Computer Science Paper
Computer Science Paper
Computer Science Paper
COMPUTER SCIENCE
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
[Turn over
2
(a) The first three hexadecimal values he reads are 15, 102 and A9.
15 ..............................................................................................................................................
102 ............................................................................................................................................
A9 .............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) Pradeep has two 8-bit binary values that he needs to convert to hexadecimal values for his
project.
Give the hexadecimal values for the two 8-bit binary values.
01010000 ..................................................................................................................................
00111101 ..................................................................................................................................
[4]
ahmedfaraz123381@gmail.com
3
Tick (✓) to show if each hardware device is an Input, Output or Storage device.
Using the list given, complete the paragraph. Not all terms in the list need to be used.
• actuators
• binary
• black
• input
• microprocessors
• output
• sensors
• storage
• white
and the light is reflected back. The................................................ bars in the barcode reflect
............................................... are used to capture the amount of reflected light and the
381@gmail.com
ahmedfaraz123
[Turn over 4
5
3 Thomas has an online business that sells homemade furniture. He has a web server that hosts his
website for his business.
(a) Describe the role of a web browser in requesting and displaying the web pages for the
website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Thomas is worried about a denial of service (DoS) attack on his web server.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
ahmedfaraz123381@gmail.com
6
Complete the table giving the missing Term for each definition.
Term Definition
381@gmail.com
ahmedfaraz123
[Turn over 7
8
The checkout is linked to a stock control system. The system monitors stock levels and
automatically keeps them above a minimum level.
Explain how the stock control system automatically keeps the stock levels above a minimum
level.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The software for the stock control system is stored on a central computer. The computer uses
random access memory (RAM), read only memory (ROM) and a hard disk drive (HDD).
The computer is a Von Neumann model computer system with a central processing
unit (CPU).
(i) State the purpose of the RAM, ROM and HDD in the central computer.
RAM ..................................................................................................................................
...........................................................................................................................................
ROM ..................................................................................................................................
...........................................................................................................................................
HDD ..................................................................................................................................
...........................................................................................................................................
[3]
Component 1 .....................................................................................................................
Component 2 .....................................................................................................................
Component 3 .....................................................................................................................
Component 4 .....................................................................................................................
[4]
ahmedfaraz123381@gmail.com
9
All logic gates must have a maximum of two inputs. Do not attempt to simplify the logic
statement.
B X
[4]
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
381@gmail.com
ahmedfaraz123
[Turn over 10
11
7 Edie uses a firewall to help prevent her children from accessing websites that she does not want
them to see.
(a) Describe how the firewall helps prevent her children from accessing these websites.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Edie is concerned that her children may download a virus when accessing websites.
State what is meant by a virus and explain what could happen if a virus was downloaded.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(i) Give two ways that her children can identify if a website is secure.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
ahmedfaraz123381@gmail.com
12
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
Tick (✓) to show whether the statement applies to a 3D printer, an Inkjet printer or a Laser printer.
3D Inkjet Laser
Statement
(✓) (✓) (✓)
Uses a moving print head
Uses liquid ink
Produces output using materials such as plastic and resin
Uses piezoelectric or thermal technology
Uses a rotating drum to transfer the image to the paper
Uses layer upon layer of material to create the output
[6]
381@gmail.com
ahmedfaraz123
[Turn over 13
14
9 Four 7-bit binary values are being transmitted from one computer to another. An odd parity check
is being used to check for errors in the binary values.
Write the correct Parity bit for each 7-bit binary value to make sure it meets odd parity.
..................... 0000011
..................... 1000000
..................... 0111111
..................... 1010101
[4]
10 Clive has a laptop computer that he uses for his business. He enters a username and password to
log in to his laptop.
Clive is worried about spyware being used to find out his username and password.
(a) Describe how spyware could be used to find out Clive’s username and password.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The threat of spyware makes Clive concerned about typing a password to log in to his laptop.
Give an example of how Clive could log in securely without typing a password.
............................................................................................................................................. [1]
15
BLANK PAGE
16
BLANK PAGE