Revision Paper 1
Revision Paper 1
Revision Paper 1
Name: _______________________________________________
Date:
Time:
Gayana Dharmasena
Questions
Q1.
A player earns a badge for every 100 questions they answer correctly, providing this includes at least 10
hard questions or 30 medium questions.
This can be expressed as (NQ >= 100) and (HQ >= 10 or MQ >= 30).
Q2.
Customers pay online in advance to use the car park. Members of staff do not have to pay.
When a car arrives at the exit barrier, the system checks three conditions:
1) The number plate (P) has been recorded by the system.
2) Enough time (T) has been paid for.
3) The car belongs to a member of staff (S).
Construct a Boolean logic statement, using P, T and S, to represent the conditions necessary for the
system to raise the exit barrier.
(2)
P AND T AND S
.............................................................................................................................................
The system uses a hard disc to store images of car number plates.
Construct an expression that calculates how many bytes there are in four terabytes of disc storage.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q4.
1 KB = 1024 bytes
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Construct an expression to show how many seconds it will take to transmit 20 MB of data using a network
transmission speed of 2 Mbps
1 KB = 1024 bytes.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q6.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(i) The speed limit for some roads is 60 miles per hour.
Convert the denary number 60 to 8-bit binary.
(2)
00111010
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
0 1 1 0 1 1 0 1
Derive the ASCII code for the character 'D' in 8-bit binary.
(2)
.............................................................................................................................................
.............................................................................................................................................
(Total for question = 2 marks)
Q9.
network. An exmple of a mesh topology is the internet where even if large failures will happen
.............................................................................................................................................
the rest of the devices would still be able to communicate
.............................................................................................................................................
.............................................................................................................................................
Describe how an embedded system within a baby monitor can be used to alert parents about changes in
room temperature.
(3)
An embedded system can have a thermometre built into it that can help in detecting changes
.............................................................................................................................................
in temperature. The thermometre can link to a
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(Total for question = 3 marks)
11.
One function of a router is to forward data packets from one network to another across the internet.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(Total for question = 2 marks)
Q12.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Describe how the operating system uses virtual memory to manage the situation.
(4)
Virtual memory is space that is allocated on the secondary storage where the least frequently
.............................................................................................................................................
used data will be moved to. The virtual memory is created by the operating system and is mainly
.............................................................................................................................................
created so that more applications can run at the same time. After space on the RAM is free,
.............................................................................................................................................
the VRAM is deallocated and the data and instructions will be returned back to the RAM
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
to be paid in order to get them decrypted. All though more simple ransomware is easy for a know
.............................................................................................................................................
ledgable user to break into, more complex malware will clearly involve decrypting a users files.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(Total for question = 3 marks)
Q15.
Computers carry out mathematical operations.
The cache memory is memory that is present between the CPU and the main memory
.............................................................................................................................................
that will help in reducing the bottleneck problem caused between these two components.
.............................................................................................................................................
It is a temporary data storage that will store the most frequently used data by the CPU. This
.............................................................................................................................................
helps in boosting the overall speed of the computer
.............................................................................................................................................
The transport layer of network protocols splits data into packets before sending it.
Describe the process that ensures the data received matches the original.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q17.
Describe the role of the control unit, the data bus and the address bus when fetching an instruction from
memory.
(4)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
The hotel chain is considering replacing local backup methods with 'cloud' storage.
Discuss the advantages and disadvantages of using 'cloud' storage for backup.
(6)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
https://www.pearson.co.uk/secondary/programming/python.html
Draw a circle around the protocol and a rectangle around the domain name.
(2)
Q21.
One example of an embedded system in a car is windscreen wipers that automatically come on when it
rains.
(i) Explain how an embedded system could control the headlights of a car.
(3)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q23.
Explain why the car park system encrypts the data it stores.
(2)
The car park system encrypts the data it stores because in case its servers get hacked
.............................................................................................................................................
by a hacker or somehow a third party gains access, the encryption will prevent them from
.............................................................................................................................................
making any use of the number plates that they have found
.............................................................................................................................................
.............................................................................................................................................
Q24.
Give the result of applying a logical shift left by 2 to the 8-bit binary pattern 00110110.
(1)
11011000
.............................................................................................................................................
Identify the hardware component that holds a program that is currently being executed.
(1)
A ALU
x B RAM
C Hard drive
D Control unit
Q26.
Q27.
Identify the reason why unsigned integers should be used to record the number of cars entering and
leaving the car park, rather than signed integers.
(1)
A Unsigned integers are more accurate
x B Unsigned integers cannot have overflow errors
C Unsigned integers store more positive values
D Unsigned integers do not use a parity bit
Q28.
(i) Complete the diagram to show sampling frequency and label both axes.
(3)
(ii) State the advantage of using a bit depth of 16 rather than a bit depth of 8.
(1)
a bit depth of 16 allows a higher sampling frequency to be used than have a bit depth of 8
.............................................................................................................................................
, hence the quality of sound will be much higher
.............................................................................................................................................
Q29.
Wireless
A ..........................................................................................................................................
Wired
B ..........................................................................................................................................
Q31.
State the type of network needed to connect these hotels to the head office.
(1)
WAN
.............................................................................................................................................
Q32.
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
State why a binary search algorithm will not be appropriate for use with this sequence of numbers.
(1)
Binary search algorithm can only be used in sorted lists and this list isnt sorted
.............................................................................................................................................
.............................................................................................................................................
Q34.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
An organisation that supplies audiobooks over the internet is moving into a new office building.
.............................................................................................................................................
Updating all the devices connected on a computer simultaneously
2 ..........................................................................................................................................
.............................................................................................................................................
(ii) The organisation has chosen wireless connectivity over wired connectivity for its new office building.
There is no significant difference in the cost of installing either.
Give three reasons why the organisation might prefer wireless connectivity.
(3)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
3 ..........................................................................................................................................
.............................................................................................................................................
Q36.
An organisation that supplies audiobooks over the internet is moving into a new office building.
(i) A lossy compression algorithm reduces the size of a file by removing data.
Explain why data loss is acceptable when using lossy compression.
(2)
Data loss is acceptable when using lossy compression since when data is removed the file
.............................................................................................................................................
size might reduce but the quality of the file will remain same to the user due to their limited
.............................................................................................................................................
hearing range
.............................................................................................................................................
.............................................................................................................................................
(ii) A run-length encoding (RLE) algorithm reduces the size of a file based on runs of repeated items. For
example, wwwbbbwwbbbbbbwwww would be reduced to 3w3b2w6b4w.
Explain why RLE may NOT be a good choice for encoding a text file.
(2)
The encryption algorithm will not know which text is important and which one is not, hence
.............................................................................................................................................
even if text is removed, it would be grammatically incorrect and will not make sense to the user
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
D To prevent viruses
(iii) Explain one special condition a Caesar Cipher algorithm must handle.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
A company recycles digital devices. It uses computers and networks in its business.
Identify the term that refers to software that is out of date and vulnerable to cyberattack.
(1)
A Unaudited
B Untested
C Unstructured
x D Unpatched
Q39.
Programmers write software that controls hardware and interacts with users. Some of this software
ensures that networks function properly.
Best case and worst case for search algorithms can be determined based on the number of comparisons
necessary to find the target item.
Give the best case and worst case for a binary search algorithm.
(2)
Best case
Search item is in the middle of the list
.............................................................................................................................................
.............................................................................................................................................
Worst case
Search item is not in the list
.............................................................................................................................................
.............................................................................................................................................
A company recycles digital devices. It uses computers and networks in its business.
The company is concerned about the security of its own network. It employs a network specialist to
secure the network.
(i) Describe what is meant by the term 'penetration testing' when applied to networks.
(2)
Penetration testing is a sort of testing when a network is legally broken into inorder to check
.............................................................................................................................................
for security vulnerabilities and weaknesses that are present inside of it. This may be done from
.............................................................................................................................................
within the company or could be from an external agency who specializes in testing.
.............................................................................................................................................
.............................................................................................................................................
(ii) The network specialist uses a software tool to carry out a code review.
State two checks that are carried out during a code review.
(2)
Improper coding writing practices
1 ..........................................................................................................................................
.............................................................................................................................................
security of the code
2 ..........................................................................................................................................
.............................................................................................................................................
Q41.
An organisation that supplies audiobooks over the internet is moving into a new office building.
The organisation calculates how long it takes to transmit the audiobook over the internet.
1 MB = 10242 bytes
Construct an expression to show how many seconds it will take to transmit the audiobook file. Show your
unit conversions. You do not have to do the calculations.
(5)
81 * 1024 * 1024
.............................................................................................................................................
------------------------
54 * 1000 * 1000
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q42.
A company recycles digital devices. It uses computers and networks in its business.
The company stores details of its business such as recycling statistics on a server.
Users do not all have the same access to files stored on the server.
Explain the type of access to the statistics file a student on work experience at the company should be
given.
(2)
The student on a work experience might be given a read - only access. This might be in
.............................................................................................................................................
order to prevent accidental file deletion from occuring.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q43.
x C Converting files
D Translating programs
Q44.
(i) Identify the type of physical storage that uses electronic circuits.
(1)
A Solid state
B The cloud
C Magnetic
D Optical
.............................................................................................................................................
RAM
RAM stores data and instructions
.............................................................................................................................................
.............................................................................................................................................
Instructions
2 ..........................................................................................................................................
(iv) Identify the part of the CPU that sends signals to the other components.
(1)
A Arithmetic logic unit
x B Control unit
C Register
D Bus
Q45.
Programmers write software that controls hardware and interacts with users. Some of this software
ensures that networks function properly.
Virtualisation uses layers of abstraction to hide the details of hardware devices and processes from the
end user.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q46.
A company recycles digital devices. It uses computers and networks in its business.
Explain two ways in which the improper disposal of digital devices could be harmful to human health.
(4)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q47.
Programmers write software that controls hardware and interacts with users. Some of this software
ensures that networks function properly.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q48.
Programmers write software that controls hardware and interacts with users. Some of this software
ensures that networks function properly.
.............................................................................................................................................
A compiler creates a single executable file that is portable between devices
3 ..........................................................................................................................................
.............................................................................................................................................
4 ..........................................................................................................................................
.............................................................................................................................................