................................................................................................

2 .........................................................................................................................................

...........................................................................................................................................
[2]
MUHAMMAD ALI KHAN
PAGE 61

2 What is a digital ledger and how is it used?

2 What is the name of the digital ledger process used in tracking cryptocurrency?

2 Complete the missing terms and definitions of cyber security threats.

Term Definition
Packets of data are intercepted as they are sent across a network, often using a
packet sniffer.
A collective name for different types of malicious code that is downloaded onto a
user’s computer.
Brute-force attack

An email is sent to a user to encourage them to follow a link to a legitimate looking


website. The website is designed to get the user to enter personal details so they
can be stolen.
Social engineering

A user is encouraged to click a link or an attachment that downloads a malicious


code onto their hard drive, without their knowledge. The code redirects the user
to a legitimate-looking website when they type in an address for a real website.
The website is designed to get the user to enter personal details so they can be stolen.
Hacking
MUHAMMAD ALI KHAN
PAGE 62

2 a Indicate whether the following six statements about blockchaining are true or false by
placing a tick () in the correct box.
Blockchaining statement True () False ()
All digital currency systems use blockchaining
Blockchaining uses a decentralised database
The last block in a blockchain is known as the 'genesis block'
New hash values are only generated when data in a block is altered
Tampering of data in a block by a hacker would cause the hash value to change
Blocks are 'policed' by network users called 'miners'

b When a new transaction in cryptocurrency takes place, a new block is created.

Namethree values that would be SFRVJSFEfor this new block.

1  



2  



3  


2
PAGE 63

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 64

2 A blockchain has six blocks.

i Complete the diagram below to show how the six blocks are connected to form a
blockchain network. Use arrows to show any hash value links.

1 2 3 4 5 6

A4BF 6AB1 34EE FF12 AA00 BBB1 Hash value


of block
Connection
hash values

ii Describe what happens if block '4' was hacked and the hash value was changed to DD22.

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

......................................................................................................................................................................

2 Explain the difference between digital currency and cryptocurrency.

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................

............................................................................................................................................................................
MUHAMMAD ALI KHAN
PAGE 65

2 Eight descriptions and ten computer terms are shown in the diagram below.

Draw lines to connect each description to the correct computer term.


Devices that can move between point 'A' and point 'B' without the need for Rules base
manual input

Knowledge base
A form of AI that has been developed to mimic human knowledge and
expertise
Autonomous
Robots that roam the internet, scanning websites and categorising them
for search purposes
Chat bot

Simulated intelligence in machines; building of machines capable of


thinking like a human Artificial intelligence

A repository of facts and expertise in the form of a collection of objects Expert system
and their attributes

Combination of software and hardware designed and programmed to work Robotics


automatically without the need of any human interaction
Machine learning
A subset of AI in which the algorithms are 'trained' and can learn from
their past experience and from examples
Automated system
Branch of computer science that brings together the design, construction
and operation of 'intelligent' electromechanical machines Web crawler
MUHAMMAD ALI KHAN
PAGE 66

1 Computers can be infected with malware. Spyware is one example of malware.

(a) Tick () one box to show a correct definition of spyware.

A Software that activates a webcam and transmits the video to a third party
that outputs it live on a website.

B Software that detects when a password is being entered and then emails
the password to a third party.

C Software that records all data entered into a computer, analyses this data
to find email addresses and passwords, then posts these to a website.

D Software that records all key presses and transmits these to a third party.

[1]

(b) Complete the table by identifying and describing two other examples of malware.

Malware Description

...........................................................................................................

...........................................................................................................
......................................
1 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

...........................................................................................................

...........................................................................................................
......................................
2 ...........................................................................................................
......................................
...........................................................................................................

...........................................................................................................

[6]
MUHAMMAD ALI KHAN
PAGE 67

(c) Proxy-servers and firewalls have some similar functions.

Identify two similarities and one difference between proxy-servers and firewalls.

Similarity 1 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Similarity 2 ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Difference .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

[Turn over
MUHAMMAD ALI KHAN
PAGE 68

12

10 Mario has a website that he uses to sell his artwork.

(a) The website uses HTTPS to transmit data.

(i) Describe what is meant by HTTPS.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) One way a user can check a website uses HTTPS is to check whether the
Uniform Resource Locator (URL) begins with HTTPS.

Give one other way a user can check if a website uses HTTPS.

...........................................................................................................................................

..................................................................................................................................... [1]

(b) There is a risk that people that use the Internet to access websites can have their stored data
maliciously damaged.

State three ways that stored data can be maliciously damaged.

1 ................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................
[3]
MUHAMMAD ALI KHAN
PAGE 69

2 Secure socket layer (SSL) is a security protocol used to keep data secure when it is transmitted over the internet.
The table contains the stages that occur during the process of using SSL to secure and transmit data for an online
purchase over the internet. Put these stages in order, starting from 1.

SSL Stages Order


Encrypted communications then begin between the web browser and the web server
The web server sends its digital certificate to the web browser
The web browser authenticates the digital certificate
If the certificate is legitimate, the data to be sent is encrypted
The web browser sends a request to the web server asking it to identify itself

2 Firewalls are a common security measure that can help prevent against the use of several cyber security threats.
Tick() to show whether each statement about a firewall is true or false.

Statement True () False ()


Firewalls can be hardware or software based
Firewalls only monitor incoming traffic to a computer
A blacklist of websites can be set for the firewall to monitor
A user can set criteria and rules for the traffic passing through the firewall
Firewalls will automatically block all malicious traffic coming into the computer

2 A school has a firewall as a security measure to protect students and their data.

The given paragraph describe the operation of the firewall.

Can you fill in the gaps?

A firewall monitors and traffic from a


computer.

The user can set and for the traffic.

The firewall will any traffic that the

criteria. This can help prevent and


entering the computer.

The user can also set a of websites. These will be the only websites that can be
accessed from the computer.
MUHAMMAD ALI KHAN
PAGE 70

F 7ZRPDOZDUHWKUHDWVDUHVS\ZDUHDQGYLUXVHV

*LYHWZRVLPLODULWLHVDQGRQHGLIIHUHQFHEHWZHHQVS\ZDUHDQGDYLUXV

6LPLODULW\



6LPLODULW\



'LIIHUHQFH


>@
MUHAMMAD ALI KHAN
PAGE 71

2 What are the three main characteristics of a robot?

Characteristic 1

Characteristic 2

Characteristic 3

2 Can you name the four main parts of an expert system?

Part 1

Part 2

Part 3

Part 4
MUHAMMAD ALI KHAN
PAGE 72

4

Statement Interpreter Compiler

creates an executable file that runs directly on the


computer

more likely to crash the computer since the machine


code produced runs directly on the processor

easier to debug since each line of code is analysed


and checked before being executed

slow speed of execution of program loops

it is more difficult to modify the executable code,


since it is in machine code format
[5]
Statement true false
() ()

Assembly language uses mnemonic codes.

Assembly language programs do not need


a translator to be executed.

Assembly language is a low-level


programming language.

Assembly language is specific to the


computer hardware.

Assembly language is machine code.

Assembly language is often used to create


drivers for hardware.
[6]
MUHAMMAD ALI KHAN
PAGE 73

2Tick () to show whether each statement about interpreters is true or false.

Statement True  False 


Translate a line of code at a time then execute it.
Stop executing the code when an error occurs.
Report all syntax errors at the same time in a report.
Will not run the program at all until all errors are corrected.
Produce an executable file.

2 List four functions that can be included in an IDE.

Function 1

Function 2

Function 3

Function 4
MUHAMMAD ALI KHAN
PAGE 74

2 A programmer uses a high-level language to write a computer program.

(a) Four statements are given about high-level programming languages.

Tick () to show if each statement is True or False.

True False
Statement
() ()
High-level languages need to be translated into machine code to run on a
computer
High-level languages are written using mnemonic codes
+LJKOHYHOODQJXDJHVDUHVSHFLILFWRWKHFRPSXWHU·VKDUGZDUH
High-level languages are portable languages
[4]

(b) Tick () to show which of the following is an example of a high-level language program.

Tick
Example program
()
1011100000110000
0000011011100010
INP
STA ONE
INP
STA TWO
ADD ONE
a = input()
b = input()
if a == b:
print("Correct")
else:
print("Incorrect")
[1]

[Turn over
MUHAMMAD ALI KHAN
PAGE 75

7 David is writing a program using a high-level language. The program will be published and sold for
profit.

(a) David uses an interpreter when creating the computer program.

State three features of an interpreter.

Feature 1 ..................................................................................................................................

...................................................................................................................................................

Feature 2 ..................................................................................................................................

...................................................................................................................................................

Feature 3 ..................................................................................................................................

...................................................................................................................................................
[3]

(b) David compiles the program when he has completed it.

Explain two benefits of compiling the program.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]
MUHAMMAD ALI KHAN
PAGE 76

8 Dimitri is writing a computer program in a high-level language.

He needs to send just the machine code for the program to his friend, electronically.

It is important that the program is executed as quickly as possible.

Identify which translator will be most suitable for Dimitri to use. Explain your choice.

Type of translator .............................................................................................................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

9 An advertisement in a magazine displays this barcode:

(a) Identify this type of barcode.

.............................................................................................................................................. [1]

(b) Explain how the data stored in this barcode is read.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]
MUHAMMAD ALI KHAN
PAGE 77

1

 *- --$-- -## -$-%#-#$-    %-  $-

     

$-
% -$-'%-)#-- -!) -
## -

#%' - $ -$-#+$ --  ---


## - #% $-$#-

 #- $ $-$ '  #-  -$- -


## - ' -

% -$- '%--+ $ -&--


$#-- - ", -

 ##( - % -  $,-)#--$-#-- -


## -  '#-



       

       


MUHAMMAD ALI KHAN
PAGE 78

3 Five descriptions of different input or output devices are given in the table.

Complete the table by stating the name of each input or output device.

Description Name of device

This is an input device that works by shining a light


onto the surface of a document. The light source is
automatically moved across the document and the ...................................................
reflected light is captured by mirrors and lenses.

This is an input device where a laser or a light source is


moved across an object. The width, height and depth of
...................................................
the object are measured to allow a model to be created.

Displaying result on screen

...................................................

This is an output device that uses many small mirrors to


reflect light towards a lens. This will display an image. ...................................................

This is an output device that creates an object by


building layer upon layer of material. ...................................................

[5]
MUHAMMAD ALI KHAN
PAGE 79

PAGE 723

15

(d) The robot needs to find its way through different puzzles. Each puzzle has a series of paths
that the robot needs to follow to find its way to the end of the puzzle. The puzzle contains
dead ends and obstacles, so the robot needs to decide which way to go.

The robot’s program will use artificial intelligence (AI).

(i) Describe the characteristics of AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

(ii) Explain how the program will use AI.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]
MUHAMMAD ALI KHAN
PAGE 80

21Draw a diagram to represent how data is transmitted across a network using packet switching. Your diagram should include
a minimum of two devices and four routers.

32 Draw a diagram to show how data is transmitted using half-duplex data transmission.
MUHAMMAD ALI KHAN
PAGE 81

Computers sometimes use a type of memory called virtual memory. This allows the computer to continue processing data
when the RAM is full.

2 Draw a diagram that shows how virtual memory operates.

25 Complete the diagram to show the hierarchy in which these are run (e.g. part A is run on part B) so that the computer can
be fully operational.

Key parts within a computer are the hardware, the applications software, the operating system and the firmware. These are
required for the computer to be fully operational.
MUHAMMAD ALI KHAN
PAGE 82

4

 Computer A is communicating with computer B.

D Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The
direction of the data transmission must be fully labelled.

Simplex data transmission

Computer A Computer B

Duplex data transmission

Computer A Computer B

Half-duplex data transmission

Computer A Computer B
[6]

(b) State a use for the following data transmission methods. The use must be different for each
data transmission method.

Simplex .....................................................................................................................................

...................................................................................................................................................

Duplex ......................................................................................................................................

...................................................................................................................................................
[2]
MUHAMMAD ALI KHAN
PAGE 83

2

1BDLFU

Header Trailer

Some form of
The actual data
IP address of Size of the error checking
in the packets
the source packet (in to ensure
(~64 KiB) – the
device (sender) bytes) packet arrives
payload
error-free
2
PAGE 84

MUHAMMAD ALI KHAN


MUHAMMAD ALI KHAN
PAGE 85

Data is sent

Sender Data returned to sender Receiver

Data is re-sent if any errors found

V Figure 2.14 Echo check diagram

Plaintext Ciphertext Ciphertext


Encryption Decryption Plaintext
algorithm algorithm

Encryption Internet Decryption


key key

V Figure 2.18 Plaintext and ciphertext

CPU Memory Input/Output

Ports

Control bus

Address bus

Data bus

System bus

V Figure 3.2 System buses and memory


MUHAMMAD ALI KHAN
PAGE 86

Core 1 Core 2

(6 channels)

Core 3 Core 4

V Figure 3.5

RAM

Aerial input
HDMI output
Set-top box
Cable input Front end Interface
controller
Analogue
Satellite input audio output
SSD Front
panel Remote signal

Manual input

V Figure 3.8 Embedded system found in a set-top box

Security systems
Embedded systems are used in many security devices:
SSD RAM

Temperature

Sensor Security system


Pressure Output
inputs controller

Acoustic
Keypad
interface

V Figure 3.9 Embedded system found in a security system


MUHAMMAD ALI KHAN
PAGE 87

Control gate
Dielectric coating (insulation)
Floating gate
Tunnel oxide coating
(allows electrons through) Electron source
Substrate

V Figure 3.64 Flash memory

Computer Server internet

Computer SWITCH ROUTER

Computer LAN or WAN


LAN

V Figure 3.72 Router flow diagram


MUHAMMAD ALI KHAN
PAGE 88

SOFTWARE

SYSTEM APPLICATION
SOFTWARE SOFTWARE

Operating Utility Device Spread Word Data Internet Games


system programs drivers sheet processor base browser s/ware

V Figure 4.2 Software types

2%SBX5-4)FBEFS

You might also like