Paper1 - Revision 4 - QP
Paper1 - Revision 4 - QP
Revision 4
CANDIDATE
NAME
CENTRE I N 8 3 8 CANDIDATE
NUMBER NUMBER
Write your candidate number and name on all the work you hand in.
Write in dark blue pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
Answer all questions.
You should show all your working in the booklet.
The number of marks is given in brackets [ ] at the end of each question or part question.
Finish your question paper in time and recheck your answer script before you submit to the invigilator.
You may use the calculator as per the instructions given by the subject facilitator.
The total number of marks for this paper is
This document consists of printed 11 pages.
1. A shopping mall has an information point. Visitors can use it to find out which shops are in the
mall and where they are located.
(a) Identify one input device that could be built into the information point.
Example ...................................................................................................................................................[2]
(b) Identify one output device that could be built into the information point.
Example ...................................................................................................................................................[2]
(c) Identify one example of primary storage that could be built into the information point.
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
............................................................................................................................................................. [2]
2. A computer is designed using the Von Neumann model for a computer system.
(a) Data is fetched from primary storage into the CPU to be processed.
(i) State the name of the primary storage from where data is fetched.
............................................................................................................................................................... [1]
(ii) The CPU performs a cycle to process data. Fetch is the first stage in this cycle.
State the names of the second and third stages in the cycle.
Component 1 ................................................................................................................................................
Component 2 ...........................................................................................................................................[2]
3. Phil has a computer that is designed using the Von Neumann model. The computer has a
Identify two other types of bus and state what each is responsible for transmitting in the CPU.
Bus 1 ...............................................................................................................................................................
.........................................................................................................................................................................
Bus 2 ..............................................................................................................................................................
..................................................................................................................................................................[4]
(b) The CPU performs a cycle that has three stages. One of these stages is execute.
Identify one other stage of the cycle that is performed by the CPU.
.................................................................................................................................................................. [1]
(c) Identify the component within the CPU that the accumulator is built into and describe the
.....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
...................................................................................................................................................................
.............................................................................................................................................................. [3]
4. Error codes for a computer are often displayed as hexadecimal values. Each error code is stored
Give the 12-bit binary value that would be stored for the hexadecimal error code 404
......................................................................................................................................................................
Working space
......................................................................................................................................................................
......................................................................................................................................................................
..................................................................................................................................................................[2]
Give the 12-bit binary value that would be stored for the hexadecimal error code 12B
...................................................................................................................................................................
Working space
...................................................................................................................................................................
...................................................................................................................................................................
................................................................................................................................................................[2]
The hexadecimal error code 022 means ‘file system error’. The hexadecimal error code 0AC
Convert the hexadecimal error codes 022 and 0AC to denary values.
022 ................................................................................................
0AC ..............................................................................................
Working space
.......................................................................................................................................................................
.......................................................................................................................................................................
......................................................................................................................................................................
......................................................................................................................................................................
....................................................................................................................................................................[2]
Give the hexadecimal error code that would be displayed for the binary value 100111100000
...................................................................................................................................................................
Working space
....................................................................................................................................................................
...................................................................................................................................................................
...............................................................................................................................................................[2]
(e) Give two reasons why error codes are represented in hexadecimal, instead of binary.
Reason 1 .................................................................................................................................................
..................................................................................................................................................................
Reason 2 .................................................................................................................................................
...............................................................................................................................................................[2]
(a) One similarity between a compiler and an interpreter is that they both translate high‑level
......................................................................................................................................................................
................................................................................................................................................................. [1]
......................................................................................................................................................................
.......................................................................................................................................................................
........................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
................................................................................................................................................................... [4]
Feature 1 ..........................................................................................................................................
..........................................................................................................................................................
Feature 2 ..........................................................................................................................................
..........................................................................................................................................................
Feature 3 ..........................................................................................................................................
..........................................................................................................................................................[3]
7. Eleanor uses a secure connection to allow customers to buy the cakes from her website.
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
............................................................................................................................................................... [5]
8. Eleanor’s website uses cookies.
Explain what is meant by the term cookies and give two examples of how cookies can be
used.
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
............................................................................................................................................................. [4]
9. Eleanor is worried about a denial of service (DoS) attack on her web server.
She wants to help prevent a DoS attack reaching the web server.
Identify a security method that she could use to help prevent a DoS attack.
Explain how the method you identify helps to prevent the attack.
Explanation ...............................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
………...................................................................................................................................................[3]
10. Adele has a software‑based firewall installed on her mobile device.
The firewall gathers data about the traffic coming into and going out of her mobile device.
Explain how the firewall uses the gathered data to keep the mobile device more secure.
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
…………….............................................................................................................................................. [3]
............................................................................................................................................. [1]
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
...................................................................................................................................................................[3]
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give one example of firmware.
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................[2]
14. A company owner has installed a new network. Data is correct before it is transmitted across
the network.
The company owner is concerned that data might have errors after transmission.
(a) Explain how the data might have errors after transmission.
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
…………….............................................................................................................................................. [3]
(b) The company owner decides to introduce an error detection system to check the data for
The error detection system uses an odd parity check and a positive automatic repeat query
(ARQ).
(i) Describe how the error detection system operates to check for errors.
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
.............................................................................................................................................................. [4]
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................[3]
(c) The robot plants seeds and stops when it reaches a fence. It then turns and continues planting
seeds. The robot uses sensors and a microprocessor to know when it reaches a fence.
Explain how the robot uses sensors and a microprocessor to know it has reached a fence.
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................
....................................................................................................................................................................[3]