Chapter 1 Data Representation Guess Papers
Chapter 1 Data Representation Guess Papers
Chapter 1 Data Representation Guess Papers
3$*(
3$*(
&RPSOHWHWKHVHQWHQFHVLQ-DQH·VDQVZHUXVLQJWKHOLVWJLYHQ1RWDOOLWHPVLQWKHOLVWQHHGWREH
&RPSOHWHWKHVHQWHQFHVLQ-DQH·VDQVZHUXVLQJWKHOLVWJLYHQ1RWDOOLWHPVLQWKHOLVWQHHGWREH
used.
• 2
• 10
• 16
• analogue
• binary
• denary
• digital
• hexadecimal
process this type of data. For a computer to be able to process data it needs to be
Computers u se a …
use ………………
…… ………
……………
………
……
……………………………………… numb
nu ber ssystem;
number yste
ystem
tem;
this is a b ase ……
as
base …………………
………………… number system.
……………………………………
[6]
2 Dheera
aj identifies
Dheeraj id
den
entititifififie
es three hexadec
eccimal numbers.
hexadecimal
2A ......................................
...............................................................
....................................................................................................
101 ...................................................................................................
21E ..................................................................................................
[3]
Working Space
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4 Michele wants to email a file to Elsa. The file is too large so it must be compressed.
(b) The file Michele is sending contains the source code for a large computer program.
Identify which type of compression would be most suitable for Michele to use.
Explanation ................................................................................................................................
...................................................................................................................................................
...........................................
.........................................................................................................
...................................................................................................................................................
.................................
...
. ..................................................................................................................
...................................................................................................................................................
...........
........
. ..
....
....
..................................................
. ......................................................................
. ..........................
...................................................................................................................................................
........
.........
...........
. ..............................................................................................................................
...................................................................................................................................................
[4]
1 Different units of data can be used to represent the size of a file, as it changes in size.
• byte
• gigabyte (GB)
• megabyte (MB)
• nibble
Smallest bit
………………………………………………..
………………………………………………..
kilobyte (kB)
………………………………………………..
……
………
……………
…………
…………
……
………
………
…………
…………
…...
………………………………………………..
Largest
Larg
La rges
rgestt
es terabyte
terabyte (TB)
[4]
2 (a) Nancy
nccy has
Nanc ha captured images
imagees of her holiday with her camera. The captured images are stored
as digital photo files on herr ccamera.
amera.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
Many of the photos are very large files, so Nancy needs to reduce their file size as much as
possible.
Identify which type of compression would be most suitable for Nancy to use. Explain your
choice.
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...........................................
.........................................................................................................
...................................................................................................................................................
[4]
The st
top
pwa
w tch
tc
ch is sstopped
stopwatch topp
topped at:
pp
0 2 3 1 5 8
Hours
H
Ho urs Minutes Seconds
Hours
Minutes
Seconds
[3]
Hours 0 0 0 0 0 1 0 1
Minutes 0 0 0 1 1 0 1 0
Seconds 0 0 1 1 0 1 1 1
Write the denary values that will now be shown on the stopwatch.
“D0
03, page
“D03, pa e is
is not
no
ot available”
a aiila
av abl
b e”
e
Jafar reme
emb
mber
erss th
er
remembers that
at hexadecim
mal is often used to represent binary values in error codes.
hexadecimal
Conver
ertt the
er
Convert th
he hexadecimal
hexa
hexa
hexade
d ci
de cim
mal number
e in the error message into 12-bit binary.
er
[3]
B U S
66 85 83
66
85
83
[3]
Each
(b) Each letter
ach let er in
ette n ASCII
SCII can also
ASC alsso be
e represented
rep
epre
esent d ass a hexadecimal
nted
ted hexxade
he deci mall value.
cima vallue.
va e
The
Th word
he wo
w rd
dKKEY has
EY h 8-bit
as the 8-bi
it binary values:
K E Y
01001011 ...............................................
01000101 ...............................................
01011001 ...............................................
[3]
1 .........................................................................................................................................
2 .........................................................................................................................................
3 .........................................................................................................................................
[3]
(iii) State two benefits of using hexadecimal notation to represent binary values.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
) to sshow
Tick (() ho
ow wh
wheether ea
whether each sstatement
each ta
ate
eme
ent des
esscr
cribe
es RAM
describes RA oorr ROM.
RO
O M.
RAM ROM
Statement
S
St
tatement
() ()
Stores
orres tthe
Stor programs
he prog
ro data
grams and da
ata that are currently in use
computer
Used to boot up the compu
ut when power is turned on
uter
ut
(b) Circle the storage category that includes both RAM and ROM.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary.
(a) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The
first number has already been converted.
6A FF 08 93
01101010
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...........................................
.....................................................................................................[2]
...............................................................................................................................................[2]
(a) Describe
Descri
riibe serial
ser
eria
ia
al transmission.
trran
anssmission
on.
on
........
.........
........
....
.................................................................................................................................
...................................................................................................................................................
....................................................................................................................................................
....
...
....
....
.......
. ...............................................................................................................................................
.....
...
......
..............................................................................................................................................
...................................................................................................................................................
.............................................
...................................................................................................[2]
...............................................................................................................................................[2]
...................................................................................................................................................
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(c) David needs to send a large section of the programming code as an email attachment.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
97 – 5C – E1
Each pair of digits is stored as binary in an 8-bit register.
(a) Show what the binary register stores for each pair of the given digits.
97
5C
E1
[6]
...................................................................................................................................................
...........................................
.........................................................................................................
...............................
...
....
....
..................................................................................................................
...................................................................................................................................................
.......
.....
......
....................
...................................
. ..
. ......
.....................................
.........................
............
. ............
................................................................................................................................................... ................
.......
..................
....
. ............................................................................................................................
...................................................................................................................................................
..
..........
.. ......................
. .....................................................................................................................
. .......
...................................................................................................................................................
...........................................
..........................................................................................................
...................................................................................................................................................
.............................................
........................................................................................................
...................................................................................................................................................
.............................................
.................................................................................................. [4]
.............................................................................................................................................
Example 1 .................................................................................................................................
...................................................................................................................................................
Example 2 .................................................................................................................................
...................................................................................................................................................
[2]
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................
. .........................................................................................................
..
..........................................................................................................................................................
......................................
......
.... ...........
..........................................................................................................
..........................................................................................................................................................
.............
...
..............
....
....
..........................
. .............
.........
.............
....
. ...............................
. ................................................
..........................................................................................................................................................
..............
........
............
....
. ..................
. ................................................................................................. [5]
....................................................................................................................................................
4 (a) Marley wants to store a video he has created for his school project.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...........................................
.........................................................................................................
...................................................................................................................................................
[2]
Ea
ach iimage
Each ma
age
ge iis
s 50
500 pix
xels w
xe
pixels id
de and
wide d3 00 pi
300 p x lss h
xe
pixels ig
gh.
high.
&
&D
DOFFXO
XODW
DWH
DW HWK
WKHWRWDOILOH VL]HLQPHJDE\WHV 0% IRUDOO0DUOH\·VLPDJHV
&DOFXODWHWKHWRWDOILOHVL]HLQPHJDE\WHV
Sh
how all
Show all your
you
ourr working..
...
.............................................................................................................................................
...........................................................................................................................................
....................................
........................................................................................................
...........................................................................................................................................
.....................................
........................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Fourr statements about computer memory sizes are given in the table.
True False
Statement
() ()
25 kB is larger than 100 MB
999 MB is larger than 50 GB
3500 kB is smaller than 2 GB
2350 bytes is smaller than 2 kB
[4]
2 The Von Neumann model for a computer system uses several components in the fetch-execute
cycle. One component that is used is the Control Unit (CU).
1 ....................................
......................................................................................................................
...
.......................................................................................................................................................
2 .............
......
. .....
. ........
. ..................................
............
.....................................
.........................
.............
. ..........................
.......................................................................................................................................................
3 ...........
..........
. .........
.. .................................................................................................................................
.......................................................................................................................................................
4 ...
....
.. .....
.....
....
....
....
.......
. ..
....
....
.....................................................................................................................................
.......................................................................................................................................................
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
0 0 1 1 0 1 0 0
...................................................................................................................................................
............................................................................................................................................. [1]
(b) The contents of the register shifted one place to the right would give the result:
0 0 0 1 1 0 1 0
The contents of the register shown at the start of question 4 are shifted two places to the left.
Show the contents of the register after this shift has taken place.
[1]
.........
............
.......................................................................................................................................
...................................................................................................................................................
....
....
.....................
............................................................................................................................. [1]
.............................................................................................................................................
The file is too large to attach to an email so Audrey decides to compress the file.
an
She uses lossy compression to reduce the size of the sound file.
(a) Describe how lossy compression reduces the size of the sound file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Nico asks Audrey why she used lossy compression rather than lossless.
(i) State one advantage Audrey could give of using lossy rather than lossless to compress
the sound file.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) State one disadvantage Nico could give of using lossy rather than lossless to compress
the sound file.
...........................................................................................................................................
..................................................................................................................................... [1]
...................................
.........................................................................................................
...........................................................................................................................................
...............................
................................................................................................................
...........................................................................................................................................
...................
........
....
.....................................................................................................................
...........................................................................................................................................
.....
.......
. .....
.........................................
.......................
. .................
.. ..........
. ..............
.........
......
......
.......................................
...........................................................................................................................................
............................................................................................................................................
................................................................................................................................................
............................................................................................................................................
...............
................................................................................................................................
...................................
..........................................................................................................
...........................................................................................................................................
.....................................
. ................................................................................................ [4]
..
.....................................................................................................................................
Explain two advantages of using serial transmission rather than parallel transmission.
Advantage 1 ......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Advantage 2 ......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2019 2210/12/O/N/19
3$*(
(iii) 7KHOLEUDU\·VDUFKLYHV\VWHPXVHVDQHUURUGHWHFWLRQDQGFRUUHFWLRQV\VWHPWKDWFRPELQHV
a parity check with an automatic repeat request (ARQ).
Describe how this system uses the parity check and ARQ.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................
.........................................................................................................
...........................................................................................................................................
.........................
...
. ..................................................................................................................
...........................................................................................................................................
...
........
. ..
....
....
..................................................
. ....................................
. ..................................
. ...........................
...........................................................................................................................................
...
.....
...........
. ........................................................................................................................ [6]
.....................................................................................................................................
(c) Th
The
e libr
llibrary
ibra
brrar
ary ha
ary hass a website th
website hat customers can use to search for a book.
that
(i) T
Thhe
Thee website
web
we bsite has a background
back
ckground colour with the hexadecimal colour code #F92A10
ck
F92
A10
[6]
(ii) Videos on the library website show customers which books the library will soon have
in stock.
Identify and describe a method the library could use to reduce the file size of a video as
much as possible.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................
.........................................................................................................
...........................................................................................................................................
...............................
.......................................................................................................... [4]
.....................................................................................................................................
the
he events,
At the event
vents,
ve s,, the
the library has
hass a Liquid
Liq
qui
u d Crystal
Crrys
ysta
tal Display
ta Disp
Di spllay
sp lay (LCD)
(LCD
(LC ) screen
CD scrreen
sc e that
tha
hatt displays
disp
displa
ays data,
includdin
ing an image
including im
ma age and information
infor
ormation about the author.
or
Desc
Descri
scribe
be how
Describe how an
an LCD
LCD screen
scre
een operates to display this data.
.....
...
....
. ..
.............................................................................................................................................
...................................................................................................................................................
............................................
........................................................................................................
...................................................................................................................................................
.............................................
........................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
10
Feature 1 ..................................................................................................................................
Feature 2 ..................................................................................................................................
Feature 3 ..................................................................................................................................
[3]
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
[2]
(c) Give one drawback of writing programs in a low-level language, instead of a high-level
language.
...........................................
.........................................................................................................
...................................................................................................................................................
.................................
...
. ............................................................................................................ [1]
.............................................................................................................................................
(d) A low-leeve
vell language
low-level la
ang
ngua
uage
ge needs
ds to
o be converted
co
onvertted to binary
onv bina
bina
nary before
bef
e ore
e itit can
can be
be processed
proc
pro esse
s d by a
comp
com ut
mp uter
e.
er
computer.
(i) G ive
ve tthe
Give he
e 8-bit
8-bi
8- biit binary vvalue
alue of the two denary values:
1 0 .....................................................................................................................................
18
180 ......................................................................................................................................
201 ............................
..........................................................................................................
....................................................................................................................................
[2]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
11
(ii) Give the 12-bit binary value of the denary value 250.
..................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
10010011 ...........................................................................................................................
00011101 ....................
..........................................................................................................
...........................................................................................................................
[2]
7 (a) Give the denary value of each of the three 12-bit binary values.
(i) 000000001100
..................................................................................................................................... [1]
(ii) 000011000110
..................................................................................................................................... [1]
(iii) 010011000001
..................................................................................................................................... [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...........................................
.........................................................................................................
...................................................................................................................................................
......................................
...............................................................................................................
...
...................................................................................................................................................
...........................
.............................................................................................................................
...................................................................................................................................................
..
.....................
. .....
.............................................................
....................
..........
. ..............
.........
......
.....................
................................................................................................................................................... . ......
................
.....
...
. ..
..................................................................................................................................................
...................................................................................................................................................
((b)
b) 12-bit
12-b
bitt binary
bin
inar
aryy values
ar valu
values can also
alsso be represented as hexadecimal values.
000011101001
............................................................................................................................................. [3]
1 Tina is creating a website for charity events. She uses HTML to create the website.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website.
..................................................................................................................................... [1]
(ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers.
Give the 8-bit binary values for each part of the hexadecimal code.
43
B7
F0
[6]
(c)
c)) Ti
Tina
na u
na uses
sess a microphone
se micr
mic ophone to record
cr record a welcome message for her website.
(i) State
S
St t whether the microphone
tat
ate micrrophone is an input or output device.
.....................................................................................................................................
.....................................
.................................................................................................. [1]
(ii) She wants to compress the recording to make sure that the file is as small as possible
for the website.
Identify which type of compression she should use and describe how this would compress
the file for the website.
Description
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................
...
. ......................................................................................................
...........................................................................................................................................
...............................
...............................................................................................................
...........................................................................................................................................
.....................
...
....
....
.............................................................................................................. [4]
.....................................................................................................................................
(iii)) Gi
ive tw
Give ttwo
ob enef
enefits of compressing
ef
benefits com
omprresssi
sing
g the
the
e file
fiile
e for
fo the
the website.
webs
bsitite
bs e.
Bene
Be n fi
ne fitt 1 ...
Benefit .....................
. .......................................................................................................
............................................................................................................................
............................................................................................................................................
................
. ..............................................................................................................................
B enefit 2 ....................
Benefit ..........................................................................................................
............................................................................................................................
.....................................
........................................................................................................
...........................................................................................................................................
[2]
Tick () to show if each denary to 8-bit binary conversion is Correct or Incorrect.
Correct Incorrect
Denary Binary Conversion
() ()
145 10010001
179 10110101
11 00010011
100 01100010
[4]
1 1 0 0 0 1 0 0 0 0 0 0
.............................................................................................................................................
...........................................
................................................................................................... [3]
Customer
erss access
er
Customers a ce
access
ss
s the
the website
website using
using
g a browser.
brow
wser.
wse
(a) Describe
Desc
sc
cribe how
ribe w the
how the webpages
es are requested and displayed on the customer’s computer.
webpage
....................................................................................................................................................
..........
....
....
..........................................................................................................................................
...........................................
..........................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................
........................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Threat 1 ....................................................................................................................................
Threat 2 ....................................................................................................................................
Threat 3 ....................................................................................................................................
[3]
Each computer in the network has a media access control (MAC) address.
97–5C–E1
(a) Complete the binary register for these two pairs of digits.
97
5C
[4]
.........................
........
. .....................................................................................
.......
..................................................
...................................................................................................................................................
...
........................................................................................................................................................
...................................................................................................................................................
.....
........................
. ................................................................................................................................
...................................................................................................................................................
.....
........
...........
.....................................................................................................................................
...................................................................................................................................................
...........................................
..........................................................................................................
...................................................................................................................................................
.............................................
. ......................................................................................................
..
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ........................................................................................................................................... [2]
0 1 0 1 0 0 1 0
(i) A logical left shift of two places is performed on the binary value.
Complete the binary register to show its contents after this logical left shift.
[1]
(ii) State one effect this logical shift has on the binary value.
...........................................................................................................................................
...................................................................................................................................... [1]
&RPSOHWHWKHELQDU\UH
HJL
JLVWH
JLV HUUIRUWKHGHQDU\YDOXHí
&RPSOHWHWKHELQDU\UHJLVWHUIRUWKHGHQDU\YDOXHí
Wo
ork
rkin
ng sspace
Working pac
acce ..
............................................................................................................................
...........................................................................................................................
.....
........................
. ................................................................................................................................
...................................................................................................................................................
.....
........
...........
.....................................................................................................................................
...................................................................................................................................................
...........................................
..........................................................................................................
...................................................................................................................................................
Register:
[2]
1 ................................................................................................................................................
2 ........................................................................................................................................... [2]
(b) Suggest two advantages of using robots, instead of humans, to build cars in the factory.
1 ................................................................................................................................................
2 .......................................................................................................................................... [2]
7 The Unicode character set is used to represent text that is typed into a computer.
......................................
...............................................................................................................
...................................................................................................................................................
...........................
........
. .....................................................................................................................
...................................................................................................................................................
..
.........................
............................................................
.. . .................
.. .........................
... ....
........
.. .....
.. .....................
..
................................................................................................................................................... . ........
................
.....
................................................................................................................................................ [2]
..............................................................................................................................................
(b) Onne di
One disa
sadv
ad
dvvantage of using
disadvantage g the
the Unicode character set, instead of the ASCII character set, is
that the text stored takes up
p more storage space.
...................................................................................................................................................
.............................................................................................................................................. [1]
3$*(
2210/11 Cambridge O Level – Mark Scheme May/June 2018
PUBLISHED
Question Answer Marks
analogue
digital
denary
10
binary
2
Question Answer
Answ
An swer
sw er Marks
42
257
542
3$*(
Question Answer
Answ
wer Marks
Register C
Lossy (compression)
Lossless (compression)
Lossless (compression)
– nibble
– byte
– megabyte (MB)
– gigabyte (GB)
depth .etc.
– An example of a suitable photo file format e.g. JPEG
– Lossy
Hours 0 0 0 0 0 0 1 0
Minutes 0 0 0 1 1 1 1 1
Seconds 0 0 1 1 1 0 1 0
0 5 2 6 5 5
Hours Minutes
Minu
ute
es Seconds
3$*(
Question Answer
Answ
wer Marks
1 1 0 1 0 0 0 0 0 0 1 1
66 0 1 0 0 0 0 1 0
85 0 1 0 1 0 1 0 1
83 0 1 0 1 0 0 1 1
x Error messages
x MAC addresses
x IP addresses
x Assembly language
x Memory dump
x Locations in memory
Question Answer
Answ err Marks
1(a) 6
97
1 0 0 1 0 1 1 1
1 mark
ark
k 1 mark
5C
0 1 0 1 1 1 0 0
1 mark 1 mark
3$*(
E1
1 1 1 0 0 0 0 1
1 mark 1 mark
Question Answer
Answ
wer Marks
2(a) 1 mark for correct name, 1 mark for correct gate symbol 2
AND
3$*(
2(b) 1 mark for correct name, 1 mark for correct gate symbol 2
NOR
Question Answer
Answ err Marks
5 Five from: 5
used
A (compression) algorithm is usedd
No data is removed in the process // original file can bee rrestored
esto
es t red
to
Repeated words (are identified) // Patterns in the dadata
ta
a ((are
are
ar e identified)
« and are indexed/put into a table // by example
« and are replaced with their index // by example
example
m le
« and their positions are stored (in the table) // by examp
« and the number of times the word/pattern appears iss sstoredtore
to r d (in the table) // by example
re
3$*(
awarded
NOTE: Other valid methods of lossless compression can be a w rded marks
wa
= 1.43 MB
colours
our
Different colour inks are mixed to create required colo urss
Technology could be piezoelectric
Technology could be thermal bubble
Ink is heated
« and expands/evaporates into a bubble
Bubble is pushed through the nozzle on to the paper
« then the bubble collapses
2 Fourr from: 4
x Arithmetic and logic unit (ALU)
x Memory address register (MAR)
register
egis
eg
x Memory data register (MDR) // Memory buffer reg i te
is (MBR)
er (M
(MBR
BR))
BR
x Accumulator (ACC)
x Immediate Access Store (IAS)
x Main memory // RAM
x Program counter (PC)
x Current instruction register (CIR)
x Address bus
x Data bus
x Control bus
x Input device
x Output device
x Secondary storage device
3$*(
Question Answer
An swer
wer Marks
4(a) x 52 1
4(b) 1
1 1 0 1 0 0 0 0
4(c) x It is multiplied by 4 1
1(c)(i) 6
1 1 1 1 1 0 0 1 0 0 1 0
3$*(
1 mark 1 mark 1 ma
m
mark
rk
1 0 1 0 0 0 0 1 0 0 0 0
1 mark 1 mark 1 ma
m
mark
rk
9(d)(i) − 10110100 2
3$*(
− 11001001
9(d)(iii) − 93 2
− 1D
7(a)(iii) − 1217 1
7(b) One mark per each correct hex value in correct orderr 3
− 0E9
1(b)(i) − Presentation 1
43 0 1 0 0 0 0 1 1
B7 1 0 1 1 0 1 1 1
F0 1 1 1 1 0 0 0 0
1(c)(i) − Input 1
3$*(
− … and indexed
re-ins
nsta
ns tate
tated
te
− No data is permanently removed // original file can be re-instated
− Suitable example of a lossless algorithm
145 10010001 9
179 10110101 9
11 00010011 9
100 01100010 9
3(b) One mark for each correct conversion in the correct order: 3
− C
− 4
− 0
3$*(
Question Answer
Answ
wer Marks
97 1 0 0 1 0 1 1 1
5C 0 1 0 1 1 1 0 0
1(d)(ii) The value becomes incorrect because the left most bits are lost.
are 1
1(e) One mark for method, e.g. conversion to binary then flipp
pin
i g and ad
flipping addi
d ng
din 1.
adding 2
One mark for correct answer.
1 1 0 0 1 0 1 0
Question A
An
nsw
swer
err
Answer Marks
5(a)(i) Any two from: 2
x it is easier / quicker to read/write/understand
x it is easier / quicker to debug
x code is portable.
5(a)(ii) Any one from: 1
x arrd
not able to directly manipulate the ha dwa
ware
are
hardware
x may need to wait for translation before running
x program may be less efficient.
5(b) Software that provides useful functions for a programmer
err w
writing o puter program.
om
riting a ccomputer 1
Question An swer
wer
e
Answer Marks
3$*(
Question Answ
wer
e
Answer Marks
7(a) x nted
nt
All the characters and symbols that can be represent
representede by a co
omp
puter system.
computer 2
x val
allue
Each character and symbol is assigned a unique value.ue.
7(b) Each character is encoded using more bits. 1
© UCLES 2020 Page 7 of 10