0478/12/M/J/15 © Ucles 2015
0478/12/M/J/15 © Ucles 2015
1 (a) Four statements about cookies are shown in the table below.
(b) Five descriptions and five security issues are shown below.
[4]
[5]
7 (a) Check digits are used to ensure the accuracy of input data.
A 7-digit code number has an extra digit on the right, called the check digit.
Digit position 1 2 3 4 5 6 7 8
Digit – – – – – – – –
(i) Calculate the check digit for the following code number. Show all your working.
4 2 4 1 5 0 8 …
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3 2 4 0 0 4 5 X
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) When data are transmitted from one device to another, a parity check is often carried out on
each byte of data. The parity bit is often the leftmost bit in the byte.
(i) If a system uses even parity, give the parity bit for each of the following bytes:
parity bit
1 1 0 0 1 1 0
parity bit
0 0 0 0 0 0 1
[2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
8 The steps to print a document using a laser printer are shown in the table below.
Put each step in the correct order. The first step has been done for you.
Step Order
As the printing drum rotates, a laser scans across it; this removes the
positive charge in certain areas
The printing drum is coated in positively-charged toner; this then sticks to the
negatively-charged parts of the printing drum
The paper goes through a fuser which melts the toner so it fixes permanently
to the paper
The printer driver ensures that the data is in a format that the laser printer
can understand 1
Data is then sent to the laser printer and stored temporarily in the printer
buffer
The toner on the printing drum is now transferred to the paper to reproduce
the required text and images
[8]
© UCLES 2015 0478/12/O/N/15 [Turn over
QUESTION 4. 8
“It allows a user to have the freedom to run, copy, change and adapt the software and
then pass it on to a colleague, friend or family member.”
...................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(b) The four statements below refer to firewalls and proxy servers.
Tick (9) the appropriate column(s) to indicate whether the statement refers to a firewall
and/or a proxy server.
[4]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]