Computer Science Past Paper
Computer Science Past Paper
Computer Science Past Paper
com
2
1 To process an instruction, a central processing unit (CPU) goes through a cycle that has three
main stages.
Stage 1 ................................................................................
Stage 2 ................................................................................
Stage 3 ................................................................................
[3]
2 Name each of the potential security issues described in the five statements below:
[5]
Parallel, half-duplex
data transmission
An even or odd number of bits set to 1
in a byte, used to check if the byte has
been transmitted correctly
[5]
© UCLES 2016 0478/11/O/N/16 [Turn over
www.dynamicpapers.com
4
(a) Staff currently use a keyboard to input a customer food order into a computer. The food order
is then sent to the kitchen.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) A concept keyboard has a flat surface that is overlaid with images of food items available
from the restaurant menu. Staff can click on an image to add the food item to a customer food
order.
The Henslows Diner wants to change to a concept keyboard to input customer food orders.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) The Henslows Diner stores personal data on a computer. This computer is connected to the
Internet to allow the data to be backed up.
There is currently one security method in place to protect the data on the computer from
unauthorised access. This is a password.
Give two other security methods that could be added to improve the security of the data.
Describe how each method will keep the data safe.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
5 Three switches, A, B and C, each send values of 0 or 1 to a logic circuit. Value X is output from the
logic circuit.
Switch A
Switch B Logic circuit Output X
Switch C
OR
B X
[5]
(b) Complete the truth table for the conditions given at the start of question 5.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) A microprocessor regularly samples the output, X. Each sample value is stored in an 8-bit
register as shown below. One bit of this register is reserved as a parity bit.
1 1 1 1 1 0 0 1 Register Y
0 1 0 1 1 1 1 1 Register Z
Register .............................................[1]
(d) When eight bytes of data have been collected, they are transmitted to a computer 100 km
away. Parity checks are carried out to identify if the data has been transmitted correctly. The
system uses even parity and column 1 is the parity bit.
The eight bytes of data are sent together with a ninth parity byte:
byte ...............................................................................................................................[1]
column ...........................................................................................................................[1]
(iii) The incorrect bit is indicated where the byte number and column cross.
[1]
...........................................................................................................................................
.......................................................................................................................................[1]
(v) Considering the fault condition given in part (c), explain why it is very important that the
incorrect bit is located and corrected.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
© UCLES 2016 0478/11/O/N/16
www.dynamicpapers.com
9
State two advantages of using a high-level language and two advantages of using a low-level
language.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
7 Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode (LED) backlit technology.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
Draw lines to indicate which descriptions refer to a compiler and which descriptions refer to an
interpreter.
Description
[4]
Describe how the sensors and microprocessor interact to switch on the security light when an
intruder is detected.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
10 (a) A manufacturer of aeroplane engines assigns a denary identification number (ID) to each
engine.
[2]
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) The current status of the engine is sent to a computer in the aeroplane.
Each piece of data collected is 8 bytes in size. Data collection occurs every 30 seconds.
Calculate the number of kilobytes that would be needed to store the data collected during a
10-hour flight. Show your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................. kilobytes
[3]
(c) At the end of the flight, all of the data are sent to the aeroplane engine manufacturer using the
Internet.
...................................................................................................................................................
...................................................................................................................................................
IP address .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(d) When sending this data, security is very important. Data are sent over the Internet using
Transport Layer Security (TLS) protocol.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]