10 D CS Paper 1
10 D CS Paper 1
Q2
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
............................................................................................................................................
1
Q3
Q4
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
2
Q5
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Identify the maximum number of values that can be represented with 5 bits.
(1)
A 5
B 16
C 25
D 32
(Total for question = 1 mark)
Q7
3
Q8
.............................................................................................................................................
(ii) Describe one way that changing the number of bits allocated to the colour depth determines how an
image is represented.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(ii) State one benefit and one drawback of increasing the bit depth of audio.
(2)
Benefit
.............................................................................................................................................
.............................................................................................................................................
Drawback
.............................................................................................................................................
............................................................................................................................................
4
Q 10
Identify the reason why data capacity should be expressed in gibibytes rather than gigabytes.
(1)
A Gibibytes are consistent with the units used for data transmission
B Gibibytes represent binary multiples
C More data can be represented in gibibytes
D Processors have to carry out fewer operations when using gibibytes
(ii) Identify the hardware component that carries instructions from memory to the CPU.
(1)
A Binary shift
B Control unit
C Data bus
D Register
(iii) State the component of the CPU that carries out additions and comparisons.
(1)
.............................................................................................................................................
.............................................................................................................................................
5
(iv) State the reason why a higher clock speed is desirable.
(1)
.............................................................................................................................................
.............................................................................................................................................
(1)
.............................................................................................................................................
Q 12
Complete the diagram of an embedded system by adding labelled boxes and arrows to show one sensor
and one actuator that controls a motor.
(2)
6
Q 13
Q 14
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
7
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
8
Q 17
A checksum works at the transport layer of TCP / IP.
Describe how a checksum is used to identify packets that have been corrupted during transmission.
(3)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q 18
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
9
Q 19
Draw lines between these devices to show a fully-connected mesh network topology diagram:
(2)
Q 20
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
10
Q 21
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q 22
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q 23
Explain one reason why an employee who is logged on to the company network should not click on a link
in an email from an unknown source.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q 24
11
A backup of a server is made each night. Only the files changed that day are backed up.
Identify the name of this type of backup.
(1)
A Fragmented
B Full
C Incremental
D Lossy (Total for question = 1 mark)
Q 25
.............................................................................................................................................
(ii) Explain one way that digital systems may be vulnerable to cyberattacks when users do not properly
maintain their software. (2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
12
Q 26
State two environmental issues associated with the disposal of digital technology.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q 27
State two ways that a user can increase the useful life of a smartphone rather than throwing it away.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q 28
13
Q 29
Here is an algorithm.
Complete the table to show the output for the given input.
(3)
Q 30
14