O Level Revision Notes V22
O Level Revision Notes V22
Have Revised
Have Read
To Revise
Prepared
S No Learning Outcome
To Read
1.1.1: Binary systems
1 Recognize the use of binary numbers in computer systems
2 Denary-to-binary and binary-to- denary conversion
3 Concept of a byte and how the byte is used to measure memory size
Use binary in computer registers for a given application (such as in
4
robotics, digital instruments and counting systems)
1.1.2: Hexadecimal
5 Represent integers as hexadecimal numbers
6 Reasons for choosing hexadecimal to represent numbers
7 Convert positive hexadecimal integers to and from denary
8 Convert positive hexadecimal integers to and from binary
9 Represent numbers stored in registers and main memory as hexadecimal
Identify current uses of hexadecimal numbers in computing, such as
defining colours in Hypertext Markup Language (HTML), Media Access
10
Control (MAC) addresses, assembly languages and machine code,
debugging
1.1.3: Data storage
43 File formats sound (music), pictures, video, text and numbers
Identify and describe methods of error detection and correction, such as
44 parity checks, check digits, checksums and Automatic Repeat requests
(ARQ)
45 Concept of (MIDI) files, jpeg files, MP3 and MP4 files
File compression (lossless and lossy compression algorithms) applied to
46
music/video, photos and text files
Chapter at a glance:
Some of the number systems, those are studied in A Level Computer Science are:
i) Denary (Decimal) number system
ii) Binary number system
iii) Hexadecimal number system
Denary (Decimal) Number System:-
“The number system which is based on 10 characters from 0 to 9 is called denary (decimal)
system.”
It is the most common number system. The digits of decimal system are 0, 1, 2, 3, 4, 5, 6, 7,
8, and 9. The value of each digit in a figure depends upon its weight. The weights are based on
power of 10.
Binary numbers are fundamental to the way that all modern computers work. They are used to
represent any data stored within a computer system.
There are a few reasons why the MAC address needs to be changed using LAA:
x Certain software used on mainframe systems needs all the MAC addresses of devices to
fall into a strict format; because of this, it may be necessary to change the MAC address of
some devices to ensure they follow the correct format.
x It may be necessary to bypass a MAC address filter on a router or a firewall; only 24 MAC
addresses with a certain format are allowed through, otherwise the devices will be blocked.
x To get past certain types of network restrictions it may be necessary to emulate unrestricted
MAC addresses; hence it may require the MAC address to be changed on certain devices
connected to the network.
Uses of Hexadecimal in Debugging:
Debugging allows programmers to detect, diagnose, and eliminate errors in a program. The source
debugger uses the hexadecimal values of the characters. Hex is often used in error messages. The
hex number refers to the memory location of the error. This helps programmers to find and then fix
problems.
Memory Dump
Contents of memory are in binary numbers. Binary numbers are
long and difficult to understand.
Memory dump is a hexadecimal view (on screen or paper) of
computer data, from RAM or from a file or storage device. As
memory dump uses hexadecimal number to show memory
contents, it become a powerful fault tracing tool but requires
expertise in computer architecture.
Uses of Hexadecimal in Assembly Language:
Machine codes are written in binary language which is very long and difficult to understand.
Hexadecimal numbers are easier, faster and less error prone to write code.
In assembly language codes are written in hexadecimal. This can have many advantages to
program developers or when carrying out troubleshooting.
For example:
LDD A750 (assemble language)
A5E4 FFA4 (machine code using hexadecimal values)
1010 0101 1110 0100 1111 1111 1010 0100 (machine code using binary)
MIDI is essentially a communications protocol that allows electronic musical instruments to interact
with each other.
Two additional bytes are required, a PITCH BYTE for note to play, and a VELOCITY BYTE for
loudness. However, to play back through an instrument such as
a guitar would need the use of SEQUENCER SOFTWARE.
MPEG-4 (MP4) files are slightly different to MP3 files. This format allows the storage of multimedia
files rather than just sound. Music, videos, photos and animation can all be stored in the MP4
format. Videos, for example, could be streamed over the internet using the MP4 format without
losing any real discernible quality.
Bit depth – number of bits used to represent the smallest unit in, for example, a sound or image file – the
larger the bit depth, the better the quality of the sound or colour image.
Colour depth – number of colours available in a pixel, e.g. 8 bit depth has colour depth of 256 (28 = 256).
Colour Depth Available Colours
Bit Depth
Available colours
1-bit 21 = 2 Monochrome ( Black & White)
2-bit 22 = 4 Grey Scale
3-bit 23 = 8 RGB 8 Colours
7-bit 27 = 128 128 Colours
8-bit= 1 byte 28 = 256 256 Colour
24-bit= 3 byte 224 = 16,777,216 True colours 16,777,216 Colours
Image resolution – number of pixels that make up an image, for example, an image could contain 4096 ×
3192 pixels (12 738 656 pixels in total).
Screen resolution – number of horizontal and vertical pixels that make up a screen display. If the screen
resolution is smaller than the image resolution, the whole image cannot be shown on the screen, or the
original image will become lower quality.
Resolution – number of pixels per column and per row on a monitor or television screen.
Pixel density – number of pixels per square centimetre.
Vector graphics – images that use 2D points to describe lines and curves and their properties that are
grouped to form geometric shapes.
How images are stored in computer:
PEG is the file compression format designed to make photo files smaller in size for storage and for
transmission. It uses lossy compression and compresses a file between factor of 5 to 15.
Image File Size Calculation
To calculate image file size, firstly number of
pixels found out then these are multiplied to find
total number of pixels in an image that gives,
image resolution.
For example 2000 pixels wide and 2000 pixels
high image will have 2000 × 2000= 4,000,000
Uncompressed raw pixels. This is often referred to as a 4-megapixel image.
image Then Image resolution is multiplied by bit depth.
THIS 1
HOW 2
OU 3
Text compression typically works by finding similar strings within a text file, and replacing those
strings with a temporary binary representation to make the overall file size smaller. Computers can
compress text by finding repeated sequences and replacing them with shorter representations, a
character that isn't part of the original text.
For example a quote having 84 characters “Think left and think right and think low and think high.
Oh, the thinks you can think up if only you try!"
The computer also needs to store the table of replacements that it made, so that it can reconstruct
the original.
Replacement original
$ think
& and
# you
The repeated words replaced with the character and the compressed file has 50 characters. The
compressed file is “$ left & $ right & $ low & $ high. Oh, the $s # can $ up if only # try!"
Text is compressed using Run Length Encoding method also.
In run-length encoding, the computer replaces each row with numbers that say how many
consecutive pixels are the same color, For example, 4 white pixels, 10 black pixels, and then 2 white
pixels:
1111 0000 0000 0011 or WWWW BBBB BBBB BBWW
This would be represented after Run Length Encoding as follows:4 1 10 0 2 1 or 4W 10B 2W
214
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [2]
(b) Benedict’s computer is also assigned a Media Access Control (MAC) address.
(i) Identify one similarity between an IP address and a MAC address.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Identify two differences between an IP address and a MAC address.
Difference 1 .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Difference 2 .......................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [2]
E6XPPHU3
1 A denary value can be converted into hexadecimal and binary. [6]
(a) Complete the table to show the hexadecimal and 8-bit binary values of the given denary values.
Denary Hexadecimal 8-bit binary
49
123
200
Working space
...................................................................................................................................................
...................................................................................................................................................
(b) Give two benefits, to users, of converting binary values to hexadecimal.
Benefit 1 ....................................................................................................................................
...................................................................................................................................................
Benefit 2 ....................................................................................................................................
................................................................................................................................................... [2]
Answers:
1 (a) (i) Manufacturer
1 (a) (ii) 00010100
10100000
11001001
1 (a) (iii) 41
200
(a) Convert each of the five values to binary. The first one has been done for you. [2]
Letter Binary value
a (97): 0 1 1 0 0 0 0 1
l(108):
i (105):
g (103):
n (110):
(b) An encryption system works by shifting the binary value for a letter one place to the left. “a” then
becomes:
This binary value is then converted to hexadecimal; the hexadecimal value for “a” will be:
C2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these values into
hexadecimal: [4]
4 (a) (i) Convert the following two hexadecimal numbers into binary:
[4]
(ii) Now perform the AND (logic) operation on each corresponding pair of binary bits in the two
numbers from part (i).
[2]
(iii) Convert your answer in part (ii) into hexadecimal.
........................................................................................................................................... [2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) The system uses odd parity.
Write the correct parity bit in each register.
[2]
(iii) A car has a faulty airbag and the CO level is too high.
Write what should be contained in the 8-bit register.
(iv) Give the hexadecimal value of the binary number shown in part (iii).
...........................................................................................................................................
.......................................................................................................................................[1]
9 MP3 file compression reduces the size of a music file by 90%.
(a) A music track is 80 MB in size.
Calculate the file size after compression.
............................................................................................................................................
How many MP3 files of the size calculated above could be stored on an 800 MB CD?
.......................................................................................................................................[2]
3 9KPVGT2
2 (a) Convert the hexadecimal number B5 into binary:
...........................................................................................................................................
Convert the binary number 1 1 1 1 0 1 1 0 into hexadecimal:
........................................................................................................................................[2]
(b) Give two examples where hexadecimal numbers are used in computer science.
1: .........................................................................................................................................
2: ...............................................................................................................................[2]
(c) State two benefits of using hexadecimal numbers in computer science.
1: .........................................................................................................................................
..........................................................................................................................................
2:.......................................................................................................................................
........................................................................................................................[2]
7 (a) Describe what is meant by lossy and lossless compression when applied to files.
Lossy: .................................................................................................................................
............................................................................................................................................................
..............................................................................................................................
Lossless: ............................................................................................................................
............................................................................................................................................................
.........................................................................................................................[2]
(b) Name and describe one type of file that uses lossy compression.
Name: .................................................................................................................................
Description: .........................................................................................................................
............................................................................................................................................................
........................................................................................................................[2]
w w W
3 9KPVGT2
5 A computer uses an 8-bit register.
The 8-bit register contains binary integers.
(a) Write the denary (base 10) value represented by:
128 64 32 16 8 4 2 1
0 1 1 1 0 0 0 0
............................................................................................................................................... [1]
3 5WOOGT2
1 Jane answers an examination question about computers and data correctly.
Six different words or numbers have been removed from her answer.
Complete the sentences in Jane’s answer, using the list given. Not all items in the list need to be
used.
•2 • 10 • 16 • analogue • binary
• denary • digital • hexadecimal
As humans, we process …………………………………… data, but a computer cannot process this
type of data. For a computer to be able to process data it needs to be converted to
…………………………………… data.
As humans, we mostly use a …………………………………… number system; this is a base
…………………………………… number system.
Computers use a …………………………………… number system; this is a base
…………………………………… number system. [6]
3 5WOOGT2
1 Different units of data can be used to represent the size of a file, as it changes in size.
Fill in the missing units of data, using the list given: [4]
Byte gigabyte (GB) megabyte (MB) nibble
Smallest Bit
……………………………………
……………………………………
Kilobyte (KB)
………………………………….
………………………………….
Largest Terabyte (TB)
3 5WOOGT2
1 Hexadecimal is used for MAC addresses.
Part of a MAC address is given:
97 – 5C – E1
Each pair of digits is stored as binary in an 8-bit register.
(a) Show what the binary register stores for each pair of the given digits. [6]
97
5C
E1
(b) Explain what is meant by a MAC address.
..........................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................. [4]
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure.
Explain how lossless compression would compress this file.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
................................................................................................................................................... [5]
7 Annie writes a paragraph of text as an answer to an examination question about programming
languages. Using the list given, complete Annie’s answer by inserting the correct six missing
terms. Not all terms will be used.
• Assembly • Converter • Denary • Hexadecimal
• High-level language • Low-level language • Machine Code • Source Code
• Syntax • Translator
The structure of language statements in a computer program is called the ............................... . A
programming language that uses natural language statements is called a ………………… . When
programs are written in this type of language they need a ......................................................... to
convert them into ....................................................................... . A programming language that is
written using mnemonic codes is called ....................................................................... language.
this is an example of a ....................................................................... . [6]
3 9KPVGT2
1 (c) The library has a website that customers can use to search for a book.
(i) The website has a background colour with the hexadecimal colour code #F92A10The colour
code is stored in two 12-bit binary registers. [6]
Show how the colour code would be stored in the registers.
F92
A10
(c) State the effect this shift has on the denary value in part (a).
............................................................................................................................................................
...................................................................................................................................................... [1]
5 Audrey wants to send a sound file to Nico using email.
The file is too large to attach to an email so Audrey decides to compress the file.
She uses lossy compression to reduce the size of the sound file.
(a) Describe how lossy compression reduces the size of the sound file.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
....................................................................................................................................................... [4]
(b) Nico asks Audrey why she used lossy compression rather than lossless.
(i) State one advantage Audrey could give of using lossy rather than lossless to compress the
sound file.
...................................................................................................................................................... [1]
(ii) State one disadvantage Nico could give of using lossy rather than lossless to compress the
sound file.
...................................................................................................................................................... [1]
(c) Audrey sometimes records MIDI files.
(i) Explain what is meant by a MIDI file.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
....................................................................................................................................................... [4]
3 9KPVGT2
1 1 0 0 0 1 0 0 0 0 0 0
............................................................................................................................................. [3]
3 /CTEJ2
1 (b) Give the largest denary value that can be stored in the 8-bit binary register.
............................................................................................................................................. [1]
(c) The hockey club wants to increase the number of people that can watch each match to 2000.
The 8-bit binary register may no longer be able to store the value.
Give the smallest number of bits that can be used to store the denary value 2000.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Have Revised
Have Read
To Revise
Prepared
S No Learning Outcome
To Read
1.2.1: Serial and parallel data transmission
1 Show understanding of what is meant by transmission of data
2 Distinguish between serial and parallel data transmission
3 Distinguish between simplex, duplex and half-duplex data transmission
4 Reasons for choosing serial or parallel data transmission
5 Show understanding of the need to check for errors
6 Explain how parity bits are used for error detection
Show understanding of the use of serial and parallel data transmission, in
7
Universal Serial Bus (USB) and Integrated Circuit (IC)
1.2.3: Internet principles of operation
8 Show understanding of the role of the browser and Internet server
9 What is meant by hypertext transfer protocol (http and https) and HTML
10 Distinguish between HTML structure and presentation
Show understanding of the concepts of MAC address, Internet Protocol (IP)
11
address, Uniform Resource Locator (URL) and cookies
Chapter at a glance:
A network is defined as a collection of computers and peripheral devices (such as printers)
connected together.
Generally, a network over short distances is called a local area network (LAN) while those over
great distances are wide area networks (WAN).
Network adapters: These adapters (also called network interface cards or NICs) connect
computers to a network so that they can communicate.
Network hubs and switches: Hubs and switches connect two or more computers to an Ethernet
network.
Routers connect computers and networks to each other (for example, a router can connect your
home network to the Internet).
Modem: Hardware device that converts signals from analogue to digital and vice versa; typically
used to convert signals sent over the public service telephone network.
Bit is short of binary digit. It is the smallest unit of data in computer. It consists of a 0 or an 1.
Bit rate is the rate of transmitting data
A web browser is software which allows a user to display a web page on their computer screen.
Web browsers interpret or translate the HTML code from websites and show the result of the
translation.
Simplex data transmission is sending data in one direction only (i.e. from sender to receiver)
Example: data being sent from a computer to a printer.
Half-duplex data transmission is sending data in both directions but only one at a time (i.e. data
can be sent from ‘A’ to ‘B’ or from ‘B’ to ‘A’ along the same line, but not at the same time).
Example: a walkie-talkie, fax machine.
Simplex data transmission is sending data in one direction only (i.e. from sender to receiver).
Example: Radio, TV. Data being sent from a computer to a printer, from keyboard to CPU etc.
Half-duplex data transmission is sending data in both directions but only one at a time (i.e. data
can be sent from ‘A’ to ‘B’ or from ‘B’ to ‘A’ along the same line, but not at the same time).
Example: a walkie-talkie, fax machine, reading or burning data on CDs or DVDs, both but not at
the same time.
Full-duplex data transmission is sending data in both directions simultaneously (i.e. data can be
sent from ‘A’ to ‘B’ and from ‘B’ to ‘A’ along the same line, both at the same time).
Example: a phone line, reading and writing data on HDD.
The computer then compares its calculated check sum with the check sum received.
If the two don’t match, then the there is an error in data transmission
SEND DATA
Yes
Ye
Has Timer
timed out?
No
N
Acknowledgement
Received?
Yes
Y
Transmission Successful
STOP
Modulo-10 Method:
Modulo-10 method is used in check digit calculation in ISBN 13, where the 13th digit of theISBN
code is calculated using the following algorithm.
Steps Example
1. Find sum of digits at odd position
9 7 8 3 1 2 7 3 2 3 2 0 ?
The check digit is calculated and added to the barcode, product code at the point of
manufacture.
The computer then compares its calculated check digit with the check digit scanned.
If the two don’t match, then the there is an error in entering or scanning bar code
A value is calculated on the block of data A digit is calculated on the item code using
using an algorithm an algorithm at point of manufacturing
Receiver recalculates the check sum using At point of sale the check digit is
same algorithm recalculated using same algorithm
If both the checksum are not same, there will If both the check digits are not same three
be an error in data transmission. will be an error in scanning reading item
code.
https://en.wikipedia.org/wiki/Internet_service_provider
An Internet service provider (ISP) is an organization that provides services for accessing, using,
or participating in the Internet. Internet service providers may be organized in various forms, such
as commercial, community-owned, non-profit, or otherwise privately owned.
Internet services typically provided by ISPs include Internet access, Internet transit, domain
name registration, web hosting, Usenet service etc.
Web browser
https://www.techopedia.com/definition/288/web-browser
A web browser is a software program that allows a user to locate, access, and display web pages.
Browsers translate web pages and websites delivered using Hypertext Transfer Protocol (HTTP)
into human-readable content.
IP Addressing
An Internet Protocol (IP) address is a unique 32-bit reference number that is allocated to devices on
a computer network that uses the Internet Protocol.
Although IP addresses are stored as 32-bit numbers, for our convenience they are usually displayed
as a series of 4 decimal numbers, each one representing 8 bits of the original binary address.
32-bit binary version: 110010011010000001011011011111111
Decimal version: 201.64.182.255
Some IP addresses are reserved for private network ranges e.g.
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
Internet Server
Internet server (web server) is a special computer, on which websites are stored. Web Server is
constantly switched on and connected to the Internet so that each Internet user around the world
can access website at all times. This computer is built up with selected high quality components,
which can endure incessant work and high load.
HTTP
Short for Hyper Text Transfer Protocol, the underlying protocol used by the World Wide Web.
HTTP defines how messages are formatted and transmitted, and what actions Web servers and
browsers should take in response to various commands.
Uniform Resource Locator (URL):
URL stands for Uniform Resource Locator. It is the address of a web page. Each page has its own
unique web address (URL).
This is how a computer locates the web page that user is trying to find.
An example of a URL is: http://inqilabpatel.com/computer2210.html.
In this example
a. “http” enables browser to know what protocol is being used to access information in the
domain
b. “ruknuddin.com” is called the domain name.
DNS Server
3. DNS looks up IP address to browser
User
Web Server
6. Browser interprets html data and displays web pages
Statement Sequence No
The requested web page is displayed on the client computer
The user clicks on the hyperlink and the web page is requested from
the web server
The requested web page content is transmitted to the client computer
The client computer processes the html code using the web browser
software
The web server locates the requested web page
WEB DESIGN
HTML PRESENTATION is the style (formatting) of the website i.e. how the page will look. For
example background colour, font size etc. HTML presentation is format of webpage.
Note: Never use design for presentation as it may be consider as layout i.e. structure.
Practice Question) The html has structure and presentation. Tick (㾐) to show which of following
is structure and presentation:
Example Structure Presentation
The colour applied to a text heading on a web page
The font style applied to a paragraph of text on a web page
The placement of a paragraph of text on a web page
The size of an image is set to be displayed at on a page.
The placement of an image next to a paragraph text on a web page
Answer Key:
Example Structure Presentation
The colour applied to a text heading on a web page 㾐
The font style applied to a paragraph of text on a web page 㾐
The placement of a paragraph of text on a web page 㾐
The size of an image is set to be displayed at on a page. 㾐
The placement of an image next to a paragraph text on a web page 㾐
E6XPPHU3
7 Jolene uses HTML to create a website. She separates the HTML into structure and presentation.
(a) (i) Give one example of HTML structure.
..................................................................................................................................... [1]
(ii) Give two examples of HTML presentation.
1 ........................................................................................................................................
2 ........................................................................................................................................ [2]
(b) Explain why Jolene separates the HTML into structure and presentation.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
F6XPPHU3 6 Four 7-bit binary values are transmitted from one computer to another. A
parity bit is added to each binary value creating 8-bit binary values. All the binary values are
transmitted and received correctly.
(a) Identify whether each 8-bit binary value has been sent using odd or even parity by writing odd
or even in the type of parity column. [4]
8-bit binary value Type of parity
01111100
10010000
10011001
00101001
(b) The 8-bit binary value 10110001 is transmitted and received as 10110010. A parity check does
not identify any errors in the binary value received.
State why the parity check does not identify any errors.
...................................................................................................................................................
............................................................................................................................................. [1]
(c) The data is sent using serial duplex data transmission.
3 5WOOGT2
1 (a) State what is meant by the terms:
Parallel data transmission: ..................................................................................................
.............................................................................................................................................
Serial data transmission: ....................................................................................................
......................................................................................................................................... [2]
(b) Give one benefit of each type of data transmission.
Parallel data transmission Benefit: ........................................................................................
..............................................................................................................................................
Serial data transmission Benefit: ......................................................................................
......................................................................................................................................... [2]
(c) Give one application of each type of data transmission. Each application must be different.
3 5WOOGT2
5 Parity checks are often used to check for errors that may occur during data transmission.
(a) A system uses even parity.
Tick (㾐) to show whether the following three bytes have been transmitted correctly or incorrectly.
Received byte Byte transmitted correctly Byte transmitted incorrectly
11001000
01111100
01101001
Interrupt
Hardware identification number that uniquely identifies each
device on a network; it is manufactured into every network card
IP address and cannot be altered
12 Parity checks are used to check for errors during data transmission. A system uses odd parity.
(a) Complete the following two bytes of data so that they both have odd parity:
1 1 1 1 0 0 0
0 0 0 0 1 1 1
(b) Name and describe another method which can be used to check whether data has been
correctly transmitted.
Name of method: .................................................................................................................
Description: ........................................................................................................................
............................................................................................................................................
.......................................................................................................................................[2]
3 5WOOGT22
4 (a) Nikita wishes to print out some documents and connects her printer to the computer using one of the
USB ports.
(i) Identify what type of data transmission is being used.
.......................................................................................................................................[1]
(ii) Give three reasons for using a USB port.
1 .......................................................................................................................................
2 .......................................................................................................................................
3 ....................................................................................................................................... [3]
9 Check digits are used to ensure the accuracy of entered data.
A 7-digit number has an extra digit on the right, called the check digit.
3 9KPVGT2
3 (b) A computer in a factory is connected to a printer. The printer is located in an office 1km away
from the factory.
Identify which data transmission method would be most suitable for this connection.
...................................................................................................................................................
Give two reasons for your choice.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [3]
Draw a line to connect each computer term to its correct description. [5]
Computer term Description
Serial, simplex data Several bits of data sent down several
transmission wires, in both directions, but not at the
same time
Parity bit
1 1 1 1 1 0 0 1 Register Y
0 1 0 1 1 1 1 1 Register Z
3 5WOOGT2
4There are various methods used to detect errors that can occur during data transmission and
storage.
Describe each of the following error detection methods.
Parity check .......................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................
Check digit ......................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
..........................................................................................................
Checksum .....................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
......................................................................................................
Automatic Repeat request (ARQ) ................................................................................
............................................................................................................................................................
............................................................................................................................................................
....................................................................................................... [8]
8(a) Three descriptions and two methods of data transmission are given.
Tick (½) the correct box to show the Method of data transmission for each description. [3]
Description Method
Hyper Text Transfer Protocol The website address that is typed into the
(HTTP) address bar
3 5WOOGT2
1 (b) Explain what is meant by a MAC address. [4]
3 5WOOGT2
6 Priya creates a website to sell her old comic books and superhero figures.
(a) She uses HTML to create her website. The HTML she produces has both structure and
presentation.
Explain what is meant by HTML structure and presentation. Include an example of each. [4]
(c) Priya stores her website on a web server.
To transmit the website data to the web server she uses parallel duplex data transmission.
Describe how data is transmitted using parallel duplex data transmission.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................. [4]
3 9KPVGT2
7 (b) State three functions of a browser.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
................................................................................................................................................... [3]
(c) The website Gerald visits uses https. Explain what is meant by https.
...................................................................................................................................................... [3]
Q 26) Summer 20 P12
5 Meena uses a browser to research information for her business.
(a) Give three functions of a browser.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................ [3]
2 Gurdeep sets up a web server to host her website. She reads about an Internet Protocol (IP)
address, a Media Access Control (MAC) address and a Uniform Resource Locator (URL).
Draw a line to connect each term to the correct example. [2]
Term Example
IP address 192.168.0.255
URL 00:15:E9:2B:99:3C
Have Read
To Revise
Prepared
To Read
S No Learning Outcome
For example, The most obvious use is for simple control. Imagine designing a washing machine so
that the water only turns on when the washing is loaded (logic-1), the door is closed (logic-1) but the
clothes are not yet wet (logic-0). This can be done by ANDing the first two conditions, and inverting
the third. Now, AND these together, and you get a high only when all three conditions are satisfied.
Two or more logic gates can be connected to produce a logic circuit with one or more outputs from
two or more inputs.
Truth Tables:
“A truth table is used to show the output of a logic gate or circuit
for all possible combinations of input values.”
Usually the binary values are used, 1 and 0, as shorthand for
True and False.
The truth table for a two-input gate needs four rows (22=4) while
for 3-input gate needs eight rows (23=16).
The output (called X) is true (i.e. 1 or ON) only if the (INPUT A AND INPUT B) are both true (i.e. 1
or ON).
The x=1 if
INPUT A is 1 AND INPUT B is 1
Or X =A AND B
Or X = A . B (read as X equals to A AND B)
(iii) OR Gate
An OR gate gives an output 1 when EITHER input is 1.
If any input is 1 output will be 1.
Input A Input B Output x
0 0 0
0 1 1
1 0 1
1 1 1
The output (called X) is true (i.e. 1 or ON) if the (INPUT A OR INPUT B) are true (i.e. 1 or ON).
The OUTPUT X=1 IF
Either INPUT A is 1 OR INPUT B is 1
Or X= A OR B
Or X = A + B (read as X equals to A OR B)
NAND as AND:
NAND on NAND will become AND
NAND as OR:
NAND as NOR
NAND as XOR
For example
(a) Two NOT gates are used in the given logic circuit.
Identify three other logic gates that are used in the given logic circuit.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................ [3]
(b) Consider the completed truth table for the given logic circuit.
Row No A B C Working space X
1 0 0 0 0
2 0 0 1 1
3 0 1 0 0
4 0 1 1 0
5 1 0 0 1
6 1 0 1 1
7 1 1 0 0
8 1 1 1 1
There are four errors in the truth table in the output (X) column.
Identify the four incorrect outputs. Write the row number to identify each incorrect output.
Row .......................
Row .......................
Row .......................
Row ....................... [4]
(b) Consider the completed truth table for the given logic statement.
Row No A B C Working space X
1 0 0 0 1
2 0 0 1 1
3 0 1 0 1
4 0 1 1 0
5 1 0 0 1
6 1 0 1 0
7 1 1 0 1
8 1 1 1 1
There are four errors in the truth table in the output (X) column. Identify the four incorrect outputs.
Row .......................
Row .......................
Row .......................
Row ....................... [4]
D6XPPHU3
6 Consider the logic statement:
X = (((A AND B) OR (C AND NOT B)) XOR NOT C)
(a) Draw a logic circuit to represent the given logic statement.
Do not attempt to simplify the statement. All logic gates must have a maximum of two inputs. [6]
……………………………. ………………………………….
INPUT 1 INPUT 2 OUTPUT INPUT 1 INPUT 2 OUTPUT
0 0 0 0 0 o
0 1 0 0 1 1
1 0 0 1 0 1
1 1 1 1 1 0
……………………………………. ……………………………………
INPUT 1 INPUT 2 OUTPUT INPUT 2 OUTPUT
0 0 1 0 1
0 1 0 1 0
1 0 0
1 1 0
……………………………………. ……………………………………
(b) Complete the truth table for the logic expression: X = NOT A AND (B NAND C) [4]
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
(b) Complete the truth table for the logic expression: X = (A XOR B) AND NOT C [4]
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
From 2020, logic statements in the Paper 1 examination might not include the output andinput
values, such as 1 and 0. Therefore candidates must know how to interpret logic statements both
with and without input and output values being written in the logic statement.
For example, the logic statement:
X = 1 if ((A is 1 OR B is 1) AND (A is 1 AND B is 1)) OR (C is NOT 1)
Can also be written as:
X = ((A OR B) AND (A AND B)) OR (NOT C)
It is possible to build up any logic gate, using NAND or NOR gates only.
NAND and NOR Gates can be used to build any other gates, and called ‘logic building block’. It is
cost effective for manufacturer to use a single gate to build any logic circuit.
For example, the AND, OR and NOT gates can be built from these gates as shown below:
NAND as NOT:
If single input is given to NAND or NOT gate output will inverted
NAND as AND:
NAND on NAND will become AND
NAND as OR:
NAND as NOR
NAND as XOR
A B Working X
0 0
0 1
1 0
1 1
A B Working X
0 0
0 1
1 0
1 1
Q 3.3)Show by drawing a truth table which single logic gate or what else has the same function as
the logic circuit drawn in
a)
INPUT Workspace OUTPUT
A B X
0 0
0 1
1 0
1 1
b)
d)
INPUT Workspace OUTPUT
A B C
0 0
0 1
1 0
1 1
e) Explain why a single logic gate is often replaced by a logic circuit such as shown in part a, b, c
and d.
............................................................................................................................................................
............................................................................................................................................................
....................................................................................................................................................[1]
A B Working space X Y
0 0
0 1
1 0
1 1
3 5WOOGT2
3 (a) Complete the truth table for the following logic circuit:
A B C Workspace X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
(b) Draw a logic circuit which corresponds to the following logic statement:
X = 1 if ((A is NOT 1 OR B is 1) AND C is 1) OR (B is NOT 1 AND C is 1)
.........................................................................................................................
............................................................................................................................................................
................................................................................[3]
(b) Complete the truth table for the safety system. [4]
G C L Workspace X
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
(b) Complete the truth table for the monitoring system. [4]
D S T Working Space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
(c) Re-draw the following logic circuit using NAND gates only.
X = ............................................................................................................................. [3]
3 9KPVGT2
3 9KPVGT2
5 (a) Draw a logic circuit for the logic statement:
X = 1 if ((A is 1 AND B is 1) OR (A is NOT 1 AND C is 1)) [4]
Explanation ........................................................................................................................
............................................................................................................................................
............................................................................................................................................
..................................................................................................................................... [5]
3 9KPVGT2
3 A greenhouse uses a system to monitor the conditions that plants need to grow.
The inputs to the system are:
Input Binary value Condition
1 Window is open
W
0 Window is closed
1 Temperature >=26°C
T
0 Temperature <26°C
1 Humidity >=50%
H
0 Humidity <50%
The system will sound an alarm when certain conditions are detected.
Alarm (X) will sound (=1) when:
window is closed and temperature >=26°C
or
temperature <26°C and humidity >=50%
Draw a logic circuit to represent the system. [5]
(b) Complete the truth table for the given logic statement. [4]
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
3 5WOOGT2
2 Rajesh creates a logic circuit.
He uses three different logic gates in his circuit. Each logic gate has a maximum of two inputs.
He describes the logic of each gate.
(a) “The only time the output will be 1 is when both inputs are 1.”
State the single logic gate ...................................................
Draw the single logic gate: [2]
(b) “The only time the output will be 1 is when both inputs are 0.”
State the single logic gate ...................................................
Draw the single logic gate: [2]
(c) “The only time the output will be 0 is when both inputs are 1.”
State the single logic gate ...................................................
Draw the single logic gate: [2]
3 5WOOGT2
(b) Complete the truth table for the given logic statement: [4]
X = (((A OR C) AND (NOT A AND NOT C)) XOR B)
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
Have Revised
Have Read
To Revise
Learning Outcome
Prepared
To Read
The control unit guides the computer's components through this cycle to execute one instruction.
When that instruction is done, the cycle starts all over again with the next instruction.
Registers/circuits involved
The circuits used in the CPU during the cycle are:
x Program Counter (PC) - an incrementing counter that keeps track of the next memory
address of the instruction that is to be executed once the execution of the current
instruction is completed.
x Memory Address Register (MAR) - the address in main memory that is currently being
read or written
x Memory Buffer Register (MBR) - a two-way register that holds data fetched from memory
(and ready for the CPU to process) or data waiting to be stored in memory
x Current Instruction register (CIR) - a temporary holding ground for the instruction that has
just been fetched from memory
x Accumulator Register (ACC)is used for storing data for ALU to process and the results
those are produced by the ALU.
Q 4) Test Yourself The table shows six stages in the von Neumann fetch-execute cycle. [6]
Description of stage Sequence No
the instruction is copied from the Memory Data Register (MDR) and placed
in the Current Instruction Register (CIR)
the instruction is executed
the instruction is decoded
the address contained in the Program Counter (PC) is copied to the Memory
Address Register (MAR)
the value in the Program Counter (PC) is incremented so that it points to the
next instruction to be fetched
the instruction is copied from the memory location contained in the Memory
Address Register (MAR) and is placed in the Memory Data Register (MDR)
To describe the cycle we can use register notation. This is a very simple way of noting all the
steps involved. In all cases brackets e.g. [PC], means that the contents of the thing inside the
brackets are loaded. In the case of the first line, the contents of the program counter are loaded
into the Memory Address Register.
MAR Å [PC]
MBR Å [Memory] ; PCÅ [PC] +1 (Increment the PC for next cycle at the same time)
CIR Å [MBR]
CIR sends instruction to Decoder of control unit
Decoder decodes
Or ACCÅ [MBR]
ACC sends data to ALU
ALU executes
Q 5a) Complete the following diagrams showing each step of the fetch decode execute cycle:
4 F6XPPHU3
10 Several components are involved in processing an instruction in a Von Neumann model for a
computer system.
Three of these components are the arithmetic logic unit (ALU), control unit (CU) and random
access memory (RAM).
(a) Six statements are given about the components.
Tick ( )ضto show if each statement applies to the ALU, CU or the RAM. Some statements may
apply to more than one component. [6]
ALU CU RAM
Statement
()ض ()ض ()ض
stores data and instructions before they enter the
central processing unit (CPU)
contains a register called the accumulator
manages the transmission of data and instructions to
the correct components
contained within the CPU
uses the data bus to send data into or out of the CPU
carries out calculations on data
(b) The accumulator is a register that is part of the Von Neumann model.
Give two other registers that are part of the Von Neumann model.
1 ................................................................................................................................................
2 ................................................................................................................................................ [2]
3 9KPVGT2 Paige has a computer that has a central processing unit (CPU) based
Data bus
This uni-directional bus carries signals
relating to memory addresses between
processor and memory
(b) The seven stages in a von Neumann fetch-execute cycle are shown in the table below. Put
each stage in the correct sequence by writing the numbers 1 to 7 in the right hand column. The
first one has been done for you.
Stage Sequence
number
the instruction is then copied from the memory location contained in the MAR
(memory address register) and is placed in the MDR (memory data register)
the instruction is finally decoded and is then executed
the PC (program counter) contains the address of the next instruction to be 1
fetched
the entire instruction is then copied from the MDR (memory data register) and
placed in the CIR (current instruction register)
the address contained in the PC (program counter) is copied to the MAR
(memory address register) via the address bus
the address part of the instruction, if any, is placed in the MAR (memory
address register)
the value in the PC (program counter) is then incremented so that it points to
the next instruction to be fetched
3 9KPVGT2
3 A section of computer memory is shown below:
Address Content
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100
`
1000 1100
1000 1101
1000 1110
1000 1111
(a) (i) The contents of memory location 1000 0001 are to be read.
Show the contents of the Memory Address Register (MAR) and the Memory Data Register (MDR)
during this read operation: [2]
MAR
MDR
(ii) The value 0111 1001 is to be written into memory location 1000 1110.
Show the contents of the MAR and MDR during this write operation: [2]
MAR
MDR
Address Content
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100
`
1000 1100
1000 1101
1000 1110
1000 1111
3 9KPVGT2
1 To process an instruction, a central processing unit (CPU) goes through a cycle that has three
main stages.
Name each stage in this cycle.
Stage 1 ................................................................................
Stage 2 ................................................................................
Stage 3 ................................................................................ [3]
3 5WOOGT2
1 Name three different buses that are used in the fetch-execute cycle.
Bus 1 .................................................................................................................................
Bus 2 .................................................................................................................................
Bus 3 ........................................................................................................................... [3]
Examiner Comment on Q 1
Many candidates provided three correct busses. The most common incorrect answer was candidatesproviding fetch, decode and execute, which
demonstrated a misunderstanding of the question.
10 The table shows a segment of primary memory from a Von Neumann model computer.
Address Contents
10001 11001101
10010 11110001
10011 10101111
10100 10000110
10101 00011001
10110 10101100
The program counter contains the data 10010.
(a) (i) State the data that will be placed in the memory address register (MAR).
.......................................................................................................................................[1]
(ii) State the data that will be placed in the memory data register (MDR).
.......................................................................................................................................[1]
(b) Describe the stored program concept when applied to the Von Neumann model.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
......................................................................[4]
3 9KPVGT2
11 The fetch-execute cycle make use of registers.
(a) Describe the role of the Program Counter (PC).
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
..................................................................................................................................................... [2]
(b) Describe the role of the Memory Data Register (MDR).
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
..................................................................................................................................................... [2]
3 5WOOGT2
3 9KPVGT2
7 The Von Neumann model for a computer system has several components that are used in the
fetch-execute cycle. (a) One component is main memory.
(i) Describe what is meant by main memory and how it is used in the Von Neumann model for a
computer system.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
.................................................................................................................................................... [3]
3 9KPVGT2 2 The Von Neumann model for a computer system uses several
components in the fetch-execute cycle. One component that is used is the Control Unit (CU).
Identify four other components that are used in the Von Neumann model for a computer system.
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
4 .................................................................................................................................................... [4]
3 5WOOGT2
1 (b) (ii) Identify the component of the CPU that is responsible for decoding instructions.
..................................................................................................................................... [1]
3 C5WOOGT25 Six components of a computer are given.
Some are part of the central processing unit (CPU) of the Von Neumann model for a computer system.
Tick ( )ضto show if each component is a CPU component or is Not a CPU component. [6]
Have Read
To Revise
Prepared
To Read
Learning Outcome
Have
1.3.3: Input devices
Describe the principles of operation (how each device works) of these input
devices: 2D and 3D scanners, barcode readers, Quick Response (QR) code readers,
digital cameras, keyboards, mice, touch screens, interactive whiteboard,
microphones
Describe how these principles are applied to real-life scenarios, for example:
scanning of passports at airports, barcode readers at supermarket checkouts, and
touch screens on mobile devices
Describe how a range of sensors can be used to input data into a computer
system, including light, temperature, magnetic field, gas, pressure, moisture,
humidity, ph and motion
Describe how these sensors are used in real-life scenarios, for example: street
lights, security devices, pollution control, games, and household and industrial
applications
1.3.4: Output devices
Describe the principles of operation of a range of output devices, including: inkjet,
laser and 3D printers; 2D and 3D cutters; speakers and headphones; actuators;
flat-panel display screens, including Liquid Crystal Display (LCD) and Light-Emitting
Diodes (LED); and LCD projectors and Digital Light Projectors (DLP)
Describe how these principles are applied to real-life scenarios, for example:
printing single items on demand or in large volumes; use of small screens on
mobile devices
1 Cover is raised
2 Document is placed in on glass panel and cover is closed
3 A bright light illuminates the documents lamp like xenon which produce very bright white light
4 A scan head moves across the document. An image is produced.
5 The image is sent to a lens using series of mirrors. The lens focuses the document image.
6 The focused image fall onto a charge couple device (CCD) which consists of number of ICs
7 CCD is made up of light-sensitive elements (pixels). Each element of CCD creates an
electric charge when light falls on it and the scanned image is converted into digital form.
8 Software produces digital image from electronic form
How 3D Scanner works:
Scanners shines a laser (or light) over the surface of a 3D object
– Records measurements of the geometry/dimensions of the object
– Measurements are converted to digital file
– Produces a 3D digital
Bar Code Reader/Scanner
How it works
Stage Description
1 The barcode is first read by a red laser or red LED (LIGHT EMITTING DIODE).
2 Light is reflected back off the barcode; the dark areas reflect little or no light which
allows the bars to be read.
3 The reflected light is read by sensors (photoelectric cells).
4 As the laser or LED light is scanned across the barcode, a pattern is generated
which is converted into digital data – this allows the computer to understand the
barcode.
5 For example: the digit ‘3’ on the left generates the pattern L D DDD L D (where L =
light and D = dark); this has the binary equivalent of 0 1 1 1 1 0 1 (where L =0 and
D = 1
6 If barcode are not scanned correctly the bar code number is types in manually
using keyboard
Mouse:
A computer mouse is a handheld hardware input device that
controls a cursor in a GUI and can move and
select text, icons, files, and folders.
The more traditional type with a mechanical ball arrangement;
connected to the computer through a USB port while the more
modern type (optical mouse) that use red LEDs to detect movement in the x-y direction.
How optical mouse works:
S No Step
1 laser/light shines onto a surface through a (polished) ring at the base
2 the light is reflected from the surface through the ring
3 sensor detects reflected light
4 capturing details/photograph of surface (under the ring) at about 1500 times per second
5 as the mouse moves the sensor detects changes in the surface detail/photograph
6 These changes are translated into movement (change of x and y co-ordinates)
7 the computer/software updates the position of the cursor on the screen
Digital camera
A digital camera is an input device that captures images (and sometimes video)
digitally. Digital cameras use an image sensor chip to capture the image, rather than the film
used by a traditional camera.
Benefits over traditional camera
x Digital cameras produce photographs for transfer to a computer directly or to print out by
connecting directly to a printer.
x Many digital cameras also allow short video clips to be produced.
x Photographs can be uploaded directly into applications software such as word processors,
desktop publishers, etc.
x Modern digital cameras simply link to a computer system via a USB port or by using Bluetooth
(which enables wireless transfer of photographic files).
How digital camera works
Digital camera uses microprocessor, lenses, pixels and storage. The photograph is captured when
light passes through the lens onto a light sensitive cell. This cell is made up of tiny elements
known as pixels. The number of pixels determines the size of the file used to store the photograph
(e.g. a 14- megapixel camera will need 42 megabytes to store each raw photograph).
Firstly, a filter removes non-audible sound waves. Humans can hear sounds in a frequency
range from about 20 Hz to 20 kHz.
Then sound waves are sampled at a given time rate (Sound waves are broken down
thousands of smaller parts (samples) per second.)
The height/amplitude of each sound wave is determined.
Approximation is used when necessary.
At last sound wave values are stored in binary digits, depending upon number of bits per sample.
Voice Recognition Speech Recognition
In voice recognition system, the user’s voice In Speech Recognition the spoken words are
is detected and then converted into digital. recognised and shown on a screen, input into a
word processor or used in other application.
A few words spoken produce a digital wave Speech recognition is language dependent
pattern. Software compares this wave
pattern to wave patterns stored in memory
to see if they match. If they match, then the
person has been correctly identified.
This technology can be used in security It is used to give commands by speaking to
systems. computer or in speech-to-text software
Hardware The screen of resistive In a capacitive system, a Infrared touch screens are
system includes a glass transparent material that based on light-beam
panel covered with a thin stares an electrical charge interruption technology.
metallic layer made of a covers the screen's glass Instead of an overlay on the
substance that conducts panel. surface, a frame surrounds
electricity. Spacers on the the display. The frame has
layer support a metallic layer light sources, or light emitting
that resists the flow of diodes (LEDs) on one side
electricity. and light detectors on the
opposite side, creating an
optical grid across the
screen.
How it When you touch the screen ¾ The screen has ¾ Infrared rays are sent
works with your finger or a stylus, conductive layer across screen (from the
the two layers make contact, ¾ An electrostatic/electric edges) and captured by
changing the electrical field field is created on the sensors at the opposite side
produced by the layers. This screen ¾ Infrared rays form a grid
permits the computer to ¾ Sensor(s) (around the across the screen
calculate the coordinates of screen) monitor the ¾ Infrared ray is broken when
the contact. electrostatic field someone touches screen by
¾ When touched a finger blocking a beam
(electrostatic) charge is ¾ This signal is converted into
transferred to finger digital by ADC
¾ Location of touch is ¾ The digital signal is sent
calculated // Co- to processor which
ordinates used to calculate (on where beam
calculate touch is broken) to locate the
‘touch’
For example in a furnace, a sensor is used to measure temperature in the furnace and it sends
readings in analogue form (small electric currents/voltages). This data is converted into digital by
an ADC and is fed to a computer, which compares the input temperature with the required
temperature stored on a file. If any action is needed (furnace temperature is too low or too high)
then a digital signal is sent out from the computer. This signal is converted into an electric
current/voltage (i.e. analogue) so that the valve can be regulated (i.e. opened or closed to control
the gas supply and hence the furnace temperature).
Feedback System
Control systems can be open loop or closed loop.
Open loop Feedback systems will just consider the input and then keep repeating the same task
given the input, e.g. a microwave heats for a given time period without actually checking the
temperature of the food.
Closed loop Feedback systems on the other hand will also take into account other factors,
including the output itself. A furnace is a closed-loop feedback system.
Above furnace system is a closed-loop feedback system. In this system temperature sensor
measures temperature in the furnace and it sends readings to processor, which compares the
input temperature with the required temperature stored on a file. If any action is needed (furnace
temperature is too low or too high) then a digital signal is sent out from the processor. Actuator
regulates the valves (i.e. opened or closed to control the gas supply and hence the furnace
temperature). Then sensor again measures the temperature which is actually itself the output of
the system. On the basis of new readings processor decides new actions. Means new actions
depends upon the results of previous actions.
A burglar alarm monitoring system will carry out the following actions:
• The system is activated by keying in a password on a keypad.
• The infra-red sensor picks up the movement of an intruder in the building.
• The acoustic sensor picks up sounds such as footsteps or breaking glass.
• The pressure sensor picks up the weight of an intruder coming through a door or through a
window.
• The sensor data is passed through an ADC if it is in an analogue form to produce digital data.
• The computer/microprocessor will sample the digital data coming from these sensors at a
given frequency (e.g. every five seconds); the data is compared with the stored values by the
computer/microprocessor.
• If any of the incoming data values are outside the acceptable range, then the computer
sends a signal to:
• a siren to sound the alarm, or
• a light to start flashing.
• A DAC is used if the devices need analogue values to operate them.
• The alarm continues to sound/lights continue to flash until the system is reset with a password.
Monitoring of patients in a hospital
• A number of sensors are attached to the patient; these measure vital signs such as:
temperature, heart rate, breathing rate, etc.
• These sensors are all attached to a computer system.
• The sensors constantly send data back to the computer system.
• The computer samples the data at frequent intervals.
• The range of acceptable values for each parameter is keyed in to the computer.
• The computer compares the values from the sensors with those values keyed in.
• If anything is out of the acceptable range, a signal is sent by the computer to sound an alarm.
• If data from the sensors is within range, the values are shown in either graphical form on a
screen and/or a digital read out.
• Monitoring continues until the sensors are disconnected from the patient.
Item Instruction
number
1 Count down in minutes
2 Is light reading <= 50?
3 Is street lamp already on?
4 Is time = 0?
5 The microprocessor compares the
sensor reading with stored values
6 The sensor reading is sent to the
microprocessor
7 Switch the street lamp off
8 Switch street lamp on
9 Time set to 10 minutes
F6XPPHU3
9 An underground car park has a system that checks the height of vehicles. A vehicle can be no
higher than 1.8 metres to enter the car park.
The system also counts the number of vehicles that have entered the car park, so that it can
display how many parking spaces are still available.
Each parking space has a red and a green light above it. If a car is parked in the parking space
only the red light is on, otherwise only the green light is on.
Sensors and a microprocessor are used to control the system.
(a) Complete the table to identify a suitable sensor for each part of the system. [3]
Task Sensor
check if a vehicle is too high
count the vehicles entering the car park
check if a vehicle is parked in a parking space
(b) Describe how the sensor and the microprocessor are used to display the red or green light
above the parking space.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
S# Step
1 Printer driver translates data into a suitable format for the printer
2 Printer receives data from the computer and stores the data in the printer's buffer
3 Paper feed stepper motor activated; sheet of paper fed from paper tray
4 The print head moves across page; ink is sprayed each time the print head pauses
for a fraction of a second
5 The ink droplets are produced currently using two different technologies.
• Thermal bubble: tiny resistors create localised heat which makes the ink
vaporise. This causes the ink to form a tiny bubble; as the bubble expands, some
of the ink is ejected from the print head onto the paper. When the bubble
collapses, a small vacuum is created which allows fresh ink to be drawn into the
print head. This continues until the printing cycle is completed.
• Piezoelectric: a crystal is located at the back of the ink reservoir for each nozzle.
The crystal is given a tiny electric charge which makes it vibrate. This vibration
forces ink to be ejected onto the paper; at the same time more ink is drawn in for
further printing.
6 Paper feed stepper motor advances paper a fraction of a cm after each complete
head pass
Why inkjet printers are helping to reduce the cost of manufacturing OLED
screens?
Current OLED manufacturing methods rely on evaporation processes, in which the
organic materials are deposited onto a glass sheet through a thin metal stencil. But
in this method a significant amount of the material is wasted because it disperses all
over the mask.
Inkjet OLED printing has the desirable ability to allow precision deposits without the
use of a mask. This could be done, for example, by placing OLED pixels on glass or
plastic using a portable platform and nozzles in regular atmospheric conditions. Such
methods have the potential to increase yields and lower prices.
Laser Printer
Laser printers produce very high-quality hard copy output. The print rate per page is very quick if
a large number of pages are being printed. They rely on large buffer memories, where the data for
the whole document is stored before the pages can be printed out.
How it works
S
Step
No
1 The printer driver ensures that the data is in a format that the laser printer can understand
2 Data is then sent to the laser printer and stored temporarily in the printer buffer
3 The printing drum is given a positive charge
4 As the printing drum rotates, a laser scans across it; this removes the positive charge in
certain areas
5 Negatively-charged areas are then produced on the printing drum; these match exactly with
the text and images to be printed
6 The printing drum is coated in positively-charged toner; this then sticks to the negatively-
charged parts of the printing drum
7 A negatively-charged sheet of paper is then rolled over the printing drum
8 The toner on the printing drum is now transferred to the paper to reproduce the required text
and images
9 The paper goes through a fuser which melts the toner so it fixes permanently to the paper
Type of printer
Laser Inkjet
Impact printer
Non-impact printer
Line printer
Page printer
3D Printer
3D printing is any of various processes in which material is joined or solidified under computer
control to create a three-dimensional object, with material being added together. 3D printing is
used in both rapid prototyping and additive manufacturing.
Various types of 3D printers exist; they range from the size of a microwave oven up to the size of a
small car.
3D printers use ADDITIVE manufacturing (i.e. the object is built up layer by layer);
Direct 3D printing uses inkjet technology; a print head can move left to right as in a normal
printer. However, the print head can also move up and down to build up the layers of an object.
two passes for each of the layers; the first pass sprays dry powder and then on the second pass a
binder (a type of glue) is sprayed to form a solid layer.
Newer technologies are using lasers and UV light to harden liquid polymers; this further increases
the diversity of products which can be made.
Uses
x 3D printers are used to produce prototypes which actually work from CAD packages,
photograph images, stored drawings, etc.
x Scale models are produced in colour before the real thing is manufactured.
x The ultimate objective is to produce organic objects (such as replacement human organs)
using this layering technology.
Advantages
x 3D printers save a lot of money, since making prototypes by other methods is very time
consuming and expensive.
x Physical scale models are produced with working parts, which gives a better idea of how the
end product will look.
x The powders used can often be ground up and re-used.
Disadvantages
x 3D printers are expensive to buy.
x They are slow at producing their output.
x The end product can sometimes be a little rough and often needs further work to be done on it.
DAC Amplifier
Digital Analog
Data Data
The rate at which the DAC can translate the digital output into analogue voltages is known as the
Application: Speakers are used to output sound from multimedia presentations.
They are used in home entertainment centres.
They can help blind people (together with speech generation software) through audio output of
text on the screen.
They are used to play downloaded sound files.
F6XPPHU3
3 An optical mouse is a type of input device that can be used to input data into a computer system.
(a) Complete the paragraph about the operation of an optical mouse, using the most appropriate
terms from the given list. Not all terms need to be used.
• Ball • Battery • LCD • LED • Lens • Magnifies
• Matrix • Microswitch • Photoelectric • Photographic • Reduces • USB
An optical mouse shines an ............................................ from the bottom of the mouse onto a
surface. Light bounces straight back from the surface into a ............................................ cell. This
has a ............................................ that ............................................ the reflected light to allow
detection of smaller movements. When a button on the mouse is clicked,
a ............................................ is pressed. A ............................................ connection is used to
carry the data to the computer. [6]
(b) Identify two other input devices that can be used to enter data into a computer.
1 ................................................................................................................................................
2 ................................................................................................................................................ [2]
3 5WOOGT2
2 The majority of mobile phones use touch screens. Three common technologies are used by different
mobile phone manufacturers. Choose one of the following mobile phone technologies:
• resistive • capacitive • infrared
Chosen technology ..........................................................................................................................
(i) Describe how your chosen technology works to allow a user to make selections by touching the screen.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
3 9KPVGT2
1 (a) Name an application which makes use of the following sensors. A different application should
be used in each case.
Temperature .....................................................................................................................
............................................................................................................................................
Magnetic field ..................................................................................................................
..........................................................................................................................................
Motion ..............................................................................................................................
....................................................................................................................................... [3]
Item Instruction
number
1 Count down in minutes
2 Is light reading <= 50?
3 Is street lamp already on?
4 Is time = 0?
5 The microprocessor compares the
sensor reading with stored values
6 The sensor reading is sent to the
microprocessor
7 Switch the street lamp off
8 Switch street lamp on
9 Time set to 10 minutes
3 9KPVGT2
5 (a) Inkjet printers and laser printers are two common types of printer.
Describe the features and principles of operation of each type of printer.
(i) Inkjet printer ..................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
...................................................................................................................................................... [4]
3 5WOOGT22
3 (a) Five sensors and five applications are shown below.
Draw a line to link each sensor to its most appropriate application. [4]
(a) Nikita wishes to print out some documents and connects her printer to the computer using one of the
USB ports.
Application
Sensor
.......................................................................................................................................[1]
(c) An airport uses the type of barcode shown in part (a) to advertise local places of interest.
Describe how a visitor landing at the airport could use these barcodes to help plan their visit.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
.....................................................................................................................................................[3]
9 A supermarket has a system that allows customers to check out their own shopping.
Identify and describe the purpose of two input devices and one output device used in this system.
Input device 1 .....................................................................................................................
Purpose .............................................................................................................................
............................................................................................................................................................
.............................................................................................................................
Input device 2 ....................................................................................................................
Purpose ............................................................................................................................
............................................................................................................................................................
.........................................................................................................................
Output device 1 ..................................................................................................................
Purpose ...........................................................................................................................
............................................................................................................................................................
....................................................................................................................... [6]
3 9KPVGT2
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [4]
7 Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode (LED) backlit
technology. Give four benefits of using LED technology.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
...................................................................................................................................................... [4]
10 Describe the differences between a barcode and a Quick Response (QR) code.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................[3]
Output
Description
Device
Laser printer High powered laser that uses the x-y plane.
Examiner Comment on Q 3
Most candidates correctly match the five terms to the correct descriptions.
6 Airline boarding passes can be read from a smart phone instead of a printout.
Identify what type of barcode A is an example of. Explain how the data stored in this type of
barcode is read.
........................................................................................................... ...........
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
....................................................................................................................................................... [4]
Tick (㾐) to show if the statement applies to Resistive or Capacitive technology. [6]
Resistive Capacitive
Statement
(㾐) (㾐)
This touch screen has multi-touch capabilities
This touch screen cannot be used whilst wearing gloves
This touch screen is made up of two layers with a small space in
between
This touch screen uses the electrical properties of the human
body
This touch screen is normally cheaper to manufacture
This touch screen has a quicker response time
Q 26) Summer 20 P12
6 Six statements are given about touch screen technology.
Tick ( )ضto show if the statement applies to Capacitive or Resistive touch screen technology. [6]
Capacitiv
Resistive
Statement e
()ض
()ض
Needs pressure to be applied to create a circuit
May not register a touch if the user is wearing gloves
More commonly used in smartphones
More responsive to a touch
Needs an electrical field to be changed to register a touch
Cheaper to manufacture
8 Leonard has a new laser printer to print letters for his business.
Leonard connects his printer to his computer using the USB port.
(a) Give three benefits of using the USB port to connect the printer to the computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
.......................................................................................
Actuator .......................................................................................
.......................................................................................
........................................................................................
Uses thousands of tiny mirrors that can move very
.......................................
quickly to create an image
........................................................................................
Mouse ........................................................................................
........................................................................................
.........................................................................................
3 9KPVGT2
3 5WOOGT22
3 9KPVGT2
Summer 21 P12
8 A keyboard is a type of input device that can be used to enter data into a computer.
Complete the paragraph that describes one method of operation for a keyboard, using the most
appropriate terms from the given list. Not all terms in the list need to be used.
• Binary • Breaks • Calculated • Character • Circuit • Current
• Information • Network • Press • Processor • Signal • Switch
A keyboard has a key matrix underneath the keys. When a key is pressed, it presses
a ............................................. that completes a ............................................. . This
allows ............................................. to flow. The location of the key pressed
is ............................................. . The location of the key pressed is compared to
a ............................................. map to find the ............................................. value for the key that
has been pressed. [6]
Primary memory
Data stored in primary memory can be accessed quickly and directly by the computer’s processor.
Primary storage is a computer’s internal storage. It is in this storage where data is held ready for
processing.
Primary memory is also known as ‘primary storage’ or ‘memory’.
Its capacity of primary memory is quite small.
Primary storage is separated into Random Access Memory (RAM) and Read Only Memory (ROM).
Primary memory consists of:
• Non-volatile, read-only memory (ROM) to hold a small program to start up computer, BIOS,
firmware, permanent
• volatile, read-write, random access memory (RAM) to hold the programs and data currently
being processed, user memory, temporary
Differences between RAM and ROM
RAM ROM
Applications x Part of Operating system x A program used to start the
What they contain? x Currently in use data computer called the ‘Start-up
programs. routine’ or BIOS.
x Factory setting such as remote
control frequencies
x stores the set of routines; for
example, how the buttons
embedded system work
Can the contents be Yes. No.
changed? (Is it The contents of the RAM are The contents of ROM cannot normally
volatile?) changed all the time while the be changed.
computer is running.
It is temporary. It is permanent.
Who can store data User Manufacturer
Volatile or Non- It is volatile, i.e. it needs It is non-volatile i.e. it can retain data
volatile continuous power supply to even when there is no power supply.
retain data.
Secondary Storage
The main storage of computer where all data and programs are saved in the secondary storage.
Secondary storage devices are non-volatile. They can retain data even when computer is switched
off. Their storage capacity is much larger than primary memory RAM while access speed is slower.
Secondary storage includes:
• Hard disks drive (HDD)
• Solid-state drive (SSD)
Internal Operation of Hard Disk Drive
S No Step
The hard disk has one or more platters made of aluminium or glass
Each surface of the platter/disk is ferrous-oxide which is capable of being magnetised
The disks are rotated at high-speed
Each surface of the disk has a read/write head mounted on an arm positioned just
above the surface
Electronic circuits control the movement of the arm and hence the heads
The surface of the platter/disk is divided into concentric tracks and sectors
One track in one sector is the basic unit of storage called a block
The data is encoded as a magnetic pattern for each block
SSD Endurance
Most solid state storage devices are conservatively rated at only 20 GB write operations per day
over a three-year period – this is known as SSD endurance. For this reason,
SSD technology is not used in servers, for example, where a huge number of write operations take
place every day. However, this issue is being addressed by a number of manufacturers to improve
the durability of these solid-state systems.
Example Question 1: A company advertises its backup memory device as having 500 GB of
storage. A customer wishes to know how many 8 MB files could be stored on the device. The
company claimed that up to 62 500 files (assuming each file is 8 MB) could be stored. The
customer calculated that 64 000 files could be stored.
Explain the difference between these two storage values. Show any calculations you use in your
explanation. ........................................................................................................................................
............................................................................................................................................................
.....
Marking Scheme
–company calculation is based on 1 GByte = 1000 Mbyte – so (500 × 1000)/8 = 62 500 files
– customer calculation based on 1 GByte = 1024 Mbyte – so (500 × 1024)/8 = 64000 files
– giving the difference of 1500 files [3]
3 9KPVGT2
2 Storage devices and storage media can be categorised as primary, secondary or off-line.
Write primary, secondary or off-line next to each storage device or medium to indicate its most
suitable category.
HDD .........................................................................................................................
RAM .........................................................................................................................
ROM .........................................................................................................................
CD-ROM .........................................................................................................................
SSD .........................................................................................................................
DVD-RAM ...................................................................................................................... [6]
8 (a) A computer has 2048MB of RAM. How many GB of RAM does the computer have?
Show your working.
...............................................................................................................................................
............................................................................................................................................................
.....................................................................................................................................GB [2]
(b) Describe one item that is stored in RAM.
............................................................................................................................................................
............................................................................................................................................................
....................................................................................................................... [2]
(c) Explain three ways that RAM is different to ROM.
1 ...........................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
3 9KPVGT2
2 Data files are stored in different file formats.
Complete the table by providing a suitable file format for each file type. The first one has been
done for you. [3]
File type File format
Pictures .JPEG
Text
Sound
Video
9 (a) Optical storage media can be used to store data.
Describe how the data is read from a Compact Disc (CD).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.................................................................................................................................... [4]
(b) Kamil wants to store a 16-bit colour image file. The image size is 1000 pixels.
Calculate the size of the file. Give your answer in bytes. Show your working.
Working ...........................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
Answer ............................... bytes [2]
(c) Describe the differences between primary and secondary storage.
.........................................................................................................................................
.........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
....................................................................................................................................... [4]
3 9KPVGT2
2 A computer uses RAM and ROM to store data.
(a) The table contains three statements about RAM or ROM.
Tick ( )ݱto show whether each statement describes RAM or ROM. [3]
3 9KPVGT2
9 Describe two differences between Read Only Memory (ROM) and Random Access Memory
(RAM).
Difference 1 ......................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
3 /CTEJ2
1 (a) Elle has a file stored on her computer that is 20 MB in size. Jordan has a file that is 10GB in
size. Tick (99) to show which is the larger file. [1]
File size Tick (9)
20MB
10GB
(b) Bob has a file stored on his computer that is 3500kB in size. Gerty has a file that is 3MB in
size. Tick (9) to show which is the larger file. [1]
File size Tick (9)
3500kB
3MB
6 (c) Nadia uses several types of computer storage for her homework and other projects.
(i) Five examples of computer storage are given.
Tick (3) to show if the computer storage is Primary, Secondary or Off-line. [5]
(iii) Give two advantages of using a magnetic storage device rather than a solid state storage
device.
Advantage 1 ......................................................................................................................................
.........................................................................................................................................................
Advantage 2 .......................................................................................................................................
..................................................................................................................................................... [2]
3 5WOOGT2
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure.
Explain how lossless compression would compress this file.
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
............................................................................................................................................................
.................................................................................................................................................... [5]
11 Robert has a mobile device that uses RAM, ROM and an SSD.
(a) State what the RAM, ROM and SSD are used for.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
SSD ..........................................................................................................................................
................................................................................................................................................... [3]
(b) Give two reasons why an SSD, rather than a HDD, is used in the mobile device.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
................................................................................................................................................... [2]
Q 25) March 20 P12
3 Priya studies music at school. She is buying a new computer to complete her school work at
home.
(a) Priya has a choice between an internal Hard Disk Drive (HDD) and an internal Solid State
Drive (SSD) to store data.
(i) Give one similarity between an HDD and an SSD.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain three differences between an HDD and an SSD.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
9 Elle uses both CDs and DVDs to store her school projects.
(a) Give three similarities between a CD and a DVD.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
................................................................................................................................................... [3]
(b) State one difference between a CD and a DVD.
...................................................................................................................................................
............................................................................................................................................. [1]
Q 30) March 21 P12
1 (c) The hockey club wants to increase the number of people that can watch each match to 2000.
The 8-bit binary register may no longer be able to store the value.
Give the smallest number of bits that can be used to store the denary value 2000.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
4 A supermarket sells many products. Each product has a barcode.
(b) The supermarket stores data using a Solid State Drive (SSD).
(i) Explain how an SSD stores data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) One advantage of an SSD rather than a Hard Disk Drive (HDD) is that it has no moving parts,
so it is more durable. State one other advantage of the supermarket using SSD rather than HDD.
...........................................................................................................................................
..................................................................................................................................... [1]
Marking Scheme
Q 1) Summer 2015 P11
3 9KPVGT2
3 5WOOGT2
3 9KPVGT2
3 9KPVGT2
3 /CTEJ+PFKC
3 5WOOGT2
3 5WOOGT2
3 9KPVGT2
3 9KPVGT2
3 5WOOGT2
3 5WOOGT2
3 9KPVGT2
3 /CTEJ2
3 5WOOGT2
3 5WOOGT2
3 9KPVGT2
3 9KPVGT2
3 C5WOOGT2
3 9KPVGT2
3 9KPVGT2
Have Revised
Have Read
To Revise
Prepared
Learning Outcome
To Read
Interrupt
An interrupt is a signal/message from some device or software or user to indicate that some event
has occurred and the device is seeking the attention of the processor.
Buffers are also used, when streaming a video from the internet. This ensures that the video
playback doesn’t keep on stopping to wait for data from the internet.
4 BVBTS
(a) Describe the terms buffer and interrupt.
Buffer: ...............................................................................................................................................................
...................................................................................................................................................................... [2]
interrupt: .........................................................................................................................................................
...................................................................................................................................................................... [2]
(b) (i) Explain the role of the buffer and interrupts when a large document of over 200 pages is
sent to a laser printer.
..........................................................................................................................................................................
...................................................................................................................................................................... [2]
(ii) The use of two buffers would speed up the printing process. Explain why.
..........................................................................................................................................................................
...................................................................................................................................................................... [2]
6QRKECN2CUV2CRGTU
Q 1)8 State three features of a typical operating system.
1: .........................................................................................................................................
.............................................................................................................................................
2: ......................................................................................................................................
.............................................................................................................................................
3: ........................................................................................................................................
.......................................................................................................................................[3]
Function Description
Interrupt Many processes appear to run simultaneously
Examiner Report
Nearly all candidates identified the correct description for most of the operating system functions.
Common errors included mixing up, ‘Interrupt’, ‘Memory management’ and/or ‘Spooling’
3 9KPVGT2
3 5WOOGT22
3 9KPVGT2
3 9KPVGT2
Revision Checklist
Have Revised
Learning Outcome
Have Read
To Revise
Prepared
To Read
Programming Language:
For Count=1 to 10
Print ''Allah''
Next Count
High-level languages are designed with programmers in mind; programming statements are easier to
understand than those written in a low-level language. This means that programs written in a high-
level language are easier to:
• read and understand as the language used is closer to human language
• write in a shorter time
• debug at the development stage
• maintain once in use.
Examples: Python, COBOL, Pascal, FORTRAN, GWBASIC, C++, JAVA, VB.Net.
Source Code:
''A program written in any language except the machine language is called Source Code.''
Programmers can write programs in Machine Language, Assembly Language and High Level
Languages like COBOL, PASCAL, and GWBASIC etc. The programs, written in Assembly Language
or any High Level Language are called Source Code.
Object Code:
''A program written in Machine Language is called Object Code.''
Computer can understand only machine language code. Language translators converts source
code of High Level Language into machine code, these converted codes are Object Codes.
1 Assembler:-
''Assembler is a language translator that translates source program written in Assembly
Language into object code in machine language.''
Computer can understand only machine language. Assemblers translate programs written in
Assembly Language into Machine Language so as computer can understand execute them.
Assembly
Machine Language
Language Assembler
Object Code
Source Code
2 Interpreters:-
''An interpreter is a language translator that translates source program written in High Level
Language into object code in machine language during step by step execution of program.''
Computer can only understand instruction written in machine language. Interpreters translate
one by one instruction of High Level Language source code into object code of Machine Language.
Interpreter translates one instruction which is executed before translation of next instruction. The
object code is not saved so the source code is interpreted every time before the execution.
Each high level language has its own language translator.
3 Compilers:-
''A compiler is a language translator that translates whole source program written in High Level
When a program is being interpreted, the interpreter performs the actions specified by each statement
until a syntax error is found.
Logic errors
Logical errors are the errors which don’t stop execution of program but the program don’t produced
required result.
Run-time error
An error that occurs during the execution of a program.
For example, Divide-by-zero error or running out of
memory will often cause a runtime error.
……..........................................................................................................................................................
.................................................................................................................................................. [2]
(b) A program written in a high-level language is translated into machine code. This is so that it can
be processed by a computer. Name one type of translator that can be used.
........................................................................................................................................ [1]
(c) Describe how your answer to part (b) translates this program.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
............................................................................................................................ [3]
2 Both an interpreter and a compiler can be used when writing a program in a high-level language.
(a) Explain why a programmer would make use of both an interpreter and a compiler.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Give three reasons why a programmer would choose to write a program in a high-level language,
instead of a low-level language.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
Reason 3 ..................................................................................................................................
................................................................................................................................................... [3]
Q 18) 15a Summer 20 P11) 9 Programs can be written in a low-level language.
(a) Identify three features of a low-level language.
Feature 1 ..................................................................................................................................
Feature 2 ..................................................................................................................................
Feature 3 .................................................................................................................................. [3]
(b) Give two examples of a low-level language.
Example 1 .................................................................................................................................
Example 2 ................................................................................................................................. [2]
(c) Give one drawback of writing programs in a low-level language.
...................................................................................................................................................
............................................................................................................................................. [1]
3 5WOOGT2
3 5WOOGT2
3 9KPVGT2
3 5WOOGT2
3 9KPVGT2
3 5WOOGT2
3 9KPVGT2
3 9KPVGT2
3 5WOOGT2
3 /CTEJ2
3 C5WOOGT2
3 /CTEJ2
Chapter 4
Have Read
To Revise
Prepared
To Read
Learning Outcome
Have
1.2.2: Security aspects
Show understanding of the security aspects of using the Internet and
understand what methods are available to help minimise the risks
Show understanding of the Internet risks associated with malware, including
viruses, spyware and hacking
Explain how anti-virus and other protection software helps to protect the user
from security risks (this also links into section 1.4 of the syllabus)
1.4 Data integrity and security
Show understanding of how data are kept safe when stored and transmitted,
including:
○ use of passwords, both entered at a keyboard and biometric
○ use of firewalls, both software and hardware, including proxy servers
○ use of security protocols such as Secure Socket Layer (SSL) and Transport
Layer Security (TLS)
○ use of symmetric encryption (plain text, cypher text and use of a key)
showing understanding that increasing the length of a key increases the
strength of the encryption
Show understanding of the need to keep online systems safe from attacks
including denial of service attacks, phishing, pharming
Show understanding of the need to keep data safe from accidental damage,
including corruption and human errors
Have Read
To Revise
Prepared
To Read
Learning Outcome
Have
Show understanding of the need to keep data safe from malicious actions,
including unauthorised viewing, deleting, copying and corruption
Describe how the knowledge from 1.4.1, 1.4.2 and 1.4.3 can be applied to
real-life scenarios including, for example, online banking, shopping
Security Risk:
x Transmits all data typed by user to the originator of spyware e.g. email/bank id and passwords,
debit/credit card number etc.
x Can read cookies.
x Can change default web browser
x Can install other spyware
Methods to remove risk
x Install anti-spyware software
x Install firewall
x Use on-screen keyboard to type user id
and passwords
War Driving
War driving is the act of searching for Wi-Fi wireless networks by a person usually in a moving vehicle,
using a laptop or Smartphone. It is also known as Access-Point Mapping.
Security Risk
x Uses user’s internet data/time
x May hack password and personal data
Methods to remove risk
x Use complex password
x Limit the number of users
x Firewall
x Use wired equivalent privacy (WEP) encryption
Protection
1. The most powerful weapon against phishing is common sense and the following rules that
every user should oblige to.
2. If you are not a customer of the site delete the email immediately. Don´t click on the link or
reply.
3. If you are a customer and you are not sure if the email is legit do one of the following:
a) Contact the institute by phone or contact at the official website (do not use the email link of
course) and ask if the mail is official.
b) Instead of using the link provided open the website by typing in the official link there. The site
Protection
x Check the URL of any site that asks you to provide personal information. Make sure your session
begins at the known authentic address of the site, with no additional characters appended to it.
x Use a trusted, legitimate Internet Service Provider. Rigorous security at the ISP level is your first
line of defense against pharming.
x Check the certificate. It takes just a few seconds to tell if a site you land on is legitimate.
x Block suspicious Websites automatically
Hacking
Hacking is unauthorized use of computer and network resources.
The activity of breaking into a computer system to gain an unauthorized access is known as hacking.
The act of defeating the security capabilities of a computer system in order to obtain an illegal access
to the information stored on the computer system is called hacking.
Protection:
¾ Make your passwords long and complicated, and with a good mix of letters and numbers, as
well as utilizing case-sensitive letters. Don't use anything familiar, such as your birthday, your
children's names or anything like that. If a hacker wants to attempt to break into your email accounts,
at least make him work for it.
¾ Don't ever allow your browser to remember your passwords. True, it may be a bit of an
inconvenience to enter your password every time you log in.
¾ Activate Firewall
Functions of firewall
x Monitors incoming and outgoing traffic
x checking whether incoming or outgoing data meets a given set of criteria
x if the data fails the criteria, the firewall will block the ‘traffic’ and give the user(or network manager)
a warning that there may be a security issue
x logging all incoming and outgoing ‘traffic’ to allow later interrogation by the user(or network
manager)
x criteria can be set to prevent access to certain undesirable sites; the firewall can keep a list of all
undesirable IP addresses
x helping to prevent viruses or hackers entering the user’s computer (or internal network)
x warning the user if some software on their system is trying to access an external data source (e.g.
automatic software upgrade); the user is given the option of allowing it to go ahead or requesting
that such access is denied.
It is often referred to in this case as a GATEWAY. Alternatively, the firewall can be software installed
on a computer; in some cases, this is part of the operating system.
Limitations of firewall
Proxy server
A proxy server is a dedicated computer system running on a network that acts as an intermediary
between a client application, such as a Web browser, and a real server.
how proxy servers work:
When a proxy server receives a
request for an Internet resource
(such as a Web page), it looks in
its local cache of previously
pages. If it finds the page, it
returns it to the user without
needing to forward the request to
the Internet. If the page is not in
the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP
addresses to request the page from the server out on the Internet. When the page is returned, the
proxy server relates it to the original request and forwards it on to the user.
Functions of proxy servers include:
x allowing the internet ‘traffic’ to be filtered; they can block access to a website if necessary (similar
type or reaction as a firewall)
x by using the feature known as a CACHE, they can speed up access to information from a website;
when the website is first visited, the home page is stored on the proxy server; when the user next
visits the website, it now goes through the proxy server cache instead, giving much faster access
x keeping the user’s IP address secret – this clearly improves security
x acting as a firewall.
https://www.us-cert.gov/ncas/tips/ST04-014
If an organization wants to have a secure web site that uses encryption, it needs to obtain a site, or
host, certificate.
There are two elements:
¾ a closed padlock,
¾ URL that begins with "https:" rather than "http:"
If a web site has a valid certificate, it means that a certificate authority has
taken steps to verify that the web address actually belongs to that
organization. When you type a URL or follow a link to a secure web site, your
browser will check the certificate for the following characteristics:
1. The web site address matches the address on the certificate
2. The certificate is signed by a certificate authority that the browser recognizes as a "trusted"
authority
If the browser senses a problem, it may present you with a dialog box that claims that there is an error
with the site certificate.
If you have chosen not to trust the company who issued the certificate, or if the certificate has expired.
You will usually be presented with the option to examine the certificate, after which you can accept the
certificate forever, accept it only for that particular visit, or choose not to accept it.
TRANSPORT LAYER SECURITY (TLS) is similar to SSL but is a more recent security system. TLS is
a form of protocol that ensures the security and privacy of data between devices and users when
communicating over the internet. It is essentially designed to provide encryption, authentication and
data integrity in a more effective way than its predecessor SSL.
When a website and client (user) communicate over the internet, TLS is designed to prevent a third
party hacking into this communication causing problems with data security.
TLS is formed of two layers:
• Record protocol: this part of the communication can be used with or without encryption (it contains
the data being transferred over the internet).
• handshake protocol: this permits the website and the client (user) to authenticate each other and to
make use of encryption algorithms (a secure session between client and website is established).Only
Data Encryption
Encryption is the conversion of electronic data into another form, called cipher text, which cannot be
easily understood by anyone except authorized parties.
The word encryption comes from the Greek word kryptos, meaning hidden or secret.
Example 2: When Alice wants to ensure that the message is sent by her (to verify the sender and
message is not altered, not to make message secure (not-understandable by others)),
she encrypts her message using her own private key.
Then the message is transmitted to Bob.
Bob decrypts the message using Alice’s public key.
The decryption of message by Alice’s public key confirms that this is Alice’s message, and is without
any alteration.
Plain Text
1234 5678 9012 3456
Message Digest Algo 4 MD4
Cypher Text
543FC7DDEA0CF5EAF84279CBADCA180D
Past Papers
3 5WOOGT2
4 Choose six correct terms from the following list to complete the spaces in the paragraphs below:
• encryption • file name • firewall
• HTML tags/text • IP address • protocol
• proxy server • SSL certificate • web server name
A user enters a URL. The web browser breaks up the URL into three components:
1 ........................................................
2 ........................................................
3 ........................................................
The web server returns the selected web page.
The web browser reads the ............................................................ from the selected page and shows
the correctly formatted page on the user’s screen.
A ............................................................ is used between the user’s computer and the network to
examine the data traffic to make sure it meets certain criteria.
To speed up the access to the web pages next time, a ........................................... is used between
the computer and web server; this device uses a cache to store the website home page after it has
been accessed for the first time. [6]
ExaminerĜs Comments on Question 4
The full range of marks were awarded to candidates for this question. It was clear some candidates knew the process and gained full
marks, but most candidates achieved two or three marks.
6 (a) Viruses, pharming and phishing are all examples of potential Internet security issues. Explain
what is meant by each of these three terms.
Virus: .......................................................................................................................................................
.............................................................................................................
Pharming: ................................................................................................................................................
.................................................................................................................................................................
......................................................................
Phishing: ..................................................................................................................................................
......................................................................................................
..................................................................................................................[6]
(b) An online bank requires a client to supply an 8-digit code each time they
wish to access their account on the bank’s website.
2 5 1
Rather than ask the client to use a keyboard, they are requested to use an on- 6 8 3
screen keypad (shown on the right) to input the 8-digit code.
The position of the digits on the keypad can change each time the website is 9 0 4
visited.
The client uses a mouse or touch screen to select each of the8 digits. 7
(i) Explain why the bank has chosen to use this method of entering the 8 digits.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
................................................. [2]
10 Choose five correct terms from the following list to complete the spaces in the sentences below:
• cypher text • encryption algorithm • encryption key
• firewall • plain text • proxy server
• symmetric encryption
....................................................................................... is a security system.
It uses the same ....................................................................... to encrypt and decrypt a message.
Before encryption, the message is called ......................................................... .
The ..................................................................................... processes the original message. The
output is known as ........................................................................... . [5]
3 9KPVGT2
3 (a) Three statements about cookies are shown below.
Study each statement. Tick to show whether the statement is true or false. [3]
Statement True False
Cookies can destroy or modify data in a computer without the user’s
knowledge
Cookies generate website pop-ups
Cookies allow a website to detect whether a viewer has viewed
specific web pages
3 5WOOGT22
6 Secure socket layer (SSL) is used in the security of information on Internet websites.
(a) State how it is possible for a user to know that a website is secure by looking at the web address.
.................................................................................................................................................................
.................................................................................................................... [1]
(b) Describe three of the stages a web browser goes through to detect whether a website is secure.
1 ..........................................................................................................................................
.................................................................................................................................................................
.........................................................................................................................
2 .........................................................................................................................................
.................................................................................................................................................................
.........................................................................................................................
3 ..........................................................................................................................................
.................................................................................................................................................................
.................................................................................................................... [3]
8 A bank offers an online service to its customers. The bank has developed a “SafeToUse”
systemthat asks each customer to enter four randomly chosen characters from their password each
time they log in.
The customer selects these four characters from drop-down boxes. For example:
[2]
(a) (i) Explain why it is more secure to use drop-down boxes rather than entering characters using a keyboard.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
........................[2]
Term Description
128 64 32 16 8 4 2 1
0 1 1 1 0 0 0 0
...............................................................................................................................................[1]
(b) All the bits in the register are shifted one place to the right as shown below.
(c) State, giving a reason, which cypher text would be more secure.
.................................................................................................................................................................
.................................................................................................................................................. [2]
5 Give the meaning of the following terms.
HTML ..................................................................................................................................................
http .....................................................................................................................................................
https ............................................................................................................................................ [3]
9 Passwords are used to keep data safe.
Explain the differences between a text-based password and a biometric password.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
............................................................................................................[4]
3 9KPVGT2
5 Raj is using the Internet to do some online shopping. He visits a website that tells him that it uses c
ookies.
(a) Explain what is meant by the term cookies.
Method 1 ............................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................ [4]
3 9KPVGT2
7 Six statements about firewalls are shown.
Tick to show whether each statement is true or false. [6]
Statement True False
Firewalls can monitor incoming and outgoing traffic.
Firewalls operate by checking traffic against a set of rules.
Firewalls cannot block access to a certain website.
Firewalls can be software and hardware.
Firewalls can act as intermediary servers.
Firewalls can block unauthorised traffic.
(ii) The term used to describe data before it is encrypted is plain text.
State the term used to describe encrypted data.
..................................................................................................................................... [1]
6 Jesse is taking his Computer Science examination. He answers five questions about ethics.
(a) For the first question, he writes the answer:
“This type of software can be copied and shared without the permission of the owner.”
State what Jesse is describing.
............................................................................................................................................. [1]
(b) For the second question, he writes the answer:
“With this type of software, the owner still retains the copyright for the software, but he gives away
copies of it for free.”
State what Jesse is describing.
............................................................................................................................................. [1]
(c) For the third question, he writes the answer:
“This type of software is often a trial version of the full software. To use the full version the user
normally needs to pay a fee.”
State what Jesse is describing.
............................................................................................................................................. [1]
(d) For the fourth question, he writes the answer:
“This is when a person copies another person’s computer program and tries to claim it as his own.”
State what Jesse is describing.
............................................................................................................................................. [1]
(e) For the fifth question, he writes the answer:
“This is the legal protection that a person can obtain, to provide protection against his work being
stolen.”
State what Jesse is describing.
............................................................................................................................................. [1]
Incorrect
(ii) Describe how the firewall helps to keep Uma’s data secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
..................................................................................................................................... [1]
(b) Hans makes sure data transmission for his website is secure.
(i) State how customers can check that the personal details they enter into the website will be
transmitted securely.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain how a customer’s browser checks that the website is secure.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(b) Identify and describe two other types of internet risk that are used to obtain personal data.
Internet risk 1 ............................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Internet risk 2 ............................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [6]
18a Summer 21 P11
3 A firewall can be used to help keep the data secure that is stored on a computer.
(a) The given paragraph describes how the firewall operates to help keep the data secure.
Complete the paragraph using the most appropriate terms from the given list. Not all of the terms on
the list need to be used.
• Accept • Criteria • Hacking • Input • Network • Outgoing
• Output • Processor • Reject • Software • Store • Storage
A firewall can be ............................................ or hardware based. It monitors traffic between the
computer and the ............................................ The user sets ............................................ for the
traffic. The firewall will .............................................. or ............................................ the traffic based
18b Summer 21 P12) 4 Three types of Internet security risk are virus, spyware and denial of service
(DoS) attack.
(a) Six statements are given about Internet security risks. [6]
Virus Spyware Denial of
Statement
()ض ()ض service ()ض
captures all data entered using a keyboard
can be installed onto a web server
prevents access to a website
is malicious code on a computer
is self-replicating
damages the files on a user’s hard drive
(b) Explain why a user may be concerned about their personal data and online browsing habits being
stored in cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
7 Marco uses his computer for work. The data he uses on a daily basis is valuable to his business.
Marco is concerned about his data being accidentally damaged. Human error, such as incorrectly
removing external storage devices, is one way that the data can be accidentally damaged.
(a) Identify two other ways that data can be accidentally damaged.
1 ................................................................................................................................................
2 ................................................................................................................................................ [2]
(b) Removing storage devices correctly from the computer can help prevent data being accidentally
damaged.
Give two other ways that accidental damage to data can be prevented.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
................................................................................................................................................... [2]
Marking Scheme
3 5WOOGT22
3 9KPVGT2
10
3 /CTEJ+PFKC
3 5WOOGT2
3 9KPVGT2
3 9KPVGT2
3 5WOOGT2
3 /CTEJ2
3 5WOOGT2
3 9KPVGT2
3 9KPVGT2
3 /CTEJ2
3 C5WOOGT2
3 9KPVGT2
3 /CTEJ2
Chapter 9
Have Read
To Revise
Prepared
To Read
Learning Outcome
Have
1.5: ethics
Show understanding of computer ethics, including copyright issues and
plagiarism
Distinguish between free software, freeware and shareware
Show understanding of the ethical issues raised by the spread of electronic
communication and computer systems, including hacking, cracking and
production of malware
For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics
would suggest that it is wrong to do so without the author's approval. And while it may be possible to
access someone's personal information on a computer system, computer ethics would advise that such
an action is unethical.
As technology advances, computers continue to have a greater impact on society. Therefore, computer
ethics promotes the discussion of how much influence computers should have in areas such as artificial
intelligence and human communication. As the world of computers evolves, computer ethics continues
to create ethical standards that address new issues raised by new technologies.
Intellectual Property Rights:
Intellectual property (IP) is a category of property that includes intangible creations of the human
intellect.
Examples of copyrightable works include movies, videos, photos, books, diaries, articles, and
software.
Copyright is a legal concept, enacted by most governments, that grants the creator of an original work
exclusive rights to its use and distribution, usually for a limited time, with the intention of enabling the
creator of intellectual wealth (e.g. the photographer of a photograph or the author of a book) to receive
compensation for their work and be able to financially support themselves.
Copyright is a form of intellectual property (as patents, trademarks and trade secrets are), applicable
to any expressible form of an idea or information that is substantive and discrete.
%QR[TKIJV+UUWGU8GT[DTKGHN[EQR[TKIJVIKXGUVJGCWVJQTQHCYQTMVJGTKIJV
Software Licencing:
Following are types of software licence:
Freeware is copyrighted computer software which is made available for use free of charge, for an
unlimited time. Authors of freeware often want to "give something to the community", but also want to
retain control of any future development of the software.
The term shareware refers to commercial software that is copyrighted, but which may be copied for
others for the purpose of their trying it out with the understanding that they will pay for it if they continue
to use it.
Free software is computer software that is distributed along with its source code, and is released under
terms that guarantee users the freedom to study, adapt/modify, and distribute the software.
Free Software Freeware Shareware
Free for lifetime Free for lifetime Free for trial period
1 The ACM and IEEE set out eight principles for ethics and professional practice. The categories, with
a short explanation, are shown in this diagram.
I Workplace scenario 1
A large project is devolved to project teams, each led by a project leader. One project leader fails to
inform his manager that he has major concerns that:
x their team's software contribution is taking much longer to write and test than anticipated
x they are consequently at risk of spending over their allocated budget. [3]
...............................................
...................................................................................................
Ii Workplace scenario 2
The software house is about to train a number of programmers in a new programming language. Two
employees are refusing to attend the training. [2]
...............................................
...................................................................................................
Iii The company is developing some monitoring software which requires sensors placed in a nature
reserve.
One employee considers the sensors will be a danger to some of the wildlife, but is told by his
manager that the matter is none of his concern. [2]
...............................................
...................................................................................................
2 A team of software engineers is developing a new e-commerce program for a client. State three of
the principles of the ACM/IEEE Software Engineering Code of Ethics. Illustrate each one, with an
example, describing how it will influence their working practices.
1 .................................................................................................................
.....................................................................................................................
2 .............................................................................................................. ...............................................
...................................................................
3 ............................................................................................................ .................................................
............................................................. [6]
3 9KPVGT2
Statement Type of
Users have the freedom to pass on the software
to friends and family as they wish.
3 9KPVGT2 12 Explain the differences between freeware and free software.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
3 9KPVGT 2 11 Explain why ethics are important when using computers.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
..................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
11 Complete the paragraphs choosing the correct five terms from the list. Each term can only be used
once:
• Ethics • Freeware • Free Software
• Hacking • Malware • Plagiarism
• Shareware • Virus
Taking another person’s work from the Internet and claiming it as your own is
called............................................. . It is possible to protect your work online with copyright. One
product that people may want to protect is software. ............................................. does allow a person
to share, copy and change software freely, but ............................................. does not allow a person
to do this legally. Software that has a licence allowing free use for a trial period is
called ............................................ . The name given to this area of Computer Science
is............................................. . [5]
Free to download
Free software
Freeware
Subject to copyright
legislation
3 9KPVGT2
6 Jesse is taking his Computer Science examination. He answers five questions about ethics.
(a) For the first question, he writes the answer: “This type of software can be copied and shared
without the permission of the owner.” State what Jesse is describing.
............................................................................................................................................. [1]
(b) For the second question, he writes the answer: “With this type of software, the owner still retains
the copyright for the software, but he gives away copies of it for free.”
State what Jesse is describing.
............................................................................................................................................. [1]
(c) For the third question, he writes the answer: “This type of software is often a trial version of the full
software. To use the full version the user normally needs to pay a fee.”
State what Jesse is describing.
............................................................................................................................................. [1]
(d) For the fourth question, he writes the answer: “This is when a person copies another person’s
computer program and tries to claim it as his own.”
State what Jesse is describing.
............................................................................................................................................. [1]
3 /CTEJ2
3 /CTEJ2
7 Adeel has used a high-level language to program a mobile application.
(c) Adeel is considering distributing his application as free software or shareware.
Explain the difference between free software and shareware.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
(d) Adeel is concerned about his application being plagiarised. Define the term plagiarism.
...................................................................................................................................................
............................................................................................................................................. [1]
3 9KPVGT2
3 5WOOGT22
3 9KPVGT2
3 5WOOGT2
3 9KPVGT2
3 /CTEJ2