0% found this document useful (0 votes)
20 views11 pages

Paper1 - Revision 4 - QP

this

Uploaded by

visvaa.rajkumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views11 pages

Paper1 - Revision 4 - QP

this

Uploaded by

visvaa.rajkumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

The Indian Public School

Revision 4

CANDIDATE

NAME

CENTRE I N 8 3 8 CANDIDATE

NUMBER NUMBER

Subject: Computer Science Grade: 10

Total Marks: 75 Duration: 1hr 30min

Paper 1: Computer Systems

READ THESE INSTRUCTIONS FIRST.

Write your candidate number and name on all the work you hand in.
Write in dark blue pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
Answer all questions.
You should show all your working in the booklet.
The number of marks is given in brackets [ ] at the end of each question or part question.
Finish your question paper in time and recheck your answer script before you submit to the invigilator.
You may use the calculator as per the instructions given by the subject facilitator.
The total number of marks for this paper is
This document consists of printed 11 pages.
1. A shopping mall has an information point. Visitors can use it to find out which shops are in the
mall and where they are located.

(a) Identify one input device that could be built into the information point.

Give an example of how that device would be used.

Input device ..............................................................................................................................................

Example ...................................................................................................................................................[2]

(b) Identify one output device that could be built into the information point.

Give an example of how that device would be used.

Output device ..........................................................................................................................................

Example ...................................................................................................................................................[2]

(c) Identify one example of primary storage that could be built into the information point.

State what would be stored in your example of primary storage.

...................................................................................................................................................................

...................................................................................................................................................................

...................................................................................................................................................................

............................................................................................................................................................. [2]

2. A computer is designed using the Von Neumann model for a computer system.

The computer has a central processing unit (CPU).

(a) Data is fetched from primary storage into the CPU to be processed.

(i) State the name of the primary storage from where data is fetched.

............................................................................................................................................................... [1]

(ii) The CPU performs a cycle to process data. Fetch is the first stage in this cycle.

State the names of the second and third stages in the cycle.

Second stage ...........................................................................................................................................

Third stage ..........................................................................................................................................[2]


(iii) Identify two components within the CPU that are used in the fetch stage of the cycle.

Component 1 ................................................................................................................................................

Component 2 ...........................................................................................................................................[2]

3. Phil has a computer that is designed using the Von Neumann model. The computer has a

central processing unit (CPU).

(a) One type of component within the CPU is an address bus.

Identify two other types of bus and state what each is responsible for transmitting in the CPU.

Bus 1 ...............................................................................................................................................................

.........................................................................................................................................................................

Bus 2 ..............................................................................................................................................................

..................................................................................................................................................................[4]

(b) The CPU performs a cycle that has three stages. One of these stages is execute.

Identify one other stage of the cycle that is performed by the CPU.

.................................................................................................................................................................. [1]

(c) Identify the component within the CPU that the accumulator is built into and describe the

purpose of the accumulator.

.....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

...................................................................................................................................................................

.............................................................................................................................................................. [3]
4. Error codes for a computer are often displayed as hexadecimal values. Each error code is stored

in a 12-bit binary register.

(a) The error code 404 means ‘file not found’.

Give the 12-bit binary value that would be stored for the hexadecimal error code 404

......................................................................................................................................................................

Working space

......................................................................................................................................................................

......................................................................................................................................................................

..................................................................................................................................................................[2]

(b) The error code 12B means ‘hardware fault’.

Give the 12-bit binary value that would be stored for the hexadecimal error code 12B

...................................................................................................................................................................

Working space

...................................................................................................................................................................

...................................................................................................................................................................

................................................................................................................................................................[2]

(c) Hexadecimal values can also be represented as denary values.

The hexadecimal error code 022 means ‘file system error’. The hexadecimal error code 0AC

means ‘insufficient memory’.

Convert the hexadecimal error codes 022 and 0AC to denary values.

022 ................................................................................................

0AC ..............................................................................................

Working space

.......................................................................................................................................................................

.......................................................................................................................................................................
......................................................................................................................................................................

......................................................................................................................................................................

....................................................................................................................................................................[2]

(d) The register stores the binary value 100111100000

Give the hexadecimal error code that would be displayed for the binary value 100111100000

...................................................................................................................................................................

Working space

....................................................................................................................................................................

...................................................................................................................................................................

...............................................................................................................................................................[2]

(e) Give two reasons why error codes are represented in hexadecimal, instead of binary.

Reason 1 .................................................................................................................................................

..................................................................................................................................................................

Reason 2 .................................................................................................................................................

...............................................................................................................................................................[2]

5. A compiler and an interpreter are two different types of translator.

(a) One similarity between a compiler and an interpreter is that they both translate high‑level

language into machine code.

(i) Give one other similarity between a compiler and an interpreter.

......................................................................................................................................................................

................................................................................................................................................................. [1]

(ii) Explain two differences between a compiler and an interpreter.

......................................................................................................................................................................

.......................................................................................................................................................................

........................................................................................................................................................................
.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

.......................................................................................................................................................................

................................................................................................................................................................... [4]

6. Many devices have a Media Access Control (MAC) address.

Give three features of a MAC address.

Feature 1 ..........................................................................................................................................

..........................................................................................................................................................

Feature 2 ..........................................................................................................................................

..........................................................................................................................................................

Feature 3 ..........................................................................................................................................

..........................................................................................................................................................[3]

7. Eleanor uses a secure connection to allow customers to buy the cakes from her website.

Describe how the secure connection is created.

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

............................................................................................................................................................... [5]
8. Eleanor’s website uses cookies.

Explain what is meant by the term cookies and give two examples of how cookies can be

used.

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

............................................................................................................................................................. [4]

9. Eleanor is worried about a denial of service (DoS) attack on her web server.

She wants to help prevent a DoS attack reaching the web server.

Identify a security method that she could use to help prevent a DoS attack.

Explain how the method you identify helps to prevent the attack.

Security method ........................................................................................................................

Explanation ...............................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

………...................................................................................................................................................[3]
10. Adele has a software‑based firewall installed on her mobile device.

The firewall gathers data about the traffic coming into and going out of her mobile device.

Explain how the firewall uses the gathered data to keep the mobile device more secure.

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

…………….............................................................................................................................................. [3]

11.The binary number is measured as a byte because it has 8 bits.

State how many bytes there are in a kibibyte (KiB).

............................................................................................................................................. [1]

12. Explain why a computer needs RAM.


....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

...................................................................................................................................................................[3]

13. A computer needs firmware and system software to operate.

(a) State the purpose of firmware.

...................................................................................................................................................

............................................................................................................................................. [1]
(b) Give one example of firmware.

............................................................................................................................................. [1]

(c) Give two examples of system software.

1 ................................................................................................................................................

2 ................................................................................................................................................[2]

14. A company owner has installed a new network. Data is correct before it is transmitted across
the network.

The company owner is concerned that data might have errors after transmission.

(a) Explain how the data might have errors after transmission.

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

…………….............................................................................................................................................. [3]

(b) The company owner decides to introduce an error detection system to check the data for

errors after transmission.

The error detection system uses an odd parity check and a positive automatic repeat query

(ARQ).

(i) Describe how the error detection system operates to check for errors.

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................
....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

.............................................................................................................................................................. [4]

15. A farmer uses an automated robot to plant seeds in the field.

(a) State what is meant by the robot being automated.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give three characteristics of a robot.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................[3]

(c) The robot plants seeds and stops when it reaches a fence. It then turns and continues planting

seeds. The robot uses sensors and a microprocessor to know when it reaches a fence.

Explain how the robot uses sensors and a microprocessor to know it has reached a fence.
....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................

....................................................................................................................................................................[3]

You might also like