0% found this document useful (0 votes)
89 views14 pages

10 D CS Paper 1

This document contains 9 questions about computer science topics like binary sorting, arithmetic shifts, binary addition, hexadecimal conversion, binary representation of numbers, bit representation, pixel definition, color depth and audio bit depth. The questions test understanding of fundamental CS concepts and how data is represented and processed in digital computers.

Uploaded by

Min Swan Pyae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views14 pages

10 D CS Paper 1

This document contains 9 questions about computer science topics like binary sorting, arithmetic shifts, binary addition, hexadecimal conversion, binary representation of numbers, bit representation, pixel definition, color depth and audio bit depth. The questions test understanding of fundamental CS concepts and how data is represented and processed in digital computers.

Uploaded by

Min Swan Pyae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Q1

A bubble sort is carried out on this list to put it in ascending order.


8 3 2 4 0 3 9
The value '8' starts in position 0.
(i) State the number of passes required to complete the sort.
(1)
.............................................................................................................................................
(ii) State the number of swaps made on the final pass.
(1)
.............................................................................................................................................
(iii) State the component of an algorithm used to store whether a swap has been made during a pass.
(1)
.............................................................................................................................................
(iv) State the position of the item that will be compared with the value in position 0.
(1)
.............................................................................................................................................
(v) Define the term 'iteration'.
(1)
.............................................................................................................................................

(Total for question = 5 marks)

Q2

Binary strings can be used to represent numbers, text, and images.


Describe the result of carrying out an arithmetic shift right, one place, to an 8-bit binary integer.
(2)

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

............................................................................................................................................

(Total for question = 2 marks)

1
Q3

A computer operates as a binary digital device.


8-bit two's complement is used to represent the denary numbers -8 and -1.
Complete the table to show the binary addition on these two negative numbers.
(2)

(Total for question = 2 marks)

Q4

Computers carry out mathematical operations.

(i) Convert the binary number 00111101 to hexadecimal.


(2)
.............................................................................................................................................

.............................................................................................................................................

(ii) Explain why hexadecimal notation is used.


(3)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 5 marks)

2
Q5

Convert the denary number 82 to 8-bit binary.


(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)


Q6

Identify the maximum number of values that can be represented with 5 bits.
(1)
A 5
B 16
C 25
D 32
(Total for question = 1 mark)

Q7

Binary strings can be used to represent numbers, text, and images.


Complete the table to calculate adding 12 in denary to −11 in denary using 8-bit notation and two's
complement.
(3)

(Total for question = 3 marks)

3
Q8

Images can be represented as bitmaps.


(i) Define the term 'pixel'.
(2)
.............................................................................................................................................

.............................................................................................................................................

(ii) Describe one way that changing the number of bits allocated to the colour depth determines how an
image is represented.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)


Q9

Analogue sound must be converted into a digital representation.


(i) State the name for the height of a sound wave.
(1)
.............................................................................................................................................

(ii) State one benefit and one drawback of increasing the bit depth of audio.
(2)
Benefit
.............................................................................................................................................

.............................................................................................................................................

Drawback

.............................................................................................................................................

............................................................................................................................................

(Total for question = 3 marks)

4
Q 10

Identify the reason why data capacity should be expressed in gibibytes rather than gigabytes.
(1)
A Gibibytes are consistent with the units used for data transmission
B Gibibytes represent binary multiples
C More data can be represented in gibibytes
D Processors have to carry out fewer operations when using gibibytes

(Total for question = 1 mark)


Q 11

The CPU carries out a process.


(i) Complete the diagram.
(2)

(ii) Identify the hardware component that carries instructions from memory to the CPU.
(1)
A Binary shift
B Control unit
C Data bus
D Register

(iii) State the component of the CPU that carries out additions and comparisons.
(1)
.............................................................................................................................................

.............................................................................................................................................

5
(iv) State the reason why a higher clock speed is desirable.
(1)
.............................................................................................................................................

.............................................................................................................................................

(v) State the name of a bus that is unidirectional.

(1)

.............................................................................................................................................

(Total for question = 6 marks)

Q 12

Complete the diagram of an embedded system by adding labelled boxes and arrows to show one sensor
and one actuator that controls a motor.
(2)

(Total for question = 2 marks)

6
Q 13

Computers carry out comparisons.


Complete the truth table.
(6)

(Total for question = 6 marks)

Q 14

The operating system controls the scheduling of processes.


Describe how the operating system uses scheduling to allocate processor time.
(4)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

7
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)


Q 15

Describe two ways an operating system manages processes.


(4)
1 ..........................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)


Q 16

The operating system manages peripherals.


Identify an additional piece of software that is required for the operating system to manage peripherals.
(1)
A Analogue to digital converter
B Assembler
C Device driver
D Disk defragmenter

(Total for question = 1 mark)

8
Q 17
A checksum works at the transport layer of TCP / IP.
Describe how a checksum is used to identify packets that have been corrupted during transmission.
(3)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 3 marks)

Q 18

Describe one disadvantage of using a bus topology.


(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

9
Q 19

Draw lines between these devices to show a fully-connected mesh network topology diagram:
(2)

(Total for question = 2 marks)

Q 20

Routers send packets that contain data around the internet.


State two other items found in a packet.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

10
Q 21

People use spoken commands to interact with digital assistants.


Explain one ethical concern associated with digital assistant technologies.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q 22

Explain one way that a patent protects intellectual property (IP).


(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q 23

Explain one reason why an employee who is logged on to the company network should not click on a link
in an email from an unknown source.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q 24
11
A backup of a server is made each night. Only the files changed that day are backed up.
Identify the name of this type of backup.
(1)
A Fragmented
B Full
C Incremental
D Lossy (Total for question = 1 mark)

Q 25

This notification appears on a computer screen.

(i) Name the type of malware used in this cyberattack.


(1)
.............................................................................................................................................

.............................................................................................................................................

(ii) Explain one way that digital systems may be vulnerable to cyberattacks when users do not properly
maintain their software. (2)

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 3 marks)

12
Q 26

State two environmental issues associated with the disposal of digital technology.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q 27

State two ways that a user can increase the useful life of a smartphone rather than throwing it away.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q 28

A computer operates as a binary digital device.


8-bit two's complement is used to represent the denary numbers -8 and -1.
Complete the table to show the binary addition on these two negative numbers.
(2)

(Total for question = 2 marks)

13
Q 29

Here is an algorithm.

Complete the table to show the output for the given input.
(3)

(Total for question = 3 marks)

Q 30

Data is split up into packets for transmission over a network.


Identify the item included in a packet header.
(1)
A Data being sent
B Decryption key
C Media restriction indicator
D Packet number
(Total for question = 1 mark)

14

You might also like