CS Assignment
CS Assignment
CS Assignment
1 A computer stores data in binary form. Binary numbers can be represented as hexadecimal and
denary numbers.
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
An Image is made of pixels and each pixel stores one colour and a set number of pixels wide by pixels
high and they get stored.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) Nadia compresses the digital image file before emailing it to a friend.
..................................................................................................................................... [1]
(ii) Explain why Nadia compresses the digital image file before emailing it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) Nadia’s email service uses parity bits as a method of error detection during the
transmission of data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(iv) Identify and describe one other method of error detection used during the transmission
of data.
Method ..............................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
3 (a) Tick (3) to show which logic gates will give an output of 1 for the given inputs A and B.
(b) Draw the logic circuit for the given logic statement:
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[4]
(i) Complete the descriptions of the principles of operation of a mouse and a keyboard
using the most appropriate terms from the list. Not all terms in the list need to be used.
• absorbs
• ball
• biometric
• circuit
• colour
• digital
• direction
• Light-Emitting Diode (LED)
• Liquid Crystal Display (LCD)
• reflects
• speed
• switch
• transparency
lens in the mouse and is converted to a value. This value is transmitted to the
When the user presses a key on a keyboard, the key pushes the
...................................................
switch on the circuit board. This completes a
circuit
................................................... . Signals are sent to the computer. The computer uses
(ii) Identify two other input devices Pradeep could use with his personal computer.
touchpad
Input device 1 ....................................................................................................................
microphone
Input device 2 ....................................................................................................................
[2]
(b) Pradeep uses a projector attached to the ceiling at his home to watch high-definition (HD)
films.
The projector has broken. He wants to buy a replacement. He needs to choose between an
LCD projector and a Digital Light Projector (DLP).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) Pradeep stores his collection of films and his work files on his personal computer.
Pradeep wants to save a copy of all his films and files onto a single storage device.
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
5 A holiday company has a website where customers can create accounts and can book and pay for
holidays.
Give two examples of HTML structure and two examples of HTML presentation.
Structure 1 ................................................................................................................................
Structure 2 ................................................................................................................................
Presentation 1 ..........................................................................................................................
Presentation 2 ..........................................................................................................................
[4]
(b) The website is stored on a web server. Customers use their own computers to access the
website.
Uniform Resource Locator (URL), Internet Protocol (IP) and Media Access Control (MAC) are
three types of address used by computers when accessing the Internet.
Type of
Features
address
............................................................................................................................
............................................................................................................................
URL
............................................................................................................................
............................................................................................................................
............................................................................................................................
............................................................................................................................
IP
............................................................................................................................
............................................................................................................................
............................................................................................................................
............................................................................................................................
MAC
............................................................................................................................
............................................................................................................................
[6]
.........................................................................
............................ ..................................
.........................................................................
............................ ..................................
.........................................................................
.........................................................................
.........................................................................
............................ ..................................
.........................................................................
............................ ..................................
.........................................................................
.........................................................................
[6]
6 A business uses a closed-circuit television (CCTV) system that starts recording when motion is
detected. It stops recording after two minutes if no further motion is detected. The system uses a
motion sensor and a microprocessor.
Describe how the motion sensor and microprocessor work together to control the CCTV system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [7]
(a) Ishani uses an interpreter and a compiler at different stages of the game creation.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(b) Ishani has to decide between releasing her game as freeware or free software.
Freeware ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.