Revision Paper 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Amaan Jamal

Name: _______________________________________________

Computer Science - Revision


Paper 1

Date:

Time:

Total marks available:

Total marks achieved: ______

Gayana Dharmasena
Questions
Q1.

An online quiz asks students questions about computer science topics.

A player earns a badge for every 100 questions they answer correctly, providing this includes at least 10
hard questions or 30 medium questions.

This can be expressed as (NQ >= 100) and (HQ >= 10 or MQ >= 30).

Complete the truth table.


(6)

(Total for question = 6 marks)

Q2.

A car park uses a number plate recognition system.

Customers pay online in advance to use the car park. Members of staff do not have to pay.

When a car arrives at the exit barrier, the system checks three conditions:
1) The number plate (P) has been recorded by the system.
2) Enough time (T) has been paid for.
3) The car belongs to a member of staff (S).

Construct a Boolean logic statement, using P, T and S, to represent the conditions necessary for the
system to raise the exit barrier.
(2)
P AND T AND S
.............................................................................................................................................

(Total for question = 2 marks)


Q3.

A car park uses a number plate recognition system.

The system uses a hard disc to store images of car number plates.

One kilobyte is 1024 bytes.

Construct an expression that calculates how many bytes there are in four terabytes of disc storage.

You do not need to carry out the calculation.


(2)
4 x 1000 x 1000 x 1000 x 1000
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q4.

A computer stores images online.

An image uses 8-bit colour and is 64 pixels wide.

It uses 1MB of storage.

Construct an expression to calculate the height of the image in pixels.

1 KB = 1024 bytes

You do not have to do the calculation.


(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)


Q5.

A baby monitor uses a microphone to record sound.

Construct an expression to show how many seconds it will take to transmit 20 MB of data using a network
transmission speed of 2 Mbps

1 KB = 1024 bytes.

You do not have to do the calculation.


(4)
20 * 1000 * 1000
.............................................................................................................................................
-----------------------
2 * 1000 * 1000
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)

Q6.

An online quiz asks students questions about computer science topics.

One of the colours used in an image is 'cadet blue'.

'Cadet blue' in binary is 0101 1111 1001 1110 1010 0000

Convert 0101 1111 1001 1110 1010 0000 to hexadecimal.


(3)
5 F 9 E A 0
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 3 marks)


Q7.

A car has many embedded systems.

An embedded system processes binary numbers.

(i) The speed limit for some roads is 60 miles per hour.
Convert the denary number 60 to 8-bit binary.
(2)
00111010
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(ii) The car displays speed limits in denary.


Convert the 8-bit binary number 0010 0011 to denary.
(2)
35
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(iii) The embedded system adds numbers in binary.


Complete the table to show the result of 0010 0011 + 0100 1010
(2)

0 1 1 0 1 1 0 1

(Total for question = 6 marks)


8.

A car park uses a number plate recognition system.

The ASCII code for the character 'R' is 82 in denary.

Derive the ASCII code for the character 'D' in 8-bit binary.
(2)
.............................................................................................................................................

.............................................................................................................................................
(Total for question = 2 marks)
Q9.

Describe a mesh network topology.


(2)
A mesh network topology is a topology in which each node will extend the range of the
.............................................................................................................................................

network. An exmple of a mesh topology is the internet where even if large failures will happen
.............................................................................................................................................
the rest of the devices would still be able to communicate
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)


Q10.

A baby monitor uses a microphone to record sound.

Describe how an embedded system within a baby monitor can be used to alert parents about changes in
room temperature.
(3)
An embedded system can have a thermometre built into it that can help in detecting changes
.............................................................................................................................................
in temperature. The thermometre can link to a
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................
(Total for question = 3 marks)
11.

The internet is the world's largest network.

One function of a router is to forward data packets from one network to another across the internet.

Describe how a router carries out this function.


(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................
(Total for question = 2 marks)
Q12.

A teacher uses tablet computers with students to teach programming online.

Describe how data is stored on solid state devices.


(3)
Data is stored on solid state drives by using electrons that will alter their state
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 3 marks)


Q13.

A computer stores images online.

The computer runs seven applications, at the same time.

The sum of their memory usage exceeds that of physical memory.

However, all seven applications run.

Describe how the operating system uses virtual memory to manage the situation.
(4)
Virtual memory is space that is allocated on the secondary storage where the least frequently
.............................................................................................................................................

used data will be moved to. The virtual memory is created by the operating system and is mainly
.............................................................................................................................................
created so that more applications can run at the same time. After space on the RAM is free,
.............................................................................................................................................
the VRAM is deallocated and the data and instructions will be returned back to the RAM
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)


Q14.

A computer stores images online.

This notification appears on a computer screen.

Describe how this cyber attack operates.


(3)
Ransomware is a type of cyber attack in which a users files are encrypted and a ransom has
.............................................................................................................................................

to be paid in order to get them decrypted. All though more simple ransomware is easy for a know
.............................................................................................................................................
ledgable user to break into, more complex malware will clearly involve decrypting a users files.
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................
(Total for question = 3 marks)

Q15.
Computers carry out mathematical operations.

Describe the function of the component labelled A.


(2)

The cache memory is memory that is present between the CPU and the main memory
.............................................................................................................................................
that will help in reducing the bottleneck problem caused between these two components.
.............................................................................................................................................
It is a temporary data storage that will store the most frequently used data by the CPU. This
.............................................................................................................................................
helps in boosting the overall speed of the computer
.............................................................................................................................................

(Total for question = 2 marks)


Q16.

The internet is the world's largest network.

The transport layer of network protocols splits data into packets before sending it.

Describe the process that ensures the data received matches the original.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q17.

Computers carry out mathematical operations.

Describe the role of the control unit, the data bus and the address bus when fetching an instruction from
memory.
(4)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)


Q18.

The hotel chain is considering replacing local backup methods with 'cloud' storage.

Discuss the advantages and disadvantages of using 'cloud' storage for backup.
(6)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 6 marks)


Q19.

Discuss the features of high-level and low-level programming languages.


(6)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 6 marks)


Q20.

Here is a uniform resource locator.

https://www.pearson.co.uk/secondary/programming/python.html

Draw a circle around the protocol and a rectangle around the domain name.
(2)

(Total for question = 2 marks)

Q21.

A car has many embedded systems.

One example of an embedded system in a car is windscreen wipers that automatically come on when it
rains.

(i) Explain how an embedded system could control the headlights of a car.
(3)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(ii) A bit can have two different states.


State how many bits are needed to represent the 26 capital letters A to Z.
Give a reason for your answer.
(2)
Number of bits
5 bits
.............................................................................................................................................
Reason
a minimum of 5 bits needs to be used in order to encode the 26 capital letters
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 5 marks)


Q22.

The internet is the world's largest network.

Explain why it is important to review network and user policies.


(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q23.

A car park uses a number plate recognition system.

Explain why the car park system encrypts the data it stores.
(2)
The car park system encrypts the data it stores because in case its servers get hacked
.............................................................................................................................................

by a hacker or somehow a third party gains access, the encryption will prevent them from
.............................................................................................................................................
making any use of the number plates that they have found
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q24.

Computers carry out mathematical operations.

Give the result of applying a logical shift left by 2 to the 8-bit binary pattern 00110110.
(1)
11011000
.............................................................................................................................................

(Total for question = 1 mark)


Q25.

A baby monitor uses a microphone to record sound.

Identify the hardware component that holds a program that is currently being executed.
(1)
A ALU
x B RAM
C Hard drive
D Control unit

(Total for question = 1 mark)

Q26.

Identify the protocol used to transfer data in networks.


(1)
A HTML
x B TCP/IP
C ISP
D URL

(Total for question = 1 mark)

Q27.

A car park uses a number plate recognition system.

Identify the reason why unsigned integers should be used to record the number of cars entering and
leaving the car park, rather than signed integers.
(1)
A Unsigned integers are more accurate
x B Unsigned integers cannot have overflow errors
C Unsigned integers store more positive values
D Unsigned integers do not use a parity bit

(Total for question = 1 mark)

Q28.

A baby monitor uses a microphone to record sound.


An analogue to digital converter is used to change the sounds received by the microphone into a form
that can be processed by a computer.

(i) Complete the diagram to show sampling frequency and label both axes.
(3)

(ii) State the advantage of using a bit depth of 16 rather than a bit depth of 8.
(1)
a bit depth of 16 allows a higher sampling frequency to be used than have a bit depth of 8
.............................................................................................................................................
, hence the quality of sound will be much higher
.............................................................................................................................................

(Total for question = 4 marks)

Q29.

The diagram shows two different types of connectivity media.

State the different types of connectivity media used at A and B.


(2)

Wireless
A ..........................................................................................................................................
Wired
B ..........................................................................................................................................

(Total for question = 2 marks)


Q30.

A computer stores images online.

A code review is an important stage in software development.

State the purpose of a code review.


(1)
Code review helps in identifying the issues and vulnerabilities present in code and may
.............................................................................................................................................
help in detecting incorrect coding practices
.............................................................................................................................................

(Total for question = 1 mark)

Q31.

The chain has hotels in several countries.

State the type of network needed to connect these hotels to the head office.
(1)
WAN
.............................................................................................................................................

(Total for question = 1 mark)

Q32.

State two functions of utility software.


(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)


Q33.

Computers carry out mathematical operations.

State why a binary search algorithm will not be appropriate for use with this sequence of numbers.

(1)
Binary search algorithm can only be used in sorted lists and this list isnt sorted
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 1 mark)

Q34.

An online quiz asks students questions about computer science topics.

Images are used in some of the questions.

(i) An image is 300 pixels high and 200 pixels wide.


Construct an expression to calculate how many pixels are needed to represent this image.
(1)
300 x 200
.............................................................................................................................................

.............................................................................................................................................

(ii) An image file uses 24-bit colour depth.


Describe how 24-bits are used to represent the colour in the file.
(3)
24 bits is known as true color. True color is the color in which each of the primary colors
.............................................................................................................................................
will be assigned with 2^8 colors. This means that it will be 2 ^ 8 = red, 2 ^ 8 = blue, 2 ^ 8 = green
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)


Q35.

An organisation that supplies audiobooks over the internet is moving into a new office building.

One reason for networking devices is to provide access to the internet.

(i) Give two other reasons for connecting devices to networks.


(2)
Sharing files between computers connected on a network
1 ..........................................................................................................................................

.............................................................................................................................................
Updating all the devices connected on a computer simultaneously
2 ..........................................................................................................................................

.............................................................................................................................................

(ii) The organisation has chosen wireless connectivity over wired connectivity for its new office building.
There is no significant difference in the cost of installing either.
Give three reasons why the organisation might prefer wireless connectivity.
(3)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

3 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 5 marks)

Q36.

An organisation that supplies audiobooks over the internet is moving into a new office building.

Each audiobook is compressed before it is released.

(i) A lossy compression algorithm reduces the size of a file by removing data.
Explain why data loss is acceptable when using lossy compression.
(2)
Data loss is acceptable when using lossy compression since when data is removed the file
.............................................................................................................................................

size might reduce but the quality of the file will remain same to the user due to their limited
.............................................................................................................................................
hearing range
.............................................................................................................................................

.............................................................................................................................................
(ii) A run-length encoding (RLE) algorithm reduces the size of a file based on runs of repeated items. For
example, wwwbbbwwbbbbbbwwww would be reduced to 3w3b2w6b4w.
Explain why RLE may NOT be a good choice for encoding a text file.
(2)
The encryption algorithm will not know which text is important and which one is not, hence
.............................................................................................................................................
even if text is removed, it would be grammatically incorrect and will not make sense to the user
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)


Q37.

A car has many embedded systems.

One of the embedded systems in the car collects real-time data.

The data is encrypted.

(i) Identify one reason why encryption is used.


(1)
A To prevent data corruption

B To reduce network transmission times

x C To keep data secure

D To prevent viruses

(ii) Complete the table using a Caesar Cipher algorithm.


(2)

(iii) Explain one special condition a Caesar Cipher algorithm must handle.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 5 marks)


Q38.

A company recycles digital devices. It uses computers and networks in its business.

Identify the term that refers to software that is out of date and vulnerable to cyberattack.
(1)
A Unaudited

B Untested

C Unstructured

x D Unpatched

(Total for question = 1 mark)

Q39.

Programmers write software that controls hardware and interacts with users. Some of this software
ensures that networks function properly.

Best case and worst case for search algorithms can be determined based on the number of comparisons
necessary to find the target item.

Give the best case and worst case for a binary search algorithm.
(2)
Best case
Search item is in the middle of the list
.............................................................................................................................................

.............................................................................................................................................

Worst case
Search item is not in the list
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)


Q40.

A company recycles digital devices. It uses computers and networks in its business.

The company is concerned about the security of its own network. It employs a network specialist to
secure the network.

(i) Describe what is meant by the term 'penetration testing' when applied to networks.
(2)
Penetration testing is a sort of testing when a network is legally broken into inorder to check
.............................................................................................................................................
for security vulnerabilities and weaknesses that are present inside of it. This may be done from
.............................................................................................................................................
within the company or could be from an external agency who specializes in testing.
.............................................................................................................................................

.............................................................................................................................................

(ii) The network specialist uses a software tool to carry out a code review.
State two checks that are carried out during a code review.
(2)
Improper coding writing practices
1 ..........................................................................................................................................

.............................................................................................................................................
security of the code
2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)

Q41.

An organisation that supplies audiobooks over the internet is moving into a new office building.

The organisation calculates how long it takes to transmit the audiobook over the internet.

1 Mbps = 10002 bps

1 MB = 10242 bytes

The network transmission speed is 54 Mbps.

An audiobook file is 81 MB in size.

Construct an expression to show how many seconds it will take to transmit the audiobook file. Show your
unit conversions. You do not have to do the calculations.
(5)
81 * 1024 * 1024
.............................................................................................................................................
------------------------
54 * 1000 * 1000
.............................................................................................................................................

.............................................................................................................................................
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 5 marks)

Q42.

A company recycles digital devices. It uses computers and networks in its business.

The company stores details of its business such as recycling statistics on a server.

Users do not all have the same access to files stored on the server.

Explain the type of access to the statistics file a student on work experience at the company should be
given.
(2)
The student on a work experience might be given a read - only access. This might be in
.............................................................................................................................................
order to prevent accidental file deletion from occuring.
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q43.

A company is developing a computer for use in schools.

The computer needs an operating system and utility software.

(i) The operating system controls the scheduling of processes.


Describe how the operating system uses scheduling to allocate processor time.
(2)
.............................................................................................................................................
In a multitasking operating system where multiple tasks run simultaneously, the operating
.............................................................................................................................................
system decides which task should run in which order and how much time would be allocated
.............................................................................................................................................
to the running of each task.
.............................................................................................................................................

(ii) Identify the function of utility software.


(1)
A Repairing secondary storage

B Formatting cache memory

x C Converting files

D Translating programs

(Total for question = 3 marks)

Q44.

A company is developing a computer for use in schools.

All computers have a CPU, memory and storage.

(i) Identify the type of physical storage that uses electronic circuits.
(1)
A Solid state

B The cloud

C Magnetic

D Optical

(ii) State what ROM and RAM store.


(2)
ROM
ROM stores bios and firmware that will be required when a device is turned on
.............................................................................................................................................

.............................................................................................................................................
RAM
RAM stores data and instructions
.............................................................................................................................................

.............................................................................................................................................

(iii) John von Neumann proposed the concept of a stored program.


State the two items he proposed to store in main memory.
(2)
1 ..........................................................................................................................................
Data

Instructions
2 ..........................................................................................................................................

(iv) Identify the part of the CPU that sends signals to the other components.
(1)
A Arithmetic logic unit

x B Control unit

C Register

D Bus

(Total for question = 6 marks)

Q45.

Programmers write software that controls hardware and interacts with users. Some of this software
ensures that networks function properly.

Virtualisation uses layers of abstraction to hide the details of hardware devices and processes from the
end user.

'Cloud storage can be viewed as a virtualisation.'

Discuss this statement.


(6)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 6 marks)

Q46.

A company recycles digital devices. It uses computers and networks in its business.

Explain two ways in which the improper disposal of digital devices could be harmful to human health.
(4)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)

Q47.

Programmers write software that controls hardware and interacts with users. Some of this software
ensures that networks function properly.

Routers have an important role in how the internet functions.

Describe how a router directs data on the internet.


(5)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 5 marks)

Q48.

Programmers write software that controls hardware and interacts with users. Some of this software
ensures that networks function properly.

Compilers and interpreters translate source code written in programming languages.

State four other features of a compiler.


(4)
A compiler compiles the source code and after its been compiled, it does not have to
1 ..........................................................................................................................................
be translated again
.............................................................................................................................................
A compiler is much faster since code does not have to be translated more than once
2 ..........................................................................................................................................

.............................................................................................................................................
A compiler creates a single executable file that is portable between devices
3 ..........................................................................................................................................

.............................................................................................................................................

4 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)

You might also like