0% found this document useful (0 votes)
3 views54 pages

Chapter 1 Data Representation Guess Papers

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 54

3$*(


3$*(
3$*(

1 Jane answers an examination question about computers and data correctly.


Six different words or numbers have been removed from her answer.

&RPSOHWHWKHVHQWHQFHVLQ-DQH·VDQVZHUXVLQJWKHOLVWJLYHQ1RWDOOLWHPVLQWKHOLVWQHHGWREH
&RPSOHWHWKHVHQWHQFHVLQ-DQH·VDQVZHUXVLQJWKHOLVWJLYHQ1RWDOOLWHPVLQWKHOLVWQHHGWREH
used.

• 2
• 10
• 16
• analogue
• binary
• denary
• digital
• hexadecimal

As humans, we process …………………………………… data, but a computer cannot

process this type of data. For a computer to be able to process data it needs to be

converted to …………………………………… data.

As humans, we mostly use a ……


………………………………… number system;
……………………………………

this is a base ……………


…………
…………
………………… number system.
……………………………………

Computers u se a …
use ………………
…… ………
……………
………
……
……………………………………… numb
nu ber ssystem;
number yste
ystem
tem;

this is a b ase ……
as
base …………………
………………… number system.
……………………………………
[6]

2 Dheera
aj identifies
Dheeraj id
den
entititifififie
es three hexadec
eccimal numbers.
hexadecimal

Write the denary number for each


ea
ach of the three hexadecimal numbers:

2A ......................................
...............................................................
....................................................................................................

101 ...................................................................................................

21E ..................................................................................................

[3]

Working Space

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2018 2210/11/M/J/18


3$*(

4 Michele wants to email a file to Elsa. The file is too large so it must be compressed.

(a) Name two types of compression that Michele could use.

Compression type 1 ..................................................................................................................

Compression type 2 ..................................................................................................................


[2]

(b) The file Michele is sending contains the source code for a large computer program.

Identify which type of compression would be most suitable for Michele to use.

Explain your choice.

Compression type ......................................................................................................................

Explanation ................................................................................................................................

...................................................................................................................................................

...........................................
.........................................................................................................
...................................................................................................................................................

.................................
...
. ..................................................................................................................
...................................................................................................................................................

...........
........
. ..
....
....
..................................................
. ......................................................................
. ..........................
...................................................................................................................................................

........
.........
...........
. ..............................................................................................................................
...................................................................................................................................................
[4]

© UCLES 2018 2210/11/M/J/18


3$*(

1 Different units of data can be used to represent the size of a file, as it changes in size.

Fill in the missing units of data, using the list given:

• byte
• gigabyte (GB)
• megabyte (MB)
• nibble

The units of data increase in size from smallest to largest.

Smallest bit

………………………………………………..

………………………………………………..

kilobyte (kB)

………………………………………………..

……
………
……………
…………
…………
……
………
………
…………
…………
…...
………………………………………………..

Largest
Larg
La rges
rgestt
es terabyte
terabyte (TB)
[4]

2 (a) Nancy
nccy has
Nanc ha captured images
imagees of her holiday with her camera. The captured images are stored
as digital photo files on herr ccamera.
amera.

Explain how the captured ima


images
m ges are converted to digital photo files.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2018 2210/12/M/J/18


3$*(

(b) Nancy wants to email the photos to Nadia.

Many of the photos are very large files, so Nancy needs to reduce their file size as much as
possible.

Identify which type of compression would be most suitable for Nancy to use. Explain your
choice.

Compression type .....................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...........................................
.........................................................................................................
...................................................................................................................................................
[4]

3 A stopwatch uses six digiti s tto


ig
digits o dis
issplayy hours,, minutes and seconds.
display

The st
top
pwa
w tch
tc
ch is sstopped
stopwatch topp
topped at:
pp

0 2 3 1 5 8
Hours
H
Ho urs Minutes Seconds

An 8-bit register is used to store


ee ach pair of digits.
each

(a) Write the 8-bit binary numbers


numbe
ers that are currently stored for the Hours, Minutes and Seconds.

Hours

Minutes

Seconds

[3]

© UCLES 2018 2210/12/M/J/18 [Turn over


3$*(

(b) The stopwatch is started again and then stopped.

When the watch is stopped, the 8-bit binary registers show:

Hours 0 0 0 0 0 1 0 1

Minutes 0 0 0 1 1 0 1 0

Seconds 0 0 1 1 0 1 1 1

Write the denary values that will now be shown on the stopwatch.

Hours Minutes Seconds


[3]

4 Jafar is using the Internett when


wh
hen
en he
he gets the message:

“D0
03, page
“D03, pa e is
is not
no
ot available”
a aiila
av abl
b e”
e

Jafar reme
emb
mber
erss th
er
remembers that
at hexadecim
mal is often used to represent binary values in error codes.
hexadecimal

Conver
ertt the
er
Convert th
he hexadecimal
hexa
hexa
hexade
d ci
de cim
mal number
e in the error message into 12-bit binary.
er

[3]

© UCLES 2018 2210/12/M/J/18


3$*(

1 Computers use a character set to convert text into binary.

One character set that can be used is ASCII.

Each letter in ASCII can also be represented as a denary value.

(a) The word BUS has the denary values:

B U S

66 85 83

Convert the denary values into 8-bit binary.

66

85

83
[3]

Each
(b) Each letter
ach let er in
ette n ASCII
SCII can also
ASC alsso be
e represented
rep
epre
esent d ass a hexadecimal
nted
ted hexxade
he deci mall value.
cima vallue.
va e

The
Th word
he wo
w rd
dKKEY has
EY h 8-bit
as the 8-bi
it binary values:

K E Y

01001011 01000101 01011001

(i) Convert the three 8-bit binary values into hexadecimal.

01001011 ...............................................

01000101 ...............................................

01011001 ...............................................
[3]

© UCLES 2018 2210/12/O/N/18


3$*(

(ii) Give three other uses of hexadecimal notation in computer science.

1 .........................................................................................................................................

2 .........................................................................................................................................

3 .........................................................................................................................................
[3]

(iii) State two benefits of using hexadecimal notation to represent binary values.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

2 A computer uses RAM and ROM


M to store data.

(a) The table contains thr


hree
hr ee
threee st
tatements about RAM or ROM.
statements

) to sshow
Tick (() ho
ow wh
wheether ea
whether each sstatement
each ta
ate
eme
ent des
esscr
cribe
es RAM
describes RA oorr ROM.
RO
O M.

RAM ROM
Statement
S
St
tatement
() ()

Stores
orres tthe
Stor programs
he prog
ro data
grams and da
ata that are currently in use

computer
Used to boot up the compu
ut when power is turned on
uter
ut

Contents are retained when


n power is turned off
[3]

(b) Circle the storage category that includes both RAM and ROM.

Primary Secondary Off-line


[1]

(c) Explain what is meant by off-line storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 2210/12/O/N/18 [Turn over


3$*(

4 The MAC address of a device is represented using hexadecimal.

A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary.

(a) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The
first number has already been converted.

6A FF 08 93
01101010
[3]

(b) Explain why data is stored as binary in computers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...........................................
.....................................................................................................[2]
...............................................................................................................................................[2]

5 Data can be transferred using


usin
usin
ng half-duplex
ha
alf-duplex serial transmission.

(a) Describe
Descri
riibe serial
ser
eria
ia
al transmission.
trran
anssmission
on.
on

........
.........
........
....
.................................................................................................................................
...................................................................................................................................................

....................................................................................................................................................
....
...
....
....
.......
. ...............................................................................................................................................

.....
...
......
..............................................................................................................................................
...................................................................................................................................................

.............................................
...................................................................................................[2]
...............................................................................................................................................[2]

(b) Give one application of serial


seriial data transmission.

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Describe half-duplex data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 2210/13/O/N/18


3$*(

(c) David needs to send a large section of the programming code as an email attachment.

He uses lossless compression to reduce the file size.

Explain how the file size is reduced.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 2210/13/O/N/18 [Turn over


3$*(

1 Hexadecimal is used for MAC addresses.

Part of a MAC address is given:

97 – 5C – E1
Each pair of digits is stored as binary in an 8-bit register.

(a) Show what the binary register stores for each pair of the given digits.

97

5C

E1
[6]

(b) Explain what is meant by a MAC address.

...................................................................................................................................................
...........................................
.........................................................................................................

...............................
...
....
....
..................................................................................................................
...................................................................................................................................................

.......
.....
......
....................
...................................
. ..
. ......
.....................................
.........................
............
. ............
................................................................................................................................................... ................

.......
..................
....
. ............................................................................................................................
...................................................................................................................................................

..
..........
.. ......................
. .....................................................................................................................
. .......
...................................................................................................................................................

...........................................
..........................................................................................................
...................................................................................................................................................

.............................................
........................................................................................................
...................................................................................................................................................

.............................................
.................................................................................................. [4]
.............................................................................................................................................

(c) Give two other examples where hexadecimal can be used.

Example 1 .................................................................................................................................

...................................................................................................................................................

Example 2 .................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 2210/11/M/J/19


3$*(

5 The following text is stored as a text file:

She sells sea shells on the seashore. The shells that she sells are sea shells I am sure.

Explain how lossless compression would compress this file.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................
. .........................................................................................................
..
..........................................................................................................................................................

......................................
......
.... ...........
..........................................................................................................
..........................................................................................................................................................

.............
...
..............
....
....
..........................
. .............
.........
.............
....
. ...............................
. ................................................
..........................................................................................................................................................

..............
........
............
....
. ..................
. ................................................................................................. [5]
....................................................................................................................................................

© UCLES 2019 2210/11/M/J/19 [Turn over


3$*(

4 (a) Marley wants to store a video he has created for his school project.

He considers using a DVD or a Blu-ray to store the video.

Explain two differences between a DVD and a Blu-ray.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...........................................
.........................................................................................................
...................................................................................................................................................
[2]

(b) (i) Marley also needs


need
edss to
ed t sstore
tore ten 8-bit colour images in a file for his project.

Ea
ach iimage
Each ma
age
ge iis
s 50
500 pix
xels w
xe
pixels id
de and
wide d3 00 pi
300 p x lss h
xe
pixels ig
gh.
high.

&
&D
DOFFXO
XODW
DWH
DW HWK
WKHWRWDOILOH VL]HLQPHJDE\WHV 0% IRUDOO0DUOH\·VLPDJHV
&DOFXODWHWKHWRWDOILOHVL]HLQPHJDE\WHV

Sh
how all
Show all your
you
ourr working..

...
.............................................................................................................................................
...........................................................................................................................................

....................................
........................................................................................................
...........................................................................................................................................

.....................................
........................................................................................................
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

File size ....................................................... MB


[3]

© UCLES 2019 2210/12/M/J/19


3$*(

1 Computer memory size is measured in multiples of bytes.

Fourr statements about computer memory sizes are given in the table.

Tick () to show if the statement is True or False.

True False
Statement
() ()
25 kB is larger than 100 MB
999 MB is larger than 50 GB
3500 kB is smaller than 2 GB
2350 bytes is smaller than 2 kB
[4]

2 The Von Neumann model for a computer system uses several components in the fetch-execute
cycle. One component that is used is the Control Unit (CU).

Identify fourr other components tthat


hat are used in the Von Neumann model for a computer system.

1 ....................................
......................................................................................................................
...
.......................................................................................................................................................

2 .............
......
. .....
. ........
. ..................................
............
.....................................
.........................
.............
. ..........................
.......................................................................................................................................................

3 ...........
..........
. .........
.. .................................................................................................................................
.......................................................................................................................................................

4 ...
....
.. .....
.....
....
....
....
.......
. ..
....
....
.....................................................................................................................................
.......................................................................................................................................................
[4]

3 The data from a sensor must be converted


converted from analogue to digital to be processed by a computer.

(a) State what is meant by analo


logue data.
lo
analogue

...................................................................................................................................................

............................................................................................................................................. [1]

(b) State what is meant by digital data.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2019 2210/12/O/N/19


3$*(

4 An 8-bit binary register contains the value:

0 0 1 1 0 1 0 0

(a) Convert the binary value to denary.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) The contents of the register shifted one place to the right would give the result:

0 0 0 1 1 0 1 0

The contents of the register shown at the start of question 4 are shifted two places to the left.

Show the contents of the register after this shift has taken place.

[1]

(c) State the effect


ct tthis
his sh
hi shift ha
as on
has n tthe
he den
nary va
denary valu
l e in
lu
value n pa
part
r ((a).
a).
a)

.........
............
.......................................................................................................................................
...................................................................................................................................................

....
....
.....................
............................................................................................................................. [1]
.............................................................................................................................................

5 Audrey wants to send a sound file


filie to Nico using email.

The file is too large to attach to an email so Audrey decides to compress the file.
an

She uses lossy compression to reduce the size of the sound file.

(a) Describe how lossy compression reduces the size of the sound file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 2210/12/O/N/19 [Turn over


3$*(

(b) Nico asks Audrey why she used lossy compression rather than lossless.

(i) State one advantage Audrey could give of using lossy rather than lossless to compress
the sound file.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State one disadvantage Nico could give of using lossy rather than lossless to compress
the sound file.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) Audrey sometimes records MIDI files.

(i) Explain what is meant by a MIDI file.

...................................
.........................................................................................................
...........................................................................................................................................

...............................
................................................................................................................
...........................................................................................................................................

...................
........
....
.....................................................................................................................
...........................................................................................................................................

.....
.......
. .....
.........................................
.......................
. .................
.. ..........
. ..............
.........
......
......
.......................................
...........................................................................................................................................

............................................................................................................................................
................................................................................................................................................

............................................................................................................................................
...............
................................................................................................................................

...................................
..........................................................................................................
...........................................................................................................................................

.....................................
. ................................................................................................ [4]
..
.....................................................................................................................................

(ii) MIDI uses serial data transmission.

Explain two advantages of using serial transmission rather than parallel transmission.

Advantage 1 ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Advantage 2 ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2019 2210/12/O/N/19
3$*(

(iii) 7KHOLEUDU\·VDUFKLYHV\VWHPXVHVDQHUURUGHWHFWLRQDQGFRUUHFWLRQV\VWHPWKDWFRPELQHV
a parity check with an automatic repeat request (ARQ).

Describe how this system uses the parity check and ARQ.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................
.........................................................................................................
...........................................................................................................................................

.........................
...
. ..................................................................................................................
...........................................................................................................................................

...
........
. ..
....
....
..................................................
. ....................................
. ..................................
. ...........................
...........................................................................................................................................

...
.....
...........
. ........................................................................................................................ [6]
.....................................................................................................................................

(c) Th
The
e libr
llibrary
ibra
brrar
ary ha
ary hass a website th
website hat customers can use to search for a book.
that

(i) T
Thhe
Thee website
web
we bsite has a background
back
ckground colour with the hexadecimal colour code #F92A10
ck

The colour code is store


red in two 12-bit binary registers.
re
stored

Show how the colour code


co
ode would be stored in the registers.

F92

A10
[6]

© UCLES 2019 2210/13/O/N/19 [Turn over


3$*(

(ii) Videos on the library website show customers which books the library will soon have
in stock.

The library wants the file size of a video to be as small as possible.

Identify and describe a method the library could use to reduce the file size of a video as
much as possible.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................
.........................................................................................................
...........................................................................................................................................

...............................
.......................................................................................................... [4]
.....................................................................................................................................

(d) The library often ho


old
ldss even
holds nts that introduce new authors.
events

the
he events,
At the event
vents,
ve s,, the
the library has
hass a Liquid
Liq
qui
u d Crystal
Crrys
ysta
tal Display
ta Disp
Di spllay
sp lay (LCD)
(LCD
(LC ) screen
CD scrreen
sc e that
tha
hatt displays
disp
displa
ays data,
includdin
ing an image
including im
ma age and information
infor
ormation about the author.
or

Desc
Descri
scribe
be how
Describe how an
an LCD
LCD screen
scre
een operates to display this data.

.....
...
....
. ..
.............................................................................................................................................
...................................................................................................................................................

............................................
........................................................................................................
...................................................................................................................................................

.............................................
........................................................................................................
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2019 2210/13/O/N/19


3$*(

10

9 Programs can be written in a low-level language.

(a) Identify three features of a low-level language.

Feature 1 ..................................................................................................................................

Feature 2 ..................................................................................................................................

Feature 3 ..................................................................................................................................
[3]

(b) Give two examples of a low-level language.

Example 1 .................................................................................................................................

Example 2 .................................................................................................................................
[2]

(c) Give one drawback of writing programs in a low-level language, instead of a high-level
language.

...........................................
.........................................................................................................
...................................................................................................................................................

.................................
...
. ............................................................................................................ [1]
.............................................................................................................................................

(d) A low-leeve
vell language
low-level la
ang
ngua
uage
ge needs
ds to
o be converted
co
onvertted to binary
onv bina
bina
nary before
bef
e ore
e itit can
can be
be processed
proc
pro esse
s d by a
comp
com ut
mp uter
e.
er
computer.

(i) G ive
ve tthe
Give he
e 8-bit
8-bi
8- biit binary vvalue
alue of the two denary values:

1 0 .....................................................................................................................................
18
180 ......................................................................................................................................

201 ............................
..........................................................................................................
....................................................................................................................................
[2]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

© UCLES 2020 2210/11/M/J/20


3$*(

11

(ii) Give the 12-bit binary value of the denary value 250.

..................................................................................................................................... [1]

Working space

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(iii) Binary can be represented as hexadecimal to make it easier to read.

Give the hexadecimal values of the 8-bit binary values:

10010011 ...........................................................................................................................

00011101 ....................
..........................................................................................................
...........................................................................................................................
[2]

© UCLES 2020 2210/11/M/J/20


3$*(

7 (a) Give the denary value of each of the three 12-bit binary values.

(i) 000000001100

..................................................................................................................................... [1]

(ii) 000011000110

..................................................................................................................................... [1]

(iii) 010011000001

..................................................................................................................................... [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...........................................
.........................................................................................................
...................................................................................................................................................

......................................
...............................................................................................................
...
...................................................................................................................................................

...........................
.............................................................................................................................
...................................................................................................................................................

..
.....................
. .....
.............................................................
....................
..........
. ..............
.........
......
.....................
................................................................................................................................................... . ......
................

.....
...
. ..
..................................................................................................................................................
...................................................................................................................................................

((b)
b) 12-bit
12-b
bitt binary
bin
inar
aryy values
ar valu
values can also
alsso be represented as hexadecimal values.

u of the 12-bit binary value.


ue
Give the hexadecimal value

000011101001

............................................................................................................................................. [3]

© UCLES 2020 2210/12/M/J/20 [Turn over


3$*(

1 Tina is creating a website for charity events. She uses HTML to create the website.

(a) State what is meant by HTML.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website.

(i) State whether background colour is an example of structure or presentation, in the


website.

..................................................................................................................................... [1]

(ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers.

Give the 8-bit binary values for each part of the hexadecimal code.

43

B7

F0
[6]

(c)
c)) Ti
Tina
na u
na uses
sess a microphone
se micr
mic ophone to record
cr record a welcome message for her website.

(i) State
S
St t whether the microphone
tat
ate micrrophone is an input or output device.

.....................................................................................................................................
.....................................
.................................................................................................. [1]

© UCLES 2020 2210/12/O/N/20


3$*(

(ii) She wants to compress the recording to make sure that the file is as small as possible
for the website.

Identify which type of compression she should use and describe how this would compress
the file for the website.

Type of compression .........................................................................................................

Description

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................
...
. ......................................................................................................
...........................................................................................................................................

...............................
...............................................................................................................
...........................................................................................................................................

.....................
...
....
....
.............................................................................................................. [4]
.....................................................................................................................................

(iii)) Gi
ive tw
Give ttwo
ob enef
enefits of compressing
ef
benefits com
omprresssi
sing
g the
the
e file
fiile
e for
fo the
the website.
webs
bsitite
bs e.

Bene
Be n fi
ne fitt 1 ...
Benefit .....................
. .......................................................................................................
............................................................................................................................

............................................................................................................................................
................
. ..............................................................................................................................

B enefit 2 ....................
Benefit ..........................................................................................................
............................................................................................................................

.....................................
........................................................................................................
...........................................................................................................................................
[2]

© UCLES 2020 2210/12/O/N/20 [Turn over


3$*(

3 (a) Fourr denary to 8-bit binary conversions are given.

Tick () to show if each denary to 8-bit binary conversion is Correct or Incorrect.

Correct Incorrect
Denary Binary Conversion
() ()
145 10010001

179 10110101

11 00010011

100 01100010
[4]

(b) Convert the 12-bit binary number into hexadecimal.

1 1 0 0 0 1 0 0 0 0 0 0

.............................................................................................................................................
...........................................
................................................................................................... [3]

4 Eugene has a web server


er that
serve
ve hat stores
th ores his online shopping website.
stto

Customer
erss access
er
Customers a ce
access
ss
s the
the website
website using
using
g a browser.
brow
wser.
wse

(a) Describe
Desc
sc
cribe how
ribe w the
how the webpages
es are requested and displayed on the customer’s computer.
webpage

....................................................................................................................................................
..........
....
....
..........................................................................................................................................

...........................................
..........................................................................................................
...................................................................................................................................................

...................................................................................................................................................
.............................................
........................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) State three online security threats to Eugene’s web server.

Threat 1 ....................................................................................................................................

Threat 2 ....................................................................................................................................

Threat 3 ....................................................................................................................................
[3]

© UCLES 2020 2210/13/O/N/20 [Turn over


3$*(

1 A school network has several computers.

Each computer in the network has a media access control (MAC) address.

Hexadecimal is used for MAC addresses.

Part of a MAC address is given.

97–5C–E1

Each pair of digits is stored as binary in an 8-bit register.

(a) Complete the binary register for these two pairs of digits.

97

5C
[4]

(b) Describe what is meant


n b
nt by
y a MAC address.

.........................
........
. .....................................................................................
.......
..................................................
...................................................................................................................................................

...
........................................................................................................................................................
...................................................................................................................................................

.....
........................
. ................................................................................................................................
...................................................................................................................................................

.....
........
...........
.....................................................................................................................................
...................................................................................................................................................

...........................................
..........................................................................................................
...................................................................................................................................................

.............................................
. ......................................................................................................
..
...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Give two otherr uses of hexadecimal in computer science.

1 ................................................................................................................................................

2 ........................................................................................................................................... [2]

© UCLES 2020 2210/01/SP/23


3$*(

(d) Another value is stored as binary in a register.

0 1 0 1 0 0 1 0

(i) A logical left shift of two places is performed on the binary value.

Complete the binary register to show its contents after this logical left shift.

[1]

(ii) State one effect this logical shift has on the binary value.

...........................................................................................................................................

...................................................................................................................................... [1]

(e) Negative denary numbers can


can also be represented as binary using two’s complement.

&RPSOHWHWKHELQDU\UH
HJL
JLVWH
JLV HUUIRUWKHGHQDU\YDOXHí
&RPSOHWHWKHELQDU\UHJLVWHUIRUWKHGHQDU\YDOXHí

You must show


w all
all your
yo
our working.
wo
orking
g.

Wo
ork
rkin
ng sspace
Working pac
acce ..
............................................................................................................................
...........................................................................................................................

.....
........................
. ................................................................................................................................
...................................................................................................................................................

.....
........
...........
.....................................................................................................................................
...................................................................................................................................................

...........................................
..........................................................................................................
...................................................................................................................................................

Register:
[2]

© UCLES 2020 2210/01/SP/23 [Turn over


3$*(

6 Robots are used in a factory to build cars.

(a) One characteristic of a robot is its mechanical structure.

State two otherr characteristics of a robot.

1 ................................................................................................................................................

2 ........................................................................................................................................... [2]

(b) Suggest two advantages of using robots, instead of humans, to build cars in the factory.

1 ................................................................................................................................................

2 .......................................................................................................................................... [2]

7 The Unicode character set is used to represent text that is typed into a computer.

(a) Describe what is meant by a character set.

......................................
...............................................................................................................
...................................................................................................................................................

...........................
........
. .....................................................................................................................
...................................................................................................................................................

..
.........................
............................................................
.. . .................
.. .........................
... ....
........
.. .....
.. .....................
..
................................................................................................................................................... . ........
................

.....
................................................................................................................................................ [2]
..............................................................................................................................................

(b) Onne di
One disa
sadv
ad
dvvantage of using
disadvantage g the
the Unicode character set, instead of the ASCII character set, is
that the text stored takes up
p more storage space.

Give one reason why it takes


e up more storage space.

...................................................................................................................................................

.............................................................................................................................................. [1]

© UCLES 2020 2210/01/SP/23 [Turn over


3$*(


3$*(
2210/11 Cambridge O Level – Mark Scheme May/June 2018
PUBLISHED
Question Answer Marks

1 1 mark for each correct answer, in the given order: 6

 analogue
 digital
 denary
 10
 binary
 2

Question Answer
Answ
An swer
sw er Marks

2 1 mark for each correct conversion: 3

 42
 257
 542
3$*(

Question Answer
Answ
wer Marks

3 1 mark for correct register, 3 marks for reason: 4

 Register C

Any three from:


 Count the number of 1/0 bits (in each byte/register)
 Two bytes/registers have an odd number of 1/0 bits /// TTwo
wo use odd parity
 Odd parity must be the parity used
One
 One byte/register has an even number of 1/0 bits // On e us
uses even parity
incorrect
 One with an even number of one bits/even parity is incncorrect // Register C should have odd parity

© UCLES 2018 Page 4 of 12


2210/11 Cambridge O Level – Mark Scheme May/June 2018
PUBLISHED
Question Answer Marks

4(a) 1 mark for each correct answer: 2

Lossy (compression)
Lossless (compression)

4(b) 1 mark for correct compression, 3 marks for description:


descrip
rip
i ti
t on
n: 4

 Lossless (compression)

Any three from:


 The file can be restored/decompressed to the exact same st ate
te it w
state as before compression/ to original
was
 (It is a computer program so) no d ata
at
dataa ca
cann be ostt // L
os
be llost ossy
os
Lossysy w ou
ould
would emov
em ove data
ov
uld rremove
 Will not run correctly (with any other compression)
 (Lossless) will give repeating words/sections of word a va value//
valu
lue// RLE is used // Other valid examples of methods of
lu
lossless compression
 Value is recorded in an index
3$*(

© UCLES 2018 Page 5 of 12


2210/12 Cambridge O Level – Mark Scheme May/June 2018
PUBLISHED
Question Answer Marks

1 1 mark for each unit, in the given order: 4

– nibble
– byte

– megabyte (MB)
– gigabyte (GB)

Question Answer Marks

2(a) Any fourr from: 4


– Image is converted from analogue to digital (using ADC)
– Image is turned into pixels
– Each pixel is given a binary value
– Pixels form a grid (to create the image)
– Each pixel has a colour
– Pixels are stored in sequence (in a file)
dimensions/resolution
– Meta data is stored (to describe the dimensions/resolu
uti
tion
on of the image) // It stores the dimensions/colour
3$*(

depth .etc.
– An example of a suitable photo file format e.g. JPEG

2(b) 1 mark for correct compression, 3 marks for explanation: 4

– Lossy

Any three from:


– Lossy would reduce the file size more (than lossles s))
lossless)
– The redundant data can be removed from the files // by e x mple (must be about redundant data)
xa
example
– Images can still be a similar quality
– There is no requirement for the files to be exactly the same
same as original file
– Photos can be sent quickerr // faster
fasterr to upload // fast
faster to download
err to

© UCLES 2018 Page 4 of 10


2210/12 Cambridge O Level – Mark Scheme May/June 2018
PUBLISHED
Question Answer Marks

3(a) 1 mark for each correct register 3

Hours 0 0 0 0 0 0 1 0

Minutes 0 0 0 1 1 1 1 1

Seconds 0 0 1 1 1 0 1 0

3(b) 1 mark for each correct section: 3

0 5 2 6 5 5
Hours Minutes
Minu
ute
es Seconds
3$*(

Question Answer
Answ
wer Marks

4 1 mark for each correct section: 3

1 1 0 1 0 0 0 0 0 0 1 1

1 mark 1 mark 1 mark

© UCLES 2018 Page 5 of 10


2210/12 Cambridge O Level – Mark Scheme October/November 2018
PUBLISHED
Question Answer Marks

1(a) 1 mark for each correct 8-bit binary number 3

66 0 1 0 0 0 0 1 0

85 0 1 0 1 0 1 0 1

83 0 1 0 1 0 0 1 1

1(b)(i) 1 mark for each correct hexadecimal number 3


4B
45
59

1(b)(ii) Three from: 3


x (HTML) colour codes
3$*(

x Error messages
x MAC addresses
x IP addresses
x Assembly language
x Memory dump
x Locations in memory

1(b)(iii) Two from: 2


x Easier to read/write/understand (for humans)
x Easier to remember (for humans)
scre
re
een
e /displ
p ay space
pl
x Short way to represent binary // Uses less screen/display
x Fewer errors made (in data transcription)
x Easier to debug (for humans)

© UCLES 2018 Page 4 of 12


2210/13 Cambridge O Level – Mark Scheme October/November 2018
PUBLISHED
Question Answer Marks

4(a) 1 mark for each correct conversion 3


01101010 1
11111111 00001000
00001000 10010011

4(b) x Computers use switches / logic gates 2


x Only uses 2 states / On or Off / 1 or 0

Question Answer
Answ err Marks

5(a) x Bits sent one at a time 2


x Uses a single wire

5(b) USB / SATA / Wifi /PCI Express / Any appropriate serial


a d
al device
evice 1

5(c) x Data is transferred in two directions 2


x Data is sent in only one direction at a time
3$*(

© UCLES 2018 Page 6 of 13


2210/13 Cambridge O Level – Mark Scheme October/November 2018
PUBLISHED
Question Answer Marks

7(a) Three from: 3


x It is a translator
levvell language
x Translates (high level language) to low level lan
ngu
guag ge
x Executes one line at a time
x Translates source code line by line
x Runs error diagnostic
location
x Produces error messages to tell user location n of
of error
errro
ror
or
x Stops execution when encounters errors
x Continues translating when an error is fixed

7(b) Fourr from (Max three per benefit): 4

x Produces executable file «


x « this creates a smaller file size
x « more saleable

x Program will be machine independent / portable


portabl
bl
be«
x hardware
« this means it can be used on any hardwaree
3$*(

x No need for compiler to run executable file «


x « this means it will be quicker to run
x « customers can just execute the program

x Source code cannot be accessed «


x plagiarise
ed
« therefore, code cannot be stolen / plagiarised

7(c) Three from: 3


x Uses compression algorithm / by example e.g. RL RLE
R E
identified«
x Repeating words / phrases / patterns identified d«
x « replaced with value
x File / dictionary / index of phrases created
x Index will store word/phrase with value

© UCLES 2018 Page 8 of 13


2210/11 Cambridge O Level – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

1(a) 6
97
1 0 0 1 0 1 1 1

1 mark
ark
k 1 mark

5C
0 1 0 1 1 1 0 0

1 mark 1 mark
3$*(

E1
1 1 1 0 0 0 0 1

1 mark 1 mark

1(b) Four from: 4


 Media Access Control (address)
 Used to identify a device
 It is a unique (address)
 It is a static address // It does not change
 It is set by the manufacturer
ID/number/identifiess tthe
 The first part is the manufacturer ID/number/identifies manufacturer
he m anufacturer
 The second part is the serial number/ID

© UCLES 2019 Page 4 of 14


2210/11 Cambridge O Level – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

1(c) Two from e.g.: 2

 Colour codes // Colour in HTML / CSS


 Error messages
 Locations in memory
 Memory dump // debugging
 IP address
 ASCII // Unicode
 Assembly language
 URL

Question Answer
Answ
wer Marks

2(a) 1 mark for correct name, 1 mark for correct gate symbol 2

 AND
3$*(

2(b) 1 mark for correct name, 1 mark for correct gate symbol 2

 NOR

© UCLES 2019 Page 5 of 14


2210/11 Cambridge O Level – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

4(b)(ii) Two from: 2


 Back data up
 Use surge protection
protective
rote
 Keep data in a fireproof / waterproof / proote
ecttive case
ivve ca
ase
se
files)
 Use verification methods (for deleting fi les)
es)
off
fflilne devices
 Following correct procedure e.g. ejecting offline devviccess / regularly saving

Question Answer
Answ err Marks

5 Five from: 5
used
 A (compression) algorithm is usedd
 No data is removed in the process // original file can bee rrestored
esto
es t red
to
 Repeated words (are identified) // Patterns in the dadata
ta
a ((are
are
ar e identified)
 « and are indexed/put into a table // by example
 « and are replaced with their index // by example
example
m le
 « and their positions are stored (in the table) // by examp
 « and the number of times the word/pattern appears iss sstoredtore
to r d (in the table) // by example
re
3$*(

awarded
NOTE: Other valid methods of lossless compression can be a w rded marks
wa

© UCLES 2019 Page 10 of 14


2210/12 Cambridge O Level – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

4(a) Two from e.g.: 2


r
 DVD uses red laser/light whereas blu-ray uses blue/violet
blue
bl
lu /viole
et laser/light
Blu-ra
-ray
 DVD has a smaller (storage) capacity // Blu-rayy has
has a larger
l rg
la ger
e (storage) capacity
whereas
 DVD has two layers (of polycarbonate) wh erea
reas Bl
B
Blu-ray
u ra
u- ay di
d
disks
sks
sk
k have a single layerr (of polycarbonate)
approxim
mat
atel
tely
 DVD has a slower transferr rate (of approximately y 10
1 mmbps)
bps)
bp s // Blu-ray has a faster transferr rate
(of approximately 36 mbps)

4(b)(i) 2 marks for any two correct stages of working, 1 mark


k fo
forr co
ccorrect
rrec
rec
e t an
a
answer.
nsw
s er. 3
150ௗ000
 500 * 300 * 10 // 150 000 *10
 * 8 then ÷ 8 (anywhere in the process)
 11ௗ500ௗ000
500 000  1024  1024 // 11ௗ500ௗ000
500 000 ÷ 1ௗ048ௗ576
1 048 576

 = 1.43 MB

4(b)(ii) Fourr from: 4


printer
 Rollers are used to move the paper through the printe er
 Nozzles spray/drop/jet ink onto the paper
pape
 Ink jets/print head/nozzles are moved across the paper er (t
((to
o distribute the ink)
3$*(

colours
our
 Different colour inks are mixed to create required colo urss
 Technology could be piezoelectric
 Technology could be thermal bubble

 Ink is heated
 « and expands/evaporates into a bubble
 Bubble is pushed through the nozzle on to the paper
 « then the bubble collapses

 Electrical current is applied to a crystal


 « which makes it vibrate
 « which forces a droplet of ink through the nozzle

© UCLES 2019 Page 6 of 12


2210/12 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

1 One mark for each correct tick 4

Statement True False


(9) (9)

25 kB is larger than 100 MB 9

999 MB is larger than 50 GB 9

3500 kB is smaller than 2 GB 9

2350 bytes is smaller than 2 kB 9


3$*(

© UCLES 2019 Page 4 of 15


2210/12 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

2 Fourr from: 4
x Arithmetic and logic unit (ALU)
x Memory address register (MAR)
register
egis
eg
x Memory data register (MDR) // Memory buffer reg i te
is (MBR)
er (M
(MBR
BR))
BR
x Accumulator (ACC)
x Immediate Access Store (IAS)
x Main memory // RAM
x Program counter (PC)
x Current instruction register (CIR)
x Address bus
x Data bus
x Control bus
x Input device
x Output device
x Secondary storage device
3$*(

Question Answer
An swer
wer Marks

3(a) One from: 1


x Continuous data // by description
x Non-discrete data // by description
x By example, e.g. data such as a sound wave

3(b) One from: 1


x Discrete data that has only two values
x By example, e.g. binary data / 1’s and 0’s

© UCLES 2019 Page 5 of 15


2210/12 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

4(a) x 52 1

4(b) 1
1 1 0 1 0 0 0 0

4(c) x It is multiplied by 4 1

Question Answer Marks

5(a) Fourr from: 4


x A compression algorithm is used
x Discards any unnecessary sounds «
x « using perceptual musical shaping
an’t
x « such as removing background noise / sounds humans ccan’t hear
n’t h ear // or other suitable example
ea
x Reduces sample size / resolution // by example
3$*(

x Reduces sample rate // by example


x Sound is clipped
x The data is permanently removed

5(b)(i) One from: 1


x The file size will be smaller than lossless
x Requires less storage space
x Requires less time to transmit

5(b)(ii) One from: 1


x The quality of the sound will be reduced
x The original file cannot be restored

© UCLES 2019 Page 6 of 15


2210/12 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

5(c)(i) Fourr from: 4


x Musical Instrument Digital Interface file
x Stores a set of commands / instructions for h how
ow
w the
he ssound
o nd
ou d sshould
h ul
ho u d be played
x Does not store the actual sounds
inst
nst
stru
r me
ru ment
x Data in the file has been recorded using digital instruments ns
x Specifies pitch of the note // specifies the note to be p played
l ye
la yed
d
x Specifies when each note plays and stops playing // S Specifies
pecifies
pe s kkey on/off
ey o
ey n/off
x Specifies duration of the note
x Specifies volume of the note
x Specifies the tempo
x Specifies the type of instrument

5(c)(ii) Fourr from: 4


x It uses a single wire «
x « therefore, it is cheaper to manufacture / buy / install
x « therefore, less likely to have interference // no crosstalk
x « therefore, can be used over longer distances
3$*(

x Data is sent a bit at a time «


rece
eiv
ived
x « therefore, less chance of data being skewed // data is received ed in order
x Transmission can be synchronised «
x « can reduce rate of errors

© UCLES 2019 Page 7 of 15


2210/13 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

1(b)(iii) Six from: 6


x The system could use odd or even parity
x A parity bit is added
incorrect/correct
ectt parity
ec
x The data is checked to see if it has incorrect/correc pari
pa rriity //
// by example
exa
x mple

x If parity is correct no error is found


x correctly
An acknowledgement is sent that data is received corr
rrec
recctl
tly
x The next packet of data is transmitted

x If incorrect parity is found an error has occurred


x A signal is sent back to request the dadata
ata
a iis resent
s re
rese
sent
se nt
x occurs
The data is resent until data is received correctly/timeout occur
us
ur

1(c)(i) 6
1 1 1 1 1 0 0 1 0 0 1 0
3$*(

1 mark 1 mark 1 ma
m
mark
rk

1 0 1 0 0 0 0 1 0 0 0 0

1 mark 1 mark 1 ma
m
mark
rk

© UCLES 2019 Page 5 of 14


2210/13 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

1(c)(ii) One mark for identification: 4


x Compression

Three from e.g.:


x Best compression would be lossy
x Use compression algorithm
x This would remove all the unnecessary data from tthe he
e ffile
ilile
e // removes
/ rem
emov
moves
es detail/sound that the human eye/ear may not see/hear
x Reduce colour palette «
x « so each pixel requires fewer bits
x Reduce resolution
frames
x Only store what changes between frame mes
me s // ttemporal
empo
em po
ora
ral redundancy
al re
redu dund
du nddan
ancy
cy

1(d) Five from: 5


x The display is made up of pixels «
x « that are arranged together as a matrix
x Each pixel has three filters, red, blue and green
x Shades of colour are achieved by mixing red, blue and green
3$*(

x The screen is backlit


x Light is shone through the liquid crystals
transparent/on
x The liquid crystals can be made to turn solid or transparent/ on
noorr of
off «
x « by changing the shape of the crystal

© UCLES 2019 Page 6 of 14


2210/11 Cambridge O Level – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

9(a) Any three from: 3


− Closer to/is machine code
− May use mnemonics
− May need an assembler to be translated d
instruction
r ct
ru
− One line of code represents a single instru c io
on
− Machine dependent
locations/regi
gist
sterrs
st
− Have direct access to memory locations/registers

9(b) − Assembly code 2


− Machine code

9(c) Any one from: 1


− It is more difficult to understand
− Error prone
− Have to manipulate memory locations
− Machine dependent

9(d)(i) − 10110100 2
3$*(

− 11001001

9(d)(ii) − 000011111010 (must have leading zeros) 1

9(d)(iii) − 93 2
− 1D

© UCLES 2020 Page 11 of 11


2210/12 Cambridge O Level – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

7(a)(i) − 12 (ignore leading zeros) 1

7(a)(ii) − 198 (ignore leading zeros) 1

7(a)(iii) − 1217 1

7(b) One mark per each correct hex value in correct orderr 3
− 0E9

Question Answer Marks

8(a) Any three from: 3


− It is a universal standard
− It can’t be inserted the wrong way around
− Supports different transmission speeds
− Automatically detects if correct driver installed
3$*(

8(b) Two marks for benefits, one mark for drawback 3


Benefits:
− Faster speed of printing
− Can print duplex / on both sides
− Many letters can be printed from one toner cartridge
− Can print in high volumes
Drawback
− Toner cartridge more expensive to buy
− More time to warm-up
− Larger footprint

© UCLES 2020 Page 8 of 10


2210/12 Cambridge O Level – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

1(a) Any one from: 1


− Hypertext Mark-up Language
o write/create
− Web authoring language // language used to wri
r te/c
e/cre
reat websites/web
ea e we
w bsites/web pages

1(b)(i) − Presentation 1

1(b)(ii) One mark per each nibble: 6

43 0 1 0 0 0 0 1 1

B7 1 0 1 1 0 1 1 1

F0 1 1 1 1 0 0 0 0

1(c)(i) − Input 1
3$*(

© UCLES 2020 Page 4 of 13


2210/12 Cambridge O Level – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

1(c)(ii) One from: 4


− Lossy (compression)

Any three from:


− A (compression) algorithm is used
− Removes redundant/unnecessary data from the h ffile
he ile
le
− Removes sounds that cannot be heard by the hu human
huma ear/background
m n ea r/ba
r/
/ba
b ck
ckgr
kg ound noise
− Reduces sample rate
− Reduces sample resolution
re-instated
ed
− Data is permanently removed // original file cannot be re-instated
− Perceptual music shaping is used

NOTE: If lossless given, marks can be awarded for a correct description


desc
de scri
ript
p ion of lossless as follow through.

Any three from (lossless):


− A (compression) algorithm is used
− Repeating patterns are identified
− … are replaced with a value
3$*(

− … and indexed
re-ins
nsta
ns tate
tated
te
− No data is permanently removed // original file can be re-instated
− Suitable example of a lossless algorithm

1(c)(iii) Any two from: 2


− Quicker for her to upload
− Quicker for users to download
− Won’t slow website down as much when loading
− Takes up less storage space

1(d)(i) − Handshake (layer) 2


− Record (layer)

© UCLES 2020 Page 5 of 13


2210/13 Cambridge O Level – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

3(a) One mark per each correct row: 4

Denary Binary Conversion Correct Incorrect


Inco
ncoorrec
rec
e t
(9) ((9)
9)

145 10010001 9

179 10110101 9

11 00010011 9

100 01100010 9

3(b) One mark for each correct conversion in the correct order: 3
− C
− 4
− 0
3$*(

Question Answer
Answ
wer Marks

4(a) Any fourr from: 4


− Browsers sends URL to DNS
− … using HTTP
− DNS finds matching IP addresses for URL
− … and sends IP address to web browser
− Web browser sends request to IP address/web server for we web pages
b pa
p ges
− Web pages are sent from web server to browser
− Browser renders HTML to display web pages
SSL/HTTPS
SL/
− Any security certificates are exchanged/authenticated // SS L/HT
HTTPS is used to secure the data
− … encrypting any data sent

© UCLES 2020 Page 5 of 13


2210/01 Cambridge O Level – Mark Scheme For examination
SPECIMEN from 2023

Question Answer Marks


1(a) One mark per each correct four bits. 4

97 1 0 0 1 0 1 1 1

5C 0 1 0 1 1 1 0 0

1(b) Any fourr from: 4


x used to identify a device
x q (address)
it is a unique
x it is a static address // it does not change
x it is set by the manufacturer
x the first part is the manufacturer ID / nu mb
number d nttifi ie
de
ber / iidentifiesies th
ies the
e ma
manu
n fa
nu facttur
urer
manufacturer e
x the second part is the serial number / ID.
1(c) Any two from: 2
x colour codes // colour in HTML/CSS
x error messages
x locations in memory
3$*(

x memory dump // debugging


x IP(v6) address
x ASCII // Unicode
x assembly language
x URL.
1(d)(i) 1
0 1 0 0 1 0 0 0

1(d)(ii) The value becomes incorrect because the left most bits are lost.
are 1
1(e) One mark for method, e.g. conversion to binary then flipp
pin
i g and ad
flipping addi
d ng
din 1.
adding 2
One mark for correct answer.

1 1 0 0 1 0 1 0

© UCLES 2020 Page 4 of 10


2210/01 Cambridge O Level – Mark Scheme For examination
SPECIMEN from 2023

Question Answer Marks


4(c)(ii) x It can now process two instructions simultaneouslyy (where
(where suitable) 2
x … increasing the performance.
4(d) B 1

Question A
An
nsw
swer
err
Answer Marks
5(a)(i) Any two from: 2
x it is easier / quicker to read/write/understand
x it is easier / quicker to debug
x code is portable.
5(a)(ii) Any one from: 1
x arrd
not able to directly manipulate the ha dwa
ware
are
hardware
x may need to wait for translation before running
x program may be less efficient.
5(b) Software that provides useful functions for a programmer
err w
writing o puter program.
om
riting a ccomputer 1

Question An swer
wer
e
Answer Marks
3$*(

6(a) x It has electrical components. 2


x It is programmable.
6(b) Any two from: 2
x more efficient than a human
x more accurate than a human
x can lift larger and heavier equipment than a human
x environm
nment
nm
can replace humans working in a dangerous environment
x reduces running costs, such as wages and overh ea
ads
overheads
x can produce consistent results/output
x akks.
can work 24 hours a day // do not need to take break s
breaks.

Question Answ
wer
e
Answer Marks
7(a) x nted
nt
All the characters and symbols that can be represent
representede by a co
omp
puter system.
computer 2
x val
allue
Each character and symbol is assigned a unique value.ue.
7(b) Each character is encoded using more bits. 1
© UCLES 2020 Page 7 of 10

You might also like