Computer Midterm C1-2024
Computer Midterm C1-2024
CANDIDATE INFORMATION
Cambridge Ordinary Level
Name:
End of Year Examination , Oct/Nov 2024 Paper/Subject: Computer
READ THESE INSTRUCTIONS FIRST Code: 2210
Write your name on all the work you hand in. Write in dark blue or Class: Cambridge-I
black BALLPOINT pen. You may use an HB pencil for any diagrams Section: ____________________
Time: 3 Hours
or graphs. Do not use staples, paper clips, glue or correction fluid.
show your working or if you do not use appropriate units. The number
Teacher’s Remarks
of marks is given in brackets [ ] at the end of each question or part
____________________________
question.
____________________________
____________________________
____________________________
Staple here
____________________________
____________________________
____________________________
____________________________
____________________________
____________________________
Turn over
1
1 Humans use a denary number system and computers use a binary number system.
...............................................................................................................................................................
...............................................................................................................................................................
...............................................................................................................................................................
............................................................................................................................................................[2]
...............................................................................................................................................................
...............................................................................................................................................................
...............................................................................................................................................................
............................................................................................................................................................[2]
17 ..............................................................................................................................................
59 ..............................................................................................................................................
247 ............................................................................................................................................
[6]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
12 ..............................................................................................................................................
28 ..............................................................................................................................................
65 ............................................................................................................................................
[6]
2
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.................................................................................................................................................. [2]
1 1 1 0 0 0 1 1
(a) Give the denary number for the binary number stored in the register.
............................................................................................................................................. [1]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) Give the hexadecimal number for the binary number stored in the register.
............................................................................................................................................. [2]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3
(c) A logical left shift of two places is performed on the binary number stored in the register.
Complete the binary register to show its contents after this logical left shift.
[1]
(d) Write the new denary number after this logical shift.
.................................................................................................................................................. [1]
(e) Add the two 8-bit binary numbers, using binary addition. Give your answer in binary.
11100011
01001100
[2]
3 Computers use a character set to convert text into binary. One character set that can be used is ASCII.
Each letter in ASCII can also be represented as a denary value and converted into binary and
hexadecimal.
Denary value of Letter A is 65, Complete the given table. The first one has been done for you.
Letter Q D P S
Denary 81
Value
Binary
Conversion 01010001
(8-bit)
Hexadecimal 51
Conversion
[15]
4
Jafar remembers that hexadecimal is often used to represent binary values in error codes.
Convert the hexadecimal number in the error message into 12-bit binary.
[3]
(b) Identify two other ways that hexadecimal is used in computer science.
Use1...........................................................................................................................................
...................................................................................................................................................
Use2...........................................................................................................................................
................................................................................................................................................... [2]
5 Steffi has a number of files of different sizes that contain her work.
true false
Statement
(√) (√)
47KB is larger than 10MB.
250bytes is smaller than 0.5MB.
50GB is larger than 100MB.
1TB is smaller than 4GB.
[4]
6 Five statements about serial half-duplex data transmission are shown in the table below.
Tick (√) to show whether each statement is true or false. [5]
true false
Statement
(√) (√)
7 (a) Parity checks are often used to detect errors that may occur during data transmission.
The received bytes in the table below were transmitted using odd parity.
Tick (√) to show whether each byte has been corrupted during transmission or not corrupted
during transmission.
not corrupted
corrupted during
during
Received byte transmission
transmission
(√)
(√)
10110100
01101101
10000001
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.................................................................................................................................................. [4]
8 The given paragraph describes how data is encrypted using symmetric encryption.
Complete the missing terms in the paragraph using the given list.
a different
cipher text
decrypted
lock
meaningless
plain text
the same
encryption
using an algorithm that is known as a ……………………………………………… . After the data has been
[6]
9 Data can sometimes be corrupted when it is transmitted from one computer to another, causing errors
to be present in the data.
Identify and describe two methods of error detection that could be used to see if an error has occurred.
Description..............................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................[3]
Description..............................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................
................................................................................................................................................................[3]
7
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.........................................................................................................................................................[3]
11 Carla’s computer has a USB port. Carla uses the USB port to connect her mobile device to her
computer, to transfer her videos.
(a) Give three benefits of using a USB port to connect the mobile device to the computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
................................................................................................................................................. [3]
(b) State the type of data transmission used when transferring data using a USB port.
............................................................................................................................................. [1]
8
(c) Carla wants to reduce the file size of the videos she has transferred to her computer. She does
not want the quality of the videos to be reduced, so she uses lossless compression.
Describe how lossless compression reduces the file size of the videos.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................[4]
12 (a) Identify the name and draw the single logic gate that can replace the given logic circuits.
9
(b) Draw logic gate diagram of AND gate and write the Boolean expression.
A
X
B
A B Output (X)
0 0
0 1
1 0
1 1
[4]
(d) Draw a NAND logic gate and write truth table for NAND logic gate with its boolean
and logical expression.
[6]
10
BLANK PAGE