Chapter 1 Final

Download as pdf or txt
Download as pdf or txt
You are on page 1of 63

Information Representation

1. Information Representation

Q.1 (J’15(11/12), Q.1)

Q.2 (J’15(11/12), Q.2)


Information Representation

Q.3 (J’15(13), Q.1)


Information Representation

Q.4 (N’15(11/13), Q.8)


Information Representation

Q.5 (N’15(12), Q.3)


Information Representation

Q.6 (N’15(12), Q.4)


Information Representation

Q.7 (J’16(11/12), Q.2)

Q.7 (J’16(11/12), Q.4)


Information Representation
Information Representation

Q.8 (J’16(13), Q.2)

Q.9 (N’16(11/13), Q.3)


Information Representation

Q.10 (N’16(11/13), Q.7(B))

Q.11 (N’16(11/13), Q.8(C))


Information Representation

Q.12 (N’16(12), Q.2)


Information Representation

Q.13 (N’16(12), Q.4)

Q.14 (J’17(11/13), Q.3)


Information Representation

Q.15 (J’17(12), Q.3)


Information Representation

Q.16 (N’17(11/13), Q.1)


Information Representation
Information Representation

Q.17 (J’18(11), Q.2)


Information Representation

Q.18 (J’18(11), Q.8(C))


Information Representation

Q.19 (J’18(12), Q.4)


Information Representation

Q.20 (J’18(12), Q.5)


Information Representation

Q.21 (J’18(13), Q.3(C))

Q.22 (J’18(13), Q.6)


Information Representation
Information Representation

Q.23 (N’18(11), Q.1(B,C,D,E))


Information Representation

Q.24 (N’18(12), Q.1)


Information Representation

[5]

Q.25 (N’18(12), Q.3(C))


Information Representation

Q.26 (N’18(13), Q.1)


Information Representation

Q.27 (N’18(13), Q.2(B))


Information Representation

Q.28 (J’19(11), Q.1(D))

Q.29 (J’19(11), Q.6)


Information Representation

Q.30 (J’19(12), Q.3(D))


Information Representation

Q.31 (J’19(12), Q.4(B))

Q.32 (J’19(13), Q.5)


Information Representation
2

1 Anya scans an image into her computer for a school project.

(a) The scanned image is a bitmapped image.

(i) Complete the following table to describe the two terms about graphics.

Term Description

...........................................................................................................................
Pixel ...........................................................................................................................

...........................................................................................................................

...........................................................................................................................
File header ...........................................................................................................................

...........................................................................................................................

[2]

(ii) The image is scanned with an image resolution of 1024 × 512 pixels, and a colour depth
of 8 bits per pixel.

Calculate an estimate for the file size, giving your answer in mebibytes. Show your
working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer .......................................... mebibytes


[3]

(b) The image is compressed using lossless compression.

Identify one method of lossless compression that can be used to compress the image and
describe how the method will reduce the file size.

Lossless compression method .................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2021 9618/11/M/J/21
3

(c) One of the colours used in the image has the hexadecimal colour code:

#FC238A

FC is the amount of red, 23 is the amount of green and 8A is the amount of blue in the colour.

(i) Convert the hexadecimal code FC into denary.

..................................................................................................................................... [1]

(ii) The amount of green in binary is 00100011. This has the denary number 15 added to it
to create a second colour.

Add the denary number 15 to the binary number 00100011 and give your answer in
binary.

Perform the addition in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

(iii) Hexadecimal 23 in two’s complement representation is 00100011. The denary number


10 needs to be subtracted from this value.

Subtract the denary number 10 from the two’s complement representation 00100011.

Give your answer in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

© UCLES 2021 9618/11/M/J/21 [Turn over


4

(d) Anya made sure that the image was not subject to any copyright before scanning it.

Describe what is meant by copyright.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/11/M/J/21


12

6 A computer uses the ASCII character set.

(a) State the number of characters that can be represented by the ASCII character set and the
extended ASCII character set.

ASCII ...........................................................

Extended ASCII ...........................................................


[2]

(b) Explain how a word such as ‘HOUSE’ is represented by the ASCII character set.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Unicode is a different character set.

The Unicode value for the character ‘1’ is denary value 49.

(i) Write the hexadecimal value for the Unicode character ‘1’.

..................................................................................................................................... [1]

(ii) Write the denary value for the Unicode character ‘5’.

..................................................................................................................................... [1]

© UCLES 2021 9618/12/M/J/21


2

1 Anya scans an image into her computer for a school project.

(a) The scanned image is a bitmapped image.

(i) Complete the following table to describe the two terms about graphics.

Term Description

...........................................................................................................................
Pixel ...........................................................................................................................

...........................................................................................................................

...........................................................................................................................
File header ...........................................................................................................................

...........................................................................................................................

[2]

(ii) The image is scanned with an image resolution of 1024 × 512 pixels, and a colour depth
of 8 bits per pixel.

Calculate an estimate for the file size, giving your answer in mebibytes. Show your
working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer .......................................... mebibytes


[3]

(b) The image is compressed using lossless compression.

Identify one method of lossless compression that can be used to compress the image and
describe how the method will reduce the file size.

Lossless compression method .................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2021 9618/13/M/J/21
3

(c) One of the colours used in the image has the hexadecimal colour code:

#FC238A

FC is the amount of red, 23 is the amount of green and 8A is the amount of blue in the colour.

(i) Convert the hexadecimal code FC into denary.

..................................................................................................................................... [1]

(ii) The amount of green in binary is 00100011. This has the denary number 15 added to it
to create a second colour.

Add the denary number 15 to the binary number 00100011 and give your answer in
binary.

Perform the addition in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

(iii) Hexadecimal 23 in two’s complement representation is 00100011. The denary number


10 needs to be subtracted from this value.

Subtract the denary number 10 from the two’s complement representation 00100011.

Give your answer in binary. Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer (in binary) ........................................


[3]

© UCLES 2021 9618/13/M/J/21 [Turn over


4

(d) Anya made sure that the image was not subject to any copyright before scanning it.

Describe what is meant by copyright.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2021 9618/13/M/J/21


2

1 Computers store data in binary form.

(a) State the difference between a tebibyte and a terabyte.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Convert the signed denary value –100 into an 8-bit two’s complement binary integer.

Working .....................................................................................................................................

...................................................................................................................................................

Answer ............................................................................ [1]

(c) Convert the denary number 251 into hexadecimal. Show your working.

Working .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Answer ............................................................................
[2]

(d) Add the following unsigned binary integers.

01010000

+00111110

[1]

© UCLES 2022 9618/11/M/J/22


3

2 A computer has hardware and software.

(a) The hardware includes different types of memory.

(i) Complete the description of computer memory.

Random Access Memory (RAM) and Read Only Memory (ROM) are both examples of

......................................................................... memory.

One item that is stored in RAM is ......................................................................... .

One item that is stored in ROM is ......................................................................... .

RAM can be either Static RAM (SRAM) or Dynamic RAM (DRAM).

SRAM uses transistors arranged as ......................................................................... .

DRAM uses transistors and ......................................................................... .


[5]

(ii) Explain the difference between Programmable ROM (PROM), Erasable Programmable
ROM (EPROM) and Electrically Erasable Programmable ROM (EEPROM).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

© UCLES 2022 9618/11/M/J/22 [Turn over


2

1 (a) Draw one line from each image representation term to its correct definition.

Term Definition

The number of pixels wide by the number of


Pixel
pixels high

The smallest identifiable component of an


Bit depth
image

Stores data about the image file, e.g. file


Image resolution
format, number of bits per pixel, file size

The number of bits used to represent each


File header
colour

[3]

(b) The following section of a bitmap image is 10 pixels wide and 5 pixels high. In this example,
each colour is represented by a letter, e.g. B is blue.

B B B B B B B B B B

Y Y P Y Y Y P Y Y Y

R R M R P K T T R R

B O P Y Y Y P G P P

R O R P P P R R R R

The complete image can have up to 256 colours.

(i) Identify the smallest number of bits that can be used to represent each colour in the
complete bitmap image.

..................................................................................................................................... [1]

© UCLES 2022 9618/12/M/J/22


3

(ii) Calculate an estimate for the file size of the section of the bitmap image shown, giving
your answer in bytes. Use your answer from part (b)(i).

Show your working.

Working .............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Answer ................................... bytes


[2]

(c) Describe how changing the colour depth of an image affects its file size.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(d) The first row of pixels in the image from part (b) is shown:

B B B B B B B B B B

Explain how this row of pixels can be compressed using lossless compression.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2022 9618/12/M/J/22 [Turn over


2

1 Text and numbers are examples of data stored in a computer.

(a) A character set is used to represent characters in a computer.

(i) Describe what is meant by a character set.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Identify two character sets and state one difference between them.

Character set 1 ..................................................................................................................

Character set 2 ..................................................................................................................

Difference ..........................................................................................................................

...........................................................................................................................................
[3]

(iii) Describe how lossless compression can be used to reduce the file size of a text file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iv) Explain why lossy compression should not be used on a text file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
© UCLES 2022 9618/13/M/J/22
3

(b) A computer can represent numerical data in different forms.

Complete the table by writing the answer to each statement.

Statement Answer

The hexadecimal value 11 represented in denary

The smallest denary number that can be represented


by an unsigned 8-bit binary integer
The denary number 87 represented in Binary Coded
Decimal (BCD)

The denary number 240 represented in hexadecimal

The denary number –20 represented in 8-bit two’s


complement binary
[5]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2022 9618/13/M/J/22 [Turn over


Cambridge International AS & A Level
* 1 9 4 9 4 4 2 0 6 4 *

COMPUTER SCIENCE 9618/11


Paper 1 Theory Fundamentals October/November 2021

1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (CE/FC) 221502
© UCLES 2021 [Turn over
2

1 (a) Draw one line from each binary value to its equivalent (same) value on the right.

Binary value
1 kibibyte

8 bits

1 gigabyte

8000 bits

1 byte

1000 kilobytes

1 kilobyte

1024 mebibytes

1 gibibyte

8192 bits

1 megabyte

1 mebibyte

[5]

(b) (i) Perform the following binary addition. Show your working.

10101010
+ 00110111

[2]

(ii) State how an overflow can occur when adding two binary integers.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) Convert the hexadecimal value F0 into denary.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2021 9618/11/O/N/21


3

2 Xanthe wants to maintain the integrity and security of data stored on her computer.

(a) Explain the difference between data security and data integrity.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Xanthe uses both data validation and data verification when entering data on her computer.

(i) Describe how data validation helps to protect the integrity of the data. Give an example
in your answer.

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................
[2]

(ii) Describe how data verification helps to protect the integrity of the data. Give an example
in your answer.

Description ........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................
[2]

(c) Two malware threats are spyware and viruses.

Give two similarities and one difference between spyware and a virus.

Similarity 1 ................................................................................................................................

...................................................................................................................................................

Similarity 2 ................................................................................................................................

...................................................................................................................................................

Difference .................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2021 9618/11/O/N/21 [Turn over


4

3 A logic circuit is shown:

A
B X

(a) Write the logic expression for the logic circuit.

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Complete the truth table for the given logic circuit.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

[2]

© UCLES 2021 9618/11/O/N/21


5

(c) Identify one logic gate not used in the given logic circuit. Draw the symbol for the logic gate
and complete its truth table.

Logic gate: ………………………………

Symbol:

Truth table:

A B Output

0 0

0 1

1 0

1 1
[3]

© UCLES 2021 9618/11/O/N/21 [Turn over


6

4 Francis is starting his first job as a software developer for a multinational company.

(a) Francis has been advised to join a professional ethical body.

Describe the benefits to Francis of joining a professional ethical body.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Francis is shown the software he will be working on. He is unfamiliar with the Integrated
Development Environment (IDE) he is required to use.

(i) Describe the ways in which Francis can act ethically in this situation.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) A typical IDE provides debugging tools to support the testing of a program.

Identify three other tools or features found in a typical IDE to support the writing of the
program.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(c) Francis is part of a team writing a program. He finds an error in part of the program that
has already been tested. He decides not to tell anyone because he is worried about the
consequences.

Explain the reasons why Francis acted unethically in this situation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
© UCLES 2021 9618/11/O/N/21
7

(d) Francis’s team use language translators.

Complete the descriptions of language translators by writing the missing words.

............................................... are usually used when a high‑level language program is

complete. They translate all the code at the same time and then run the program.

They produce ............................................... files that can be run without the source code.

............................................... translate one line of a high‑level language program at a time,

and then run that line of code. They are most useful while developing the programs because

errors can be corrected and then the program continues from that line.

Assemblers are used to translate assembly code into ............................................... .


[4]

© UCLES 2021 9618/11/O/N/21 [Turn over


8

5 Javier owns many shops that sell cars. He employs several managers who are each in charge of
one or more shops. He uses the relational database CARS to store the data about his business.

Part of the database is shown:

SHOP(ShopID, ManagerID, Address, Town, TelephoneNumber)

MANAGER(ManagerID, FirstName, LastName, DateOfBirth, Wage)

CAR(RegistrationNumber, Make, Model, NumberOfMiles, ShopID)

(a) Tick () one box in each row to identify whether each field is a primary key or a foreign key.

Table Field name Primary key Foreign key

MANAGER ManagerID

SHOP ManagerID

CAR RegistrationNumber

CAR ShopID

[2]

(b) Describe the ways in which access rights can be used to protect the data in Javier’s database
from unauthorised access.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2021 9618/11/O/N/21


9

(c) Javier uses Data Definition Language (DDL) and Data Manipulation Language (DML)
statements in his database.

(i) Complete the following DML statements to return the number of cars for sale in each
shop.

SELECT COUNT(.........................................................)

FROM .........................................................

......................................................... ShopID
[3]

(ii) Complete the DML statement to include the following car in the table CAR.

Field Data

RegistrationNumber 123AA

Make Tiger

Model Lioness

NumberOfMiles 10500

ShopID 12BSTREET

........................ ........................ CAR

............................ ("123AA","Tiger","Lioness",10500,"12BSTREET")
[2]

© UCLES 2021 9618/11/O/N/21 [Turn over


10

BLANK PAGE

© UCLES 2021 9618/11/O/N/21


11

6 (a) There are two errors in the following register transfer notation for the fetch‑execute cycle.

1 MAR [PC]

2 PC [PC] − 1

3 MDR [MAR]

4 CIR [MDR]

Complete the following table by:


• identifying the line number of each error
• describing the error
• writing the correct statement.

Line
Description of the error Correct statement
number

[4]

© UCLES 2021 9618/11/O/N/21 [Turn over


12

(b) The following table shows part of the instruction set for a processor. The processor has one
general purpose register, the Accumulator (ACC), and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
LDD <address> Direct addressing. Load the contents of the location at the given address to
ACC
STO <address> Store the contents of ACC at the given address
INC <register> Add 1 to the contents of the register (ACC or IX)
CMP <address> Compare the contents of ACC with the contents of <address>
JPN <address> Following a compare instruction, jump to <address> if the compare was False
JMP <address> Jump to the given address
IN Key in a character and store its ASCII value in ACC
OUT Output to the screen the character whose ASCII value is stored in ACC
END Return control to the operating system
XOR #n Bitwise XOR operation of the contents of ACC with the operand
XOR <address> Bitwise XOR operation of the contents of ACC with the contents of <address>
AND #n Bitwise AND operation of the contents of ACC with the operand
AND <address> Bitwise AND operation of the contents of ACC with the contents of <address>
OR #n Bitwise OR operation of the contents of ACC with the operand
OR <address> Bitwise OR operation of the contents of ACC with the contents of <address>
LSL #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on
the right hand end
LSR #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on
the left hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001101

The current contents of main memory are shown:

Address Data
100 00001111
101 11110000
102 01010101
103 11111111
104 00000000

© UCLES 2021 9618/11/O/N/21


13

Each row of the following table shows the current contents of ACC in binary and the instruction
that will be performed on those contents.

Complete the table by writing the new contents of the ACC after the execution of each
instruction.

Current contents of the ACC Instruction New contents of the ACC

11111111 OR 101

00000000 XOR #15

10101010 LSR #2

01010101 AND 104

[4]

© UCLES 2021 9618/11/O/N/21 [Turn over


14

7 Bobby is recording a sound file for his school project.

(a) He repeats the recording of the sound several times, with a different sample rate each time.

(i) Describe the reasons why the sound is closer to the original when a higher sample rate
is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Describe the reasons why the sound file size increases when a higher sample rate is
used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(b) Bobby wants to email the sound file to his school email address. He compresses the file
before sending the email.

(i) Explain the reasons why Bobby compresses the sound file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Bobby uses lossless compression.

Describe how lossless compression can compress the sound file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2021 9618/11/O/N/21


15

8 A school is setting up a network within one of its buildings.

(a) State whether the network will be a LAN (local area network) or a WAN (wide area network).
Justify your choice.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) One classroom in the building has 30 computers. The computers need to be connected to the
network. Each computer has a network interface card (NIC).

Identify two possible devices that can be used to physically connect the 30 computers to the
rest of the network.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(c) The school has several laptops. Each laptop has a Wireless Network Interface Card (WNIC).

Describe the functions of a Wireless Network Interface Card.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2021 9618/11/O/N/21


16

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2021 9618/11/O/N/21


6

4 A register stores the following binary number:

1 1 0 0 1 1 0 1

(a) The binary value in the register represents an unsigned binary integer.

Convert the unsigned binary integer into denary.

............................................................................................................................................. [1]

(b) The binary value in the register represents a two’s complement binary integer.

Convert the two’s complement binary integer into denary.

............................................................................................................................................. [1]

(c) The binary value in the register represents a hexadecimal number.

Convert the binary number into hexadecimal.

............................................................................................................................................. [1]

(d) State why the value in the register cannot be interpreted as a Binary Coded Decimal (BCD).

...................................................................................................................................................

............................................................................................................................................. [1]

(e) The binary contents of two registers are:

Register 1 0 0 1 1 1 1 0 1

Register 2 0 0 1 0 1 1 0 1

(i) Add the contents of Register 1 and Register 2. Show your working.

Answer ..............................................................................................................................
[2]

© UCLES 2021 9618/12/O/N/21


7

(ii) Subtract the contents of Register 2 from the contents of Register 1. Show your working.

Answer ..............................................................................................................................
[2]

© UCLES 2021 9618/12/O/N/21 [Turn over


8

5 Riya has created the following logo as a vector graphic.

(a) Complete the table by writing a description of each vector graphic term and give an example
for this logo.

Term Description Example from logo

Property

Drawing list

[4]

(b) Riya takes a photograph using a digital camera. The photograph is stored as a bitmap image.

(i) Describe two differences between a vector graphic and a bitmap image.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2021 9618/12/O/N/21
9

(ii) Riya needs to email the photograph. She compresses the photograph before sending it
using an email.

Describe two lossy methods that Riya can use to compress the image.

Method 1 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Method 2 ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

© UCLES 2021 9618/12/O/N/21 [Turn over


2

1 (a) Draw one line from each binary value to its equivalent (same) value on the right.

Binary value
1 kibibyte

8 bits

1 gigabyte

8000 bits

1 byte

1000 kilobytes

1 kilobyte

1024 mebibytes

1 gibibyte

8192 bits

1 megabyte

1 mebibyte

[5]

(b) (i) Perform the following binary addition. Show your working.

10101010
+ 00110111

[2]

(ii) State how an overflow can occur when adding two binary integers.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) Convert the hexadecimal value F0 into denary.

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2021 9618/13/O/N/21

You might also like