0% found this document useful (0 votes)
18 views11 pages

Computer Midterm C1-2024

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views11 pages

Computer Midterm C1-2024

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Quaid-e-Azam Public College, Gujranwala

CANDIDATE INFORMATION
Cambridge Ordinary Level
Name:
End of Year Examination , Oct/Nov 2024 Paper/Subject: Computer
READ THESE INSTRUCTIONS FIRST Code: 2210
Write your name on all the work you hand in. Write in dark blue or Class: Cambridge-I

black BALLPOINT pen. You may use an HB pencil for any diagrams Section: ____________________
Time: 3 Hours
or graphs. Do not use staples, paper clips, glue or correction fluid.

DO NOT WRITE IN ANY BARCODES. For examiner’s use only


Total Marks
Restrict your answer to the space given. Section
Marks Obtained
Avoid un-necessary details, remain to the point. 100
Staple here Staple here

Electronic calculators is allowed. You may lose marks if you do not

show your working or if you do not use appropriate units. The number
Teacher’s Remarks
of marks is given in brackets [ ] at the end of each question or part
____________________________
question.
____________________________

____________________________

____________________________
Staple here

____________________________

____________________________

____________________________

____________________________

____________________________

____________________________

Invigilator’s Signature Examiner’s Signature

Turn over
1

1 Humans use a denary number system and computers use a binary number system.

(a) Explain what is meant by a binary number system.

...............................................................................................................................................................

...............................................................................................................................................................

...............................................................................................................................................................

............................................................................................................................................................[2]

(b) Explain what is meant by a denary number system.

...............................................................................................................................................................

...............................................................................................................................................................

...............................................................................................................................................................

............................................................................................................................................................[2]

(c) Convert the denary numbers 17, 59 and 247 to binary.

17 ..............................................................................................................................................

59 ..............................................................................................................................................

247 ............................................................................................................................................
[6]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(d) Convert the denary numbers 12, 28 and 65 to hexadecimal.

12 ..............................................................................................................................................

28 ..............................................................................................................................................

65 ............................................................................................................................................
[6]
2

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(e) Explain why a computer can process only binary data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.................................................................................................................................................. [2]

2 A register stores the binary number:

1 1 1 0 0 0 1 1

(a) Give the denary number for the binary number stored in the register.

............................................................................................................................................. [1]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

(b) Give the hexadecimal number for the binary number stored in the register.

............................................................................................................................................. [2]

Working space

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
3

(c) A logical left shift of two places is performed on the binary number stored in the register.

Complete the binary register to show its contents after this logical left shift.

[1]

(d) Write the new denary number after this logical shift.

.................................................................................................................................................. [1]

(e) Add the two 8-bit binary numbers, using binary addition. Give your answer in binary.

11100011
01001100

[2]

3 Computers use a character set to convert text into binary. One character set that can be used is ASCII.
Each letter in ASCII can also be represented as a denary value and converted into binary and
hexadecimal.
Denary value of Letter A is 65, Complete the given table. The first one has been done for you.

Letter Q D P S

Denary 81
Value

Binary
Conversion 01010001
(8-bit)

Hexadecimal 51
Conversion

[15]
4

4 (a) Jafar is using the Internet when he gets the message:


“D03, page is not available”

Jafar remembers that hexadecimal is often used to represent binary values in error codes.

Convert the hexadecimal number in the error message into 12-bit binary.

[3]

(b) Identify two other ways that hexadecimal is used in computer science.

Use1...........................................................................................................................................

...................................................................................................................................................

Use2...........................................................................................................................................

................................................................................................................................................... [2]

5 Steffi has a number of files of different sizes that contain her work.

Tick (√) to show whether each statement is true or false.

true false
Statement
(√) (√)
47KB is larger than 10MB.
250bytes is smaller than 0.5MB.
50GB is larger than 100MB.
1TB is smaller than 4GB.
[4]

6 Five statements about serial half-duplex data transmission are shown in the table below.
Tick (√) to show whether each statement is true or false. [5]

true false
Statement
(√) (√)

Data is transmitted in one direction only, one bit at a time.

Data is transmitted in both directions, multiple bits at a time.

Data is transmitted in one direction only, multiple bits at a time.

Data is transmitted in both directions, but only one direction at a


time. Data is transmitted one bit at a time.
Data is transmitted in both directions, but only one direction at a
time. Data is transmitted multiple bits at a time.
5

7 (a) Parity checks are often used to detect errors that may occur during data transmission.
The received bytes in the table below were transmitted using odd parity.

Tick (√) to show whether each byte has been corrupted during transmission or not corrupted
during transmission.

not corrupted
corrupted during
during
Received byte transmission
transmission
(√)
(√)

10110100

01101101

10000001
[3]

(b) Another method of error detection is Automatic Repeat reQuest (ARQ).

Explain how ARQ is used in error detection.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.................................................................................................................................................. [4]

8 The given paragraph describes how data is encrypted using symmetric encryption.

Complete the missing terms in the paragraph using the given list.

Not all terms need to be used.


6

 a different
 cipher text
 decrypted
 lock
 meaningless
 plain text
 the same
 encryption

Before encryption the data is known as ………………………………………………. . This data is encrypted

using an algorithm that is known as a ……………………………………………… . After the data has been

encrypted it is known as …………….............................................…….. . This type of data is scrambled

and ……………………………....…………… if it is stolen. When the data is received it is

..................................................... using …………………………………….....…… encryption algorithm.

[6]

9 Data can sometimes be corrupted when it is transmitted from one computer to another, causing errors
to be present in the data.

Identify and describe two methods of error detection that could be used to see if an error has occurred.

Error detection method 1.................................................................................................................

Description..............................................................................................................................................

................................................................................................................................................................

................................................................................................................................................................

................................................................................................................................................................

................................................................................................................................................................[3]

Error detection method 2.................................................................................................................

Description..............................................................................................................................................

................................................................................................................................................................

................................................................................................................................................................

................................................................................................................................................................

................................................................................................................................................................[3]
7

10 The following text is stored as a text file:

She sells sea shells on the seashore. The shells that she sells are sea shells I am sure.

Explain how lossless compression would compress this file.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.........................................................................................................................................................[3]

11 Carla’s computer has a USB port. Carla uses the USB port to connect her mobile device to her
computer, to transfer her videos.

(a) Give three benefits of using a USB port to connect the mobile device to the computer.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Benefit 3 ...................................................................................................................................

................................................................................................................................................. [3]

(b) State the type of data transmission used when transferring data using a USB port.

............................................................................................................................................. [1]
8

(c) Carla wants to reduce the file size of the videos she has transferred to her computer. She does

not want the quality of the videos to be reduced, so she uses lossless compression.

Describe how lossless compression reduces the file size of the videos.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................[4]

12 (a) Identify the name and draw the single logic gate that can replace the given logic circuits.
9

(b) Draw logic gate diagram of AND gate and write the Boolean expression.

Logic gate diagram


[1]

Boolean Expression ………………………………………………………………………….. [1]

(b) Complete the truth table for the NOR gate.

A
X
B

A B Output (X)

0 0

0 1

1 0

1 1
[4]

(d) Draw a NAND logic gate and write truth table for NAND logic gate with its boolean
and logical expression.

[6]
10

BLANK PAGE

You might also like