Answers To Computer Systems Workbook
Answers To Computer Systems Workbook
b i
1 0 0 0 0 1 0 0
ii 132
c i R = 27 = 0 0 0 1 1 0 1 1
r = 108 = 0 1 1 0 1 1 0 0
ii M = 22 = 0 0 0 1 0 1 1 0
m = 88 = 0 1 0 1 1 0 0 0
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
6 a 44801 = A F 0 1
b 1010 1111 0000 0001
7 Three from:
• memory dumps
• error codes
• MAC addresses
• IP addresses
• HTML colour codes
8
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
9 a i Number X D OUTPUT
92 1
64
28 1
32
−4 0
28
16
12 1
4 1
0 1
−2 0
−1 0
0 end
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
ii Number X D OUTPUT
73 73 128
−55 0
73
64
9 1
32
−23 0
16
−7 0
1 1
−3 0
−1 0
0 1
0 end
b The flowchart is converting denary (base 10) numbers into 8-bit binary (base 2) numbers.
10 a i 94
ii 61
b i 10011011
ii 155
This is equal to 94 + 61 in denary.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
20 a B
b D
c A
d D
e B
21 a It is a form of lossless file compression:
• It reduces the size of a string of adjacent, identical data.
• A repeated string is encoded into two values:
• The first value represents the number of identical data items.
• The second value represents the code of the data item.
• RLE is only effective where there is a long run of repeated units.
b i 3W 2D 5W 4D 3W 1D 1W 2D 1W 1D 1W 16D 1W 1D 1W 2D 1W 1D 3W 4D 5W
2D 3W
ii 8 × 8 grid requires 64 bytes of storage
46 bytes are used in the RLE code
reduction = 64 − 46 = 18 bytes
22 a i the number of bits used to represent sound amplitude
ii the number of sound samples taken per second
b i 4 bits (15 = 1111)
ii 10 Hz (i.e. 10 samples per second)
iii point 9: (14) = 1 1 1 0
point 18: (11) = 1 0 1 1
c Benefits:
• larger dynamic range
• better/more faithful sound quality
• less sound distortion
Drawbacks:
• produces larger files
• takes longer to transmit/download music files
• requires greater processing power
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
23 For example:
986 → 3 D A
• Keep dividing by 16 until the value 0 is reached.
• Keep track of remainders following each division.
• The hexadecimal number is obtained from the reminders reading from bottom to top.
• It is necessary to convert remainders that are greater than 9 into the hex characters A, B, C,
D, E or F.
24 a binary digit
b • (computer) circuits are made up of switches/transistors …
• … which can be ON (1) or OFF (0)
c • hex is a more human-friendly representation of binary values …
• … since it uses only 2 digits to represent an 8-bit binary number (greater
information density)
• it is easy to interconvert between hex and binary …
• … which makes it easier when writing software or diagnosing errors in software
2 Data transmission
1 a A data packet is when message/data is split up into smaller groups of bytes:
• for transmission over a network
• containing a header, payload and a trailer
b In any order:
• IP address of the sender
• IP address of the recipient
• the sequence number of the data packet
• the size of the packet (in bytes)
c • The payload contains the actual data being sent in the packet.
• The trailer is a way of identifying the end of a packet and it also contains an error-
checking method, such as a cyclic redundancy check (CRC).
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
b Serial Parallel
Statements
() ()
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
b i 978147186867
9 + 8 + 4 + 1 + 6 + 6 = 34
3 × (7 + 1 + 7 + 8 + 8 + 7) = 3 × 38 = 114
34 + 114 = 148
148/10 = 14 remainder 8
10 – 8 = 2; the check digit
ii 9781471807218
9 + 8 + 4 + 1 + 0 + 2 + 8 = 32
3 × (7 + 1 + 7 + 8 + 7 + 1) = 3 × 31 = 93
32 + 93 = 125
125/10 = 12 remainder 5
Therefore, the check digit is incorrect – an input error has occurred.
8 a E
b B
c B
d E
e A
f E
g A
h B
i D
j A
9 a A data packet header doesn’t contain MAC addresses. It contains the IP addresses of the
sender and recipient.
b Half-duplex refers to data sent in both directions, but not at the same time. The use of four
bits sent along four channels refers to parallel transmission.
c Although USB has become an industry standard, this has nothing to do with the orientation
of connectors. USB connectors can only be fitted in one way.
d Odd parity is to do with the number of 1-bits and nothing to do with the denary value of the
number. Odd parity means a byte contains an odd number of 1-bits.
e Even parity is measured by checking if an even number of 1-bits are sent. A number
such as 0 1 1 0 1 1 0 0 1 has four 0-bits but has five 1-bits and is therefore not showing
even parity.
f Check digits are used to check if data has been entered correctly. They are not used to
check for transmission errors.
g A checksum is calculated from bytes in the data block and not from the 1-bits in
a single byte.
h Asymmetric encryption uses two separate keys – a public key and a private key.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
10
11 • asymmetric encryption
• public
• private
• document
• algorithm
• matching pairs
• mathematically
• public key
• public key
• encrypted
• matching private
• document
• decrypt
3 Hardware
1 • step 1: 4
• step 2: 1
• step 3: 2
• step 4: given in flowchart
• step 5: 5
• step 6: 3
Please note: step 5 (increment PC) could also be shown in steps 2 or 3 in the flowchart.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
The greyed cell in the diagram in the Workbook should contain 00111100.
c CIR: current instruction register – stores the current instructions being decoded and
executed
MAR: memory address register – stores the address of the memory location currently being
read from/written to
MDR: memory data register – stores data which has just been read from memory/data and
is about to be written to memory
PC: program counter – stores the address where the next instruction to be read can
be found
3 a i Clock speeds are measured in GHz, which is the vibrational frequency of the clock
which sends out pulses along the control bus to synchronise operations.
ii A temporary memory location using static RAM to hold data/instructions that are
frequently used by the processor; a larger cache memory increases processor
performance.
b Increasing clock speed can improve performance; however, it can lead to overclocking,
which can cause operations to be unsynchronised, which can cause serious overheating of
the CPU. Use of more cores can improve processor performance (for example, dual core
and quad core). However, doubling the number of cores doesn’t necessarily double the
performance because the CPU needs to communicate with each core, reducing the overall
performance.
4 a i a combination of hardware and software designed to carry out a specific set of
instructions
ii In any order:
• small in size and therefore easy to fit into devices
• relatively cheap to manufacture
• dedicated to a single task which allows for a simple interface and OS
• consumes very little power
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
8 Touch screen
Advantages Disadvantages
technology
• better image clarity than • surface capacitive screens only allow
other technologies use of bare fingers or stylus
Capacitive • very durable screens with • sensitive to electromagnetic radiation
good scratch resistance
• allows multi-touch facility
• allows multi-touch facility • can be sensitive to water/moisture on
• good screen durability screen surface
Infrared • possible accidental activation
• not affected by
scratched/cracked screen • sensitive to light interference
9 a Three from:
• higher contrast ratios
• greater longevity
• quieter running
• no issues lining up images
• smaller and lighter than LCD projectors
• better suited to dusty and smoky atmospheres
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
b Two from:
• The image tends to suffer from ‘shadowing’ during moving images.
• They do not have grey components in the image.
• Colour definition is not as good as LCD projectors.
10 a inkjet printers:
advantages:
• don’t produce ozone gas
• produce high-quality photo/vivid colour images
• small footprint
• don’t need to warm up
• very low purchase price
disadvantages:
• have a small ink reservoir
• small paper trays
• not suitable for long print runs (ink cartridges can be used up quickly)
• can’t use highlighter pens on printouts as ink smudges
• print heads are not very durable
laser printers:
advantages:
• have large paper trays for long print runs
• have large capacity toner cartridges
• very quiet printing
• cost per page is very low
disadvantages:
• produce ozone gas (an irritant) (Don’t allow this point if given as an advantage of
using an inkjet printer.)
• expensive to maintain (cartridges and other parts, such as the diffuser, are expensive)
b i laser printer
• large number of leaflets; therefore, need large amounts of paper and ink to do
the print run
ii inkjet printer
• one off, therefore, speed not essential
• inkjet printers good at producing high definition photo-quality printouts
iii 3D printer
• items for sale need to be solid coins and feel like the real thing
• 3D printers can produce coins from layers of resin/plastic or metal powders
resembling original coins
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
13 a infrared sensor (passive and/or active), acoustic sensor (microphone), pressure sensor
b • The sensors continually send data to the microprocessor.
• Data is converted to digital form by an ADC.
• The microprocessor compares data to pre-set values.
• If an infrared (active) beam is broken, the microprocessor sends a signal to an actuator
to operate a siren/flashing lights.
• If an infrared (passive) value > pre-set value, the microprocessor sends a signal to
an actuator to operate a siren/flashing lights.
• If the microphone/acoustic sensor readings > pre-set value, the microprocessor sends
a signal to an actuator to operate a siren/flashing lights.
• If a pressure sensor reading > pre-set value, the microprocessor sends a signal to
an actuator to operate a siren/flashing lights.
• The process is continuous.
14 a primary:
• directly addressable by the CPU
• part of the CPU/motherboard
• contains RAM/ROM/cache
secondary:
• not directly addressable by CPU
• non-volatile devices
• often external to computer
• for example, HDD, SSD
b RAM ROM
Description
() ()
Non-volatile memory
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
15 Technology used
Description Magnetic Optical Solid state
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
16 True False
Statement
() ()
Devices using magnetic media have a very slow data transfer rate
HDD use a more reliable technology than solid state devices, such
as SSD
17 How VM works:
• It utilises RAM and HDD/SSD.
• RAM is physical memory and swap space on a HDD/SSD is called virtual memory (VM).
• VM management moves the oldest data out of RAM into swap space on a HDD/SSD.
• The oldest data is moved out to allow a new program to gain RAM access.
• The bit map is updated to reflect the new memory status.
Benefits:
• It gives the illusion of unlimited RAM storage/memory.
• Programs can be larger than physical memory and can still be executed.
• It provides more efficient multi-programming.
Drawbacks:
• There is memory wastage.
• There is the need to buy additional RAM.
• If a HDD is used, one drawback is disk thrashing.
• Disk thrashing can lead to HDD premature failure.
18 a It is a method of data storage where data is stored on offsite servers:
• There are three types: public, private and hybrid.
• The same data is often stored on more than one server in case of maintenance or
repairs/backing up – this is called data redundancy.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
b public: storage environments where client and cloud storage provider are separate
companies/organisations
private: storage provided by a dedicated environment behind a company firewall; client
and cloud storage provider are integrated and act as a single entity
hybrid: a combination of public and private; some sensitive data stored on a private cloud
whereas other data can be stored on a public cloud
c i Three from:
• Customer/client files stored on the cloud can be accessed at any time from any
device anywhere in the world provided internet access is available.
• There is no need for a customer/client to carry an external storage device with
them, or even use the same computer to store and retrieve information.
• The cloud provides the user with remote back-up of data with obvious benefits to
alleviate data loss/disaster recovery.
• If a customer/client has a failure of their hard disk or back-up device, cloud storage
will allow recovery of their data.
• The cloud system offers almost unlimited storage capacity.
ii Two from:
• If the customer/client has a slow or unstable internet connection, they might have
many problems accessing or downloading their data/files.
• Costs can be high if large storage capacity is required; it can also be expensive to
pay for high download/upload data transfer limits with the customer/client internet
service provider (ISP).
• The potential failure of the cloud storage company is always possible – this poses a
risk of loss of all back-up data.
19
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
20 a i NIC
ii MAC
iii IP
iv router
v firewall
b i It is a temporary IP address assigned to a device which changes each time a device logs
onto the internet. It uses DHCP to assign the temporary IP addresses.
ii Dynamic IP address Static IP address
Greater privacy because it changes each Because a static IP address doesn’t change,
time a user logs on it allows each device to be fully traceable
A dynamic IP adress can be an issue It allows for faster upload and download
when using, for example, VoIP because speeds
this type of addressing is less reliable
because it can disconnect and change the It is more expensive to maintain because the
IP address causing the VoIP connection device must be constantly running so that
to fail information is always available
c i 1 = computer
2 = switch
3 = router
4 = external network (e.g. internet)
ii • It enables data packets to be routed between different networks, for example,
joining a LAN to a WAN.
• A router takes data transmitted in one format from a network (using one protocol)
and converts the data to a protocol and format understood by another network.
• A router inspects data packets sent to it from any computer or connected network.
• Because all computers on the same network have the same part of an IP address,
the router can send data packets to the correct switch for onward delivery to the
correct MAC address.
21 a internet service provider
b a set of rules agreed by devices using the internet
c • IPv4 uses 32-bit addresses …
• … whereas IPv6 uses 128-bit addresses.
• for example: 190.188.0.250 (IPv4)
fff0:a8fb:7a88:0fff:3d22:2088:66fb:f0fa (IPv6)
• There is less risk of IP address collision with IPv6.
• IPv6 has built-in authentication.
• IPv6 is a more modern/recent IP address protocol.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
4 Software
1 System Application
Software
() ()
Compiler
Spreadsheet software
Printer driver
QR code reader
Anti-virus software
Screensaver
2 a Three from:
• It is a set of programs to control and manage the operation of computer hardware.
• It provides a platform on which software can run.
• It is required to allow hardware and software to run without problems.
• It provides a human computer interface (HCI).
• It provides the control of allocation and usage of hardware resources.
b Three from:
• It is used to perform various applications.
• It allows a user to perform specific tasks.
• It may be a single program or a suite of integrated programs.
• The user can execute the software whenever needed.
c Three from:
• virus checkers
• defragmentation software
• disk contents analysis/repair
• file compression
• file management
• back-up facility
• security of the system
• screensaver
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
3 • antivirus
• background
• anti-virus
• heuristic checking
• quarantine
• user
• blocks
• sectors
• tracks
• disk defragmenter
• blocks
• contiguous
• head movements
• screensavers
• security systems
• screensaver
• locked
4 a Five from:
• human-computer interface
• multitasking
• error handling
• platform for the running of applications software
• management of user accounts
• managing files
• hardware management
• memory management
• interrupt handling
• security management
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
b i CLI:
• command line interface
• user uses a keyboard to type in commands/instructions …
• … to choose from a menu, open software, and so on
• requires a number of exact commands to do a single task
• user has to learn the commands …
• … and type them in accurately
GUI:
• graphical user interface
• user interacts with the computer using onscreen icons rather than typing commands
• chooses from menus, open software, and so on, by clicking on an icon
(using pointing device) or by using finger on a touch screen
• no typing needed
• often uses WIMP environment
• where a windows manager looks after interaction between windows and
applications software
ii CLI GUI
Statement
() ()
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
7 Management type:
Statement Memory Security Hardware
8 a It is software that communicates with the OS and translates data into a format understood
by the device.
b and c
• a collection of information about devices; known as descriptors
• allows the USB bus to ask a newly connected device what it is
• descriptors include vendor ID, product ID and unique serial number
9 a software/instructions programmed on a hardware device
b BIOS, videocard, SSD, CD/DVD drive are common examples.
10 a In any order:
• Programs are easier to write.
• Programs take less time to write.
• Programs are easier to maintain.
b A programmer may be writing a program that needs to perform a task very quickly. If he
uses a low-level language, he can ensure only essential programming statements are
included. This would reduce the time taken to execute the task.
c Type of language: assembly language
Reasons: Steve is writing a program that uses specialist hardware to control the lighting
and there are no high-level programming commands available to drive this hardware.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
11 • language
• machine code
• assembler
• high-level
• language
• machine code
• translators
• high-level
• compilers
• interpreters
The last two answers can appear in either order.
12 a A compiler translates a program written in a high-level language into a machine code
program. The whole program is translated.
b An interpreter executes a program written in a high-level language by translating, then
executing each line of the program.
c An assembler translates a program written in assembly language into a machine code
program. The whole program is translated.
13 a i to translate the final program that is going to be used repeatedly
ii while the program is being developed
b In any order:
• It is easier to edit programs during development.
• It is faster to debug programs during development.
c In any order:
• Once translated, programs do not need the compiler to execute and only need
translating once.
• Once translated, programs take up less space in memory during execution.
14 a An integrated development environment (IDE) is used by programmers to aid in
the writing, editing and development of programs.
b Three from:
• code editor
• translator
• auto-completion
• auto-correction
• pretty printing
c Error diagnostics and debuggers allow the programmer to run the program under
development in a controlled environment. For example, a separate report window can be
used to display the values of each variable as the program is running.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
b i https
ii www
iii .com
iv comp_science_sample
c Three from:
• They have a home page.
• They can store a user’s favourite websites/web pages (used as a bookmark).
• They keep a history of websites visited by the user (user history).
• They have the ability to allow the user to navigate forwards and backwards through
websites/web pages already opened; many webpages can be open at the same time
(navigation).
• They make use of hyperlinks that allow navigation between websites and web pages;
links are shown in one of two ways:
• either the website is underlined and requires <ctrl> + <click> to follow the link
• or a small pointed finger shows under the name of the website link to highlight it
• They make use of cookies.
• Data is stored as a cache.
• They translate HTML and display the result of the translation on the user’s device.
• They make use of JavaScript.
• They use an address bar.
2 order: 2, 4, 5, 1, 6, 3
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
New hash values are only generated when data in a block is altered
b In any order:
• data (for example, name of sender/recipient)
• hash value (a unique ‘fingerprint’)
• previous hash value (pointing back to previous block in the chain)
c i 0000 A4BF 6AB1 34EE FF12 AA00
ii Any changes to block '4' will cause the hash value (FF12) to be changed. This means
that blocks '5' and '6' and beyond will now be invalid because the chain was broken
between '4' and '5' (previous hash value FF12 is no longer valid).
d • Cryptocurrency uses cryptography to track transactions.
• Digital currency uses a central banking system; whereas cryptocurrency is
decentralised.
• Cryptocurrency uses block chaining.
• Cryptocurrency transactions are publicly available and therefore all transactions can be
tracked.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
b i This occurs when a cybercriminal creates a social situation that can lead to a potential
victim ‘dropping their guard’. It involves manipulation of people into breaking their
normal security protocols by:
• instant messaging
• scareware
• email/phishing scams
• baiting
• bogus phone calls
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
7 a i It is software that detects and removes spyware programs installed illegally on a user’s
computer system.
ii Three from:
• It detects and removes spyware already installed on a device.
• It prevents a user from downloading spyware.
• It encrypts files to make the data more secure in case it is ‘spied’ on.
• It encrypts keyboard strokes to help remove the risk posed by the keylogging
aspects of some spyware.
• It blocks access to a user’s webcam and microphone (the software stops the
spyware from taking over the control of a user’s webcam and microphone which
can be used to collect information without the user’s knowledge).
• It scans for signs that the user’s personal information has been stolen and warns
the user if this has happened.
b Biometric
Benefits Drawbacks
technique
Fingerprint • is one of the most • is very intrusive for some people
or developed biometric because it is still related to criminal
thumbprint techniques identification
scans
• has high accuracy • can make mistakes if the skin is dirty or
• is very easy to use damaged (e.g. cuts)
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
8 a order: 4, 5, 2, 6, 3, 1
b They contain ‘patches’ that contain software improvements, for example, removing
glitches or adding new features; updates may contain security fixes, such as improved anti-
malware routines.
9 Four from:
• email address gives clues, for example, no company will use an email such as
‘…@gmail.com’
• email address should contain the company name
• tone of email is a clear indication of a scam
• not only spelling mistakes, but the language used and the way the target victim is
addressed, for example ‘Dear User’
• mis-spelling in a subtle way (i.e. typo squatting)
• suspicious links; the destination address should match the rest of the email
• some links (such as, How To Contact Us) don’t work
• look at the domain; for example, large companies would use .com rather than .co or .org
10 a a type of protocol that:
• allows data to be sent and received securely over a network
• encrypts data
• is active when the connection protocol is https or if there is a small green padlock by
the website address
b order: 2, 4, 1, 5, 3
c Three from:
• online banking and financial transactions
• online shopping/commerce
• when sending out software to a restricted list of users
• sending/receiving emails
• using cloud storage facilities
• using VoIP
• when using instant messaging
• when using social networking sites
11 a • They can filter information in and out of a computer.
• They are the primary defence of any computer system to prevent it from hacking,
malware, phishing and pharming.
• They can be hardware or software.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
b Four from:
• It is used to examine the ‘traffic’ between a user’s computer (or internal network) and a
public network (for example, the internet).
• It checks whether incoming or outgoing data meets a given set of criteria, and if the
data fails the criteria, the firewall will block the ‘traffic’ and give the user (or network
manager) a warning that there may be a security issue.
• The firewall can be used to log all incoming and outgoing ‘traffic’ to allow later
interrogation by the user (or network manager).
• Criteria can be set so that the firewall prevents access to certain undesirable sites; the
firewall can keep a list of all undesirable IP addresses.
• Alternatively, the firewall can be set to only allow access to known and trusted IP
addresses.
• It is therefore possible for firewalls to help prevent viruses or hackers from entering the
user’s computer (or internal network).
• The user is warned if some software on their system is trying to access an external data
source (for example, automatic software upgrade); the user is given the option of
allowing it to go ahead or request that such access is denied.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
d Three from:
• They are much faster than a human operator to take any necessary action.
• They keep humans away from potentially dangerous environments.
• The process can be run under optimum conditions.
• They are less expensive in the long run.
e Three from:
• They are expensive to set up initially.
• It is always possible for a situation to arise which was not considered when testing and
developing the system.
• They are subject to cyber attacks.
• They require enhanced maintenance.
4 a OCR
b • A pressure sensor on the ground recognises presence of a vehicle.
• The data is sent back to computer which then sends a signal …
• … to operate the camera.
• The camera photographs the front of the vehicle.
• Software converts characters on the number plate into electronic values which are then
compared to a database.
• If the vehicle number plate matches data on the database, then the computer sends a
signal to an actuator …
• … to operate a motor to raise the barrier.
• On exit, the same procedure as above is carried out to see if the vehicle was allowed
to park.
c i • There is no need for any manual checks.
• It can operate 24/7.
• It has improved security because only recognised vehicles are allowed entry.
ii • The number plate stored with manufacturer of vehicle/colour of vehicle is also
stored on the database.
• There will be a vehicle manufacturer badge as well as number plate read by
camera.
• It is possible to have additional security such as RFID in a vehicle.
5 a i cameras:
• can gauge the size of the parking space
• feed back images to driver to check parking procedure
ii sensors:
• can detect the presence of other vehicles
• can detect items such as kerbs, people, lamp posts, trees, and so on
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
iii actuators:
• operate brakes
• operate steering
• operate throttle/accelerator
b To prevent the driver exceeding a set speed:
• Sensors in the front bumper of car detect the vehicle in front.
• Data is sent to the microprocessor (converted to digital by ADC if necessary).
• The microprocessor calculates the distance between vehicles.
• Sensors on the speedometer drive constantly send signals to the microprocessor.
• The microprocessor compares the speed to a set speed.
• If speed is equal to set speed no action is taken.
• If speed > set speed, signals are sent to actuators to operate brakes and reduce throttle.
• If speed < set speed, microprocessor sends signals to actuators to increase throttle.
• This process loop is continued until speed is within set speed.
• To prevent constant braking and accelerating, the microprocessor allows a 5 kph
margin in all calculations.
To prevent the car getting too close to the vehicle in front of it:
• The microprocessor determines if the distance between vehicles is equal to the safe
distance for set speed calculated above.
• If distance < safe distance, the microprocessor sends signals to operate brakes and
reduce throttle …
• … and signal is also sent to a warning buzzer to inform the driver.
• If distance >= safe distance, the microprocessor checks speed value …
• … if speed = set speed then no action is taken …
• … otherwise, the first loop is checked to see if the car is doing the set speed value.
• This process loop is continued until vehicle is at a safe distance …
• … to prevent constant braking, a safety margin is built into calculations.
6 a i • level sensor – to measure the amount of liquid added to a batch
• temperature sensor – to ensure the reaction mixture has the correct temperature of
35°C maintained
• light sensor – intensity of light passing through a reaction mixture will change as
the colour changes
ii • infrared/motion sensor – detects the presence of visitors in the room
• light sensor – to automatically switch off room lights once the display starts
iii • pressure sensor – to detect a passenger in a doorway
• infrared sensor – to detect the proximity of a passenger
• camera – to relay data back to the driver or to the control centre
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
b True False
Statements
() ()
Automated systems lead to less consistent results or less
consistent products
Automated systems are more expensive to set up than
traditional manual systems
Automated systems could be quickly overwhelmed by the
amount of data presented to it
Automated systems are inherently less safe than manual
systems
Automated systems generally require enhanced maintenance
when compared to manual systems
Automated systems allow processes to run at optimum
conditions at all times
Software failures, due to unforeseen conditions, are unlikely to
impact on an automated system
Automated systems will react more quickly to unusual process
conditions than a manual system
7 a 1 = user interface
2 = inference engine
3 = knowledge base
b i objects
ii taxi cab
c • Information needs to be gathered from human experts or from written sources such as
textbooks, research papers or the internet.
• Information gathered is used to populate the knowledge base which first needs to be
created.
• A rules base needs to be created; this is made up of a series of inference rules so that
the inference engine can draw conclusions.
• The inference engine itself needs to be set up; it is a complex system because it is the
main processing element making reasoned conclusions from data in the knowledge
base.
• The user interface needs to be developed to allow the user and expert system to
communicate.
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
9 a C
b E
c B
d A
e D
10 Advantages of autonomous trains Disadvantages of autonomous trains
improved punctuality the ever-present fear of hacking into the
vehicle’s control system
reduced running costs (fewer staff are system doesn’t work well with very busy
required) services (at the moment)
improved safety because human error is high capital costs and operational costs initially
removed (that is, buying the trains, expensive signalling
and control equipment and the need to train
staff)
minimises energy consumption because ensuring that passenger behaviour is acceptable
there is better control of speed and provides particularly during busy times (for example,
for a more optimum service with fewer jamming doors open on trains, standing too
delays; delayed trains stuck in stations still near the edge of platforms, and so on)
use energy
it is possible to increase the frequency of passenger reluctance of the new technology
trains (automated systems allow for shorter
times between trains)
it is easier to change train scheduling (for no drivers mean there will be a need for CCTV
example, more trains during busier times) to monitor railway stations
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook answers
Advantages of autonomous cars and buses Disadvantages of autonomous cars and buses
safer because human error is removed very expensive system to set up in the first place
leading to fewer accidents (high technology requirements)
better for the environment because vehicles the ever-present fear of hacking into the
will operate more efficiently vehicle’s control system
reduced traffic congestion (humans cause security and safety issues (software glitches
‘stop-and-go’ traffic known as ‘the phantom could be catastrophic; software updates would
traffic jam’ whereas autonomous vehicles need to be carefully controlled to avoid potential
will be better at smoothing out traffic flow, disasters)
reducing congestion in cities)
increased lane capacity (research shows that the need to make sure the system is well-
autonomous vehicles will increase lane maintained at all times; cameras need to be kept
capacity by 100% and increase average clean so that they don’t give false results;
speeds by 20%, due to better braking and sensors could fail to function in heavy snowfall
acceleration responses together with or blizzard conditions (radar or ultrasonic
optimised distance between vehicles) signals could be deflected by heavy snow
particles)
reduced travel times (for the reasons above) driver and passenger reluctance of the new
therefore less commuting time technology
stress-free parking for motorists (the car reduction in the need for taxis could lead to
will find car parking on its own and then unemployment (imagine New York without its
self-park) famous yellow cabs!)