0% found this document useful (0 votes)
15 views

Comp Pre0

This document is a mid-term examination for a computer science class consisting of two parts: an objective section with multiple choice questions and a subjective section with longer answer questions. The objective section covers topics like binary, hexadecimal, data transmission types. The subjective section consists of questions about binary storage, hexadecimal, data compression, serial vs parallel transmission, error detection, and uses of specific transmission methods.

Uploaded by

musheeza liaqat
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Comp Pre0

This document is a mid-term examination for a computer science class consisting of two parts: an objective section with multiple choice questions and a subjective section with longer answer questions. The objective section covers topics like binary, hexadecimal, data transmission types. The subjective section consists of questions about binary storage, hexadecimal, data compression, serial vs parallel transmission, error detection, and uses of specific transmission methods.

Uploaded by

musheeza liaqat
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Joan McDonald School Islamabad

Mid-Term Examination 2023


SUBJECT: Computer Science

Name: _____________________ Class: Pre O


Date: ______________________ Time Allowed: 2hrs 30mins
Total Marks: 100 Marks Obtained: ____________
Teacher’s Name: Ms. Musheeza Teacher’s Sign:____________
Principal’s Stamp: ___________
Paper 1
Objective (30 marks)
1. What is the denary (base 10) equivalent to the hexadecimal
digit E?
a. 15 b. 14
c. 13 d. 12
2. 1 + 0, the sum will be …………………
a. 1 b. 0
c. 2 d. -1
3. The basic building block of the computer systems is _____.
a. Binary b. Hexadecimal
c. Denary d. None
4. 1 + 1, the carry will be …………
a. 1 b. 0
Page 1 of 10
c. 2 d. -1
5. The denary number 200 in binary is ………………
a. 11001000 b. 11001001
c. 11001111 d. 11011111
6. Convert the three 8-bit binary values into deanary.

01001011 ...............................................

01000101 ...............................................

01011001 ...............................................

7. Fill in the blanks.


Blair writes a paragraph about data transmission in her
Computer Science examination.

Use the list given to complete Blair’s paragraph by inserting


the correct five missing terms. Not all terms will be used.
Terms can be used more than once.

 Duplex
 Half-duplex
 Parallel
 Serial
 Simplex
..................................... data transmission is when data is
transmitted a single bit at a time. ............................................
Page 2 of 10
data transmission is when multiple bits of data are sent all at
once. If a user wants to transmit data over a long distance,
with the highest chance of accuracy, ..................................
data transmission should be used. If data needs to be
transmitted in one direction only, for example from a
computer to a printer, ............................................... data
transmission should be used. If a user has a large amount of
data to transmit and this need to be done as quickly as
possible ..................................... data transmission should be
used.

Page 3 of 10
Paper 2
Subjective (70 marks)

1. a. The library has a website that customers can use to


search for a book.
The colour code is stored in two 12-bit binary registers.
Show how the colour code would be stored in the
registers.

b. Explain why computer programmers may choose to use


hexadecimal.
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................

2. An 8-bit binary register contains the value:


00110100
a. Convert the binary value to denary.
....................................................................................................
Page 4 of 10
b. The contents of the register shown at the start of question
are shifted two places to the left.
Show the contents of the register after this shift has taken
place.

c. State the effect this shift has on the denary value in part (a)
....................................................................................................
....................................................................................................

3. Audrey wants to send a sound file to Nico using email.


The file is too large to attach to an email so Audrey decides to
compress the file. She uses lossy compression to reduce the
size of the sound file.

a. Describe how lossy compression reduces the size of


the sound file.

....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................

Page 5 of 10
....................................................................................................
....................................................................................................

b. Nico asks Audrey why she used lossy compression


rather than lossless.

i. State one advantage Audrey could give of using lossy


rather than lossless to compress the sound file.

....................................................................................................
...................................................................................................
....................................................................................................

ii. State one disadvantage Nico could give of using lossy


rather than lossless to compress the sound file.
....................................................................................................
....................................................................................................
....................................................................................................

4. Explain two advantages of using serial transmission rather


than parallel transmission.
Advantage 1
....................................................................................................
....................................................................................................
....................................................................................................

Advantage 2
Page 6 of 10
....................................................................................................
....................................................................................................
....................................................................................................

5. Another method of error detection is Automatic Repeat


request (ARQ). Explain how ARQ is used in error detection.
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................

6. State a use for the following data transmission methods.


The use must be different for each data transmission method.
1. Simplex
................................................................................................
................................................................................................
................................................................................................
................................................................................................
................................................................................................
................................................................................................

2. Duplex

Page 7 of 10
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................

7. Data can be transferred using parallel or serial data


transmission. Describe what is meant by parallel data
transmission.
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................

8. Describe what is meant by asymmetric encryption.


....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................

Page 8 of 10
9. The contents of three binary registers have been transmitted
from one computer to another. Odd parity has been used as
an error detection method.
The outcome after transmission is:
• Register A and Register B have been transmitted
correctly.
• Register C has been transmitted incorrectly.
Write the appropriate Parity bit for each register to show the
given outcome.

10. Explain the following terms briefly:


i. Packet switching
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................

Page 9 of 10
ii. Cyclic redundancy check
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................

11. Convert −79 into an 8-bit binary number using two’s


complement format.
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................
....................................................................................................

Page 10 of 10

You might also like