Professional Documents
Culture Documents
Fye Practice
Fye Practice
1. Binary data is type of data that is represented or displayed in the binary numeral system. Binary
data is the only data that can be processed by a computer or computer systems.
a) Explain why binary data is the only data that can be processed by a computer.
....................................................................................................................................
Computer can only understand machine code (1/0)
....................................................................................................................................
.................................................................................................................................... [3]
53 = ............................................................................................................................
00110101 [1]
124 = ..........................................................................................................................
01111100 [1]
222 = ..........................................................................................................................
11011110 [1]
Working Space
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
c) Hexadecimal is a numbering system with base 16. It can be used to represent large
numbers with fewer digits. Give the binary value for each hexadecimal value.
F4 ...............................................................................................................................
11110100 [2]
9D ..............................................................................................................................
10011101 [2]
Working Space
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
FYE/SEC3E/CS/QP
✅
2. The modern computers are based on a stored-program concept introduced by John Von
Neumann. A computer with a central processing unit (CPU). Data is retrieved from the
a) State the name of the primary storage from which data is retrieved.
....................................................................................................................................
RAM [1]
b) The CPU takes one cycle to process the data. Fetching is the first stage of this cycle.
a) List two components within the CPU that are used in the fetch stage of the cycle.
Component 1 ............................................................................................................
PC ( Program counter) [1]
Component 2 ............................................................................................................
MAR (memory address register) [1]
3. MP4 is a common “container format” that allows you to store a lot of multimedia information in a
Text o
Sound o
Video o
[1]
FYE/SEC3E/CS/QP
4
4. They are three type of storage, magnetic, optical and solid state.
a) A Solid State Drive (SSD) is a well-known solid state storage that is used for gaming PCs.
....................................................................................................................................
Flashdisk, memory card [1]
b) Laser technology is used by optical storage to store and read data from a disc.
Explain how the laser is used to store and read data from the disc.
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
.................................................................................................................................... [3]
c) Mobile devices such as smartphones and tablets are using SSD to store data..
i. List three reasons why an SSD is the most suitable secondary storage over Hard
Disk (HDD).
Reason 1 ........................................................................................................
Faster [1]
Reason 2 ........................................................................................................
Durable [1]
Reason 3 ........................................................................................................
Efficient since its lighter [1]
ii. Aside from the operating system, list two (2) other software that can be stored on
the SSD.
Software 1 ......................................................................................................
Spreadsheet [1]
Software 2 ......................................................................................................
Word processor [1]
5. Biometrics are commonly used for verifying or recognizing user identity, for example fingerprint
....................................................................................................................................
Biometric is a form of password using biological characteristics such as fingerprint, iris recognition , face recognition, voic
....................................................................................................................................
and voice recognition [1]
FYE/SEC3E/CS/QP
5
Advantage 1 ...............................................................................................................
More secure
.................................................................................................................................... [1]
Advantage 2 ...............................................................................................................
More convenient
.................................................................................................................................... [1]
c) A Student installed a software-based firewall on his mobile device. Firewalls collect data
about traffic entering and leaving mobile devices. Explain how a firewall uses the data it
...................................................................................................................................
Firewall will examine outgoing or in going data package, suspicious data package will be blocked
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
....................................................................................................................................
.................................................................................................................................... [4]
6. Image files are composed of digital data in one of these formats so that the data can be displayed
on a digital (computer) display. The image is 8-bit colour and its size is 1024 pixels high and 400
pixels wide. Calculate the file size of the image in kilobytes. Show all your working.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
FYE/SEC3E/CS/QP
6
Feature 1 Available
...............................................................................................................................
for all network devices
................................................................................................................................................ [1]
Feature 2 Consists
...............................................................................................................................
of 6 segments, each segment consists of 2 hexadecimal numbers
................................................................................................................................................ [1]
Feature 3 ...............................................................................................................................
Unique
................................................................................................................................................ [1]
8. An output device is any piece of computer hardware equipment which converts information into
Example 1 ..............................................................................................................................
Monitor [1]
Example 2 ..............................................................................................................................
Speaker [1]
9. An input device is a piece of equipment used to provide data and control signals to an information
Example 1 ..............................................................................................................................
Mic [1]
Example 2 ..............................................................................................................................
Keyboard [1]
Example 3 ..............................................................................................................................
Scanner [1]
FYE/SEC3E/CS/QP
7
10. State five sensors that could be used in the following applications.
11. Browser, Internet Protocol (IP) address and Uniform Resource Locator (URL) are Internet terms.
Five statements are given about the Internet terms. Tick (ü) to show which statements apply to
each Internet term. Some statements may apply to more than one Internet term.
[5]
12. A company transmits data to an external storage at the end of each day.
a) Parity checks can be used to check for errors during data transmission.
i. Aside from Parity check, state one other method that could be used to check for
transmission errors.
........................................................................................................................
Check digit, checksum, echo check [1]
FYE/SEC3E/CS/QP
✅
ii. The system uses odd parity. Tick (✓) to show for each of the received bytes
11111110
00011100
10101101
[4]
........................................................................................................................
Serial data transmission is a process of transferring data using a single wire
........................................................................................................................
........................................................................................................................
........................................................................................................................ [2]
........................................................................................................................
USB, telephone, CCTV, internet
........................................................................................................................ [1]
iii. Explain why serial data transmission is preferred for transferring data over a
long distance.
........................................................................................................................
- cost less
........................................................................................................................
- less interference
........................................................................................................................
........................................................................................................................ [2]
FYE/SEC3E/CS/QP
9
c) Encryption is a way of scrambling data so that only authorized parties can understand
Type 1 : ..........................................................................................................
Symmetric [1]
Type 2 : ..........................................................................................................
Assymetric [1]
ii. Describe methods that can be used to increase the security level of encryption.
........................................................................................................................
Enlarge the number of encryption key
........................................................................................................................ [2]
a) ....................................................................................................................................
Software interrupt [1]
Definition : ..................................................................................................................
....................................................................................................................................
.................................................................................................................................... [2]
b) ....................................................................................................................................
Hardware interrupt [1]
Definition : ..................................................................................................................
....................................................................................................................................
.................................................................................................................................... [2]
14. There are two (2) types of software translators, they are the compiler and interpreter. Each of
a) The similarity between a compiler and an interpreter is that they both translate a high-
level language into machine language. Name another similarity between a compiler and
an interpreter.
....................................................................................................................................
Both produce error code
.................................................................................................................................... [1]
FYE/SEC3E/CS/QP
10
....................................................................................................................................
Compiler do compile all at once
....................................................................................................................................
Interpreter line by line
....................................................................................................................................
Compiler produce executable file
....................................................................................................................................
Interpreter does not produce executable file [4]
15. Tick (✓) whether these statement about Digital Currency below are true or false.
16. Given the table below, identify the type of data being described by the following expression.
FYE_Score ß 49 Integer
[5]
FYE/SEC3E/CS/QP
11
17. Write a python program to identify whether the number input is odd or even number
[4]
18. Essentially, AI is just a collection of rules and data, and the ability to reason, learn and adapt to
external stimuli. There are three (3) categories of AI. List one (1) and describe.
................................................................................................................................................ [1]
Description : ...........................................................................................................................
................................................................................................................................................
................................................................................................................................................ [2]
FYE/SEC3E/CS/QP
12
19. Analyse and interpret the following pseudo code below. Create the equivalent flowchart.
FOR X ß1 TO 10
OUTPUT X * 9
END FOR
[5]
FYE/SEC3E/CS/QP