0% found this document useful (0 votes)
32 views118 pages

OCRComputer Science Comp 1 Res Pack

Uploaded by

xxsunsetstingxx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views118 pages

OCRComputer Science Comp 1 Res Pack

Uploaded by

xxsunsetstingxx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 118

OCR o

A-Level
Computer Science
Component 1
Computer Systems
Copyright Notice

All material is Copyright ICT Interactive unless otherw is e stated. Each worksheet can be photocopied
within the purchasing institute as long as they remain at the institute which made the initial purchase.
No form of this resource can be transmitted electronic ally, digitally, mechanically, paper based, or
otherwise outside the purchasing institute w ithout prior permission of the publisher or author.

Microsoft Windows, Windows NT, Vista, XP, Seven/Eight, Office 2003, Office 2007/2010 and/or other
Microsoft's products referenced are either trademarks or regis tered trademarks of Microsoft.
Macromedia/Adobe and/or other such Adobe products referenced are either trademarks or registered
trademarks of Adobe.

Disclaimer

This resource has been created for educational purposes only .

The publisher or author has tried their very best to ensure that the resource pac k is accurate and up-
to-date. However, the publisher or author takes no responsibility if any of the information content is
inaccurate or incorrect that may contradict or mislead in anyway at the time w hen the resource was
published. The publisher and author specif ically dis claim any responsibility for any liability, loss, or
risk, personal or otherwise, which is incurred as a consequence, directly or indirectly, of the use and
application of any of the contents of this resource. For purposes of illustrating the content and
techniques described in this resource, the author has created variety of names, company names,
mailing, e-mail and internet addresses, phone and fax numbers and similar information, all of w hic h
are fictitious. Any organiz ation, website or software application referenced in this resource is not an
endorsement by the publisher or author. Any websites referred to within this resource may have
changed at the time of publishing and reading of this resource.

The publisher or author cannot guarantee that the content in the resource w ill help, assist and
progress the learning of the purchaser and/or institute including students/learners/teachers in any
formal or informal exams or coursework practices. The purchasers own self judgement must be used
to ensure information is understood, delivered, used responsibly, appropriately and effectively . It is
the sole discretion and responsibility of the subject teacher/purchaser who will determine how , when
and decide the best method of using the resource pack relating to any form of examination,
coursework or lesson/class.

Every effort has been made to ensure all images are acknowledged and referenced accordingly. ICT
Interactive will be happy to amend any details or make special arrangements to whom copyright
holder has not been contacted.

ICT Interactive is not affiliated w ith AQA, OCR, Edexcel or any other exam board or priv ate/corporate
institute.

Acknowledgement

The content in the book refers to either a specif ication or softw are application and all intellectual
property rights of the software/specif ication are owned by that institute/organis ation. The publisher or
author neither accepts responsibility of ownership of the softw are application and/or specific ation as
their own.

For further details of Acknowledgements/Disclaimers please refer to the ICT Interactive website.

Copyright © ICT Interactive


OCR COMPUTER SCIENCE

Content

This Resource Pack 6


How to use 6
Learning Content 6
What’s the Unit About 6
How is the Unit Assessed 6

1.1 The characteristics of contemporary processors

1.1 CPU 9
1.2 Structure of a CPU 10
1.3 Components of a CPU 11
1.4 CPU Register 12
1.5 Fetch, Execute, Decode Cycle 13
1.6 Von Neumann 14
1.7 Von Neumann Architecture 15
1.8 Factor Affect Performance of a PC 16
1.9 Pipelining 17
1.10 Architecture 18
1.11 RISC / CISC 19
1.12 GPU 20
1.13 GPU’s Vs CPU’s 21
1.14 Secondary Storage Media 22
1.15 Storage Devices 23
1.16 Types Storage Media 24
End of Chapter Questions 25

1.2 Software and software development

2.1 Operating System 27


2.2 Functions of an Operating System 28
2.3 Interrupt Handling 29
2.4 Scheduling 30
2.5 Memory Management 31
2.6 Types System Software 32
2.7 Types of Systems Applications 33
2.8 Other Types of Software 34
2.9 Assembler, a compiler and an interpreter 35
2.10 Stages of Compilation 36
2.11 Linkers and Loaders 37
2.12 System Development Life Cycle 38
2.13 Waterfall Model 39
2.14 Spiral Model 40
2.15 Procedural Languages 41
2.16 Assembly Language 42
2.17 Little Man Computer 43
2.18 What is Pseudocode? 44
End of Chapter Question 45

Comp
1
COMPUTER SYSTEMS - 3
OCR COMPUTER SCIENCE

1.3 Exchanging data

3.1 Lossy Vs Lossless 47


3.2 Encryption 48
3.3 Hashing 49
3.4 Database 50
3.5 Normalisation 51
3.6 Entity Relationship Diagram 52
3.7 Primary and Foreign Keys 53
3.8 DBMS 54
3.9 SQL 55
3.10 Transaction Processing 56
3.11 Databases 57
3.12 Characteristics of Networks 58
3.13 Network Hardware/Software 59
3.14 Packet Switching 60
3.15 Protocols 61
3.16 Network Protocols 62
3.17 Data Transmissions 63
3.18 Antivirus Software 64
3.19 Firewall Software 65
3.20 Web Technologies 66
3.21 Page Rank Algorithms 67
End of Chapter Questions 68

1.4 Data types, data structures and algorithms

4.1 Units 70
4.2 What is Binary? 71
4.3 What is Hexadecimal? 72
4.4 What is ANSI/Unicode? 73
4.5 Data Representation In Binary Form 74
4.6 Binary Calculations 75
4.7 Bitwise manipulation and masks 76
4.8 Floating Point Arithmetic 77
4.9 Arrays 78
4.10 Boolean Logic 79
4.11 Karnaugh Map 80
4.12 De Morgan’s Law 81
4.13 Logic Gates and Truth Tables 82
4.14 Understanding Logic Gates and Truth Tables 83
4.15 D Flip Flops 84
End of chapter Questions 85

1.5 Legal, moral, cultural and ethical issues

5.1 Legislation 87
5.2 Understanding the Data Protection Act 88
5.3 Understanding the Computer Misuse Act 89
5.4 Data Protection Act 90
5.5 Computer Misuse Act 91

Comp
1
COMPUTER SYSTEMS - 4
OCR COMPUTER SCIENCE

5.6 Regulation of Investigatory Powers Act 2000 92


5.7 Copyright and Patent Act 93
5.8 Computer in the Workforce 94
5.9 Automated decision making 95
5.10 Censorship on the Internet 96
5.11 Artificial Intelligence 97
5.12 Types of Issues 98
End of Chapter Questions 99

Worksheet Answers

Page number based on when the answer begin

1.1-1.16 101
2.1-2.18 104
3.1-3.21 108
4.1-4.15 113
5.1-5.12 115

Comp
1
COMPUTER SYSTEMS - 5
OCR COMPUTER SCIENCE

THANK YOU FOR PURCHASING THIS RESOURCE


ICT I nteractive would like to thank you very much for purchasing this resource
and w e hope you are fully satisfied.

About the Resource Pack

This resource pack has been designed to help students learn and support
teachers in delivery of OCR GCE Computer Science (H446) at KS5

General Comments on using the Resource Pack

The resource pack can be used as a comprehensive teaching tool to support


existing schemes or resources from the purchasing institute. The resource pack
covers all of the learning and assessment objectives of the qualification and unit
covered. Teachers can use the resource pack as introduction to the
qualification, either as starter, main, plenary activities or as homework sheets to
extend the learning in the classroom. All Worksheets have been designed to
incorporate differentiation and cater for learners of all abilities.

Summary Disclaimer

The publisher or author cannot guarantee that the content in the resource pack
will help, assist and progress the learning of the purchaser and/or institute
including students/learners/teachers in any formal or informal exams or
coursework practices. The purchasers own self judgement must be used to
ensure information is understood, delivered, used responsibly, appropriately and
effectively. I t is the sole discretion and responsibility of the subject teacher who
will determine how, when and decide the best method of using the resource
pack relating to any form of examination, coursework or lesson/class.

Feedback

Please provide us feedback by visiting our website or sending an email to


[email protected].

Request a Resource

If you have any suggestions or recommendations for a new resource, please do


not hesitate in contacting us. We will be very happy to produce resources based
on your request. Please send all requests to [email protected]

Register your email

Register your email to receive free future updates and other resources from I CT
Interactive

Comp
1
COMPUTER SYSTEMS - 6
OCR COMPUTER SCIENCE

This Resource Pack

This book has been designed as a resource pack to support the delivery of Comp1
Computer Systems for OCR Computer Science (Level 3) H446 Specification 2015.

How to use

The resource contains full content coverage of the specification and matches the
requirements exactly. Each worksheet has been designed to ensure a mixture of content
and learning activities for students to complete. The worksheets can be set as starter,
main or plenary activities or as homework or as a complete revision booklet in preparation
for the unit.

Learning Content
The characteristics of contemporary processors, input, output and storage devices

 Software and software development


 Exchanging data
 Data types, data structures and algorithms
 Legal, moral, cultural and ethical issues

About the Unit


This component will introduce learners to the internal workings of the Central Processing
Unit (CPU), the exchange of data and will also look at software development, data types
and legal and ethical issues. It is expected that learners will draw on this underpinning
content when studying computational thinking, developing programming techniques and
devising their own programming approach in the Programming project component (03 or
04). Learners will be expected to apply the criteria below in different contexts including
current and future uses of the technologies.

How is the qualification assessed?


The A Level in Computer Science is a linear qualification with 100% terminal external
assessment. This qualification consists of two examined components (01 and 02),
externally assessed by OCR and one internally assessed and moderated non exam
assessment component (03 or 04). Both examinations are of 2 hours and 30 minutes
duration, each with a 40% weighting. The non-exam assessment component weighted at
20%.

Comp
1
COMPUTER SYSTEMS - 7
OCR COMPUTER SCIENCE

1.1 The characteristics of


contemporary processors, input,
output and storage devices

Comp
1
COMPUTER SYSTEMS - 8
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.1 CPU

Activity

1. Name each type of CPU

a) b) c)

2. Explain the purpose of a CPU:

...........................................................................................................................................................

...........................................................................................................................................................

3. Explain two main features of the CPU

Feature 1

...........................................................................................................................................................

...........................................................................................................................................................

Feature 2

...........................................................................................................................................................

...........................................................................................................................................................

3. Explain the importance of the register:


Comp
...........................................................................................................................................................
1
...........................................................................................................................................................
COMPUTER SYSTEMS - 9
...........................................................................................................................................................
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.2 Structure of a CPU

Activity

Look at the following diagram of a CPU: Explain each key component: Useet
the following words, Memory, Control Unit, ALU, Accumulator [4]

a)
b)

c)

d)

QUESTIONS

1. Explain the purpose of the ALU: [4]

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 10
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.3 Components of a CPU

Activity

1. What do the following components within a CPU stand for: [7]

ALU

...........................................................................................................................................................

PC

...........................................................................................................................................................

MAR

...........................................................................................................................................................

MDR

...........................................................................................................................................................

CIR

...........................................................................................................................................................

CU

...........................................................................................................................................................

IR

...........................................................................................................................................................

2. What is the purpose of the cache within the CPU:

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Give two advantages for Cache:

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 11
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.4 CPU Register

Activity
Complete the following fill in the blanks activity:

A …………………… register is a small amount of storage available as part of a CPU or


other ………………. processor. Such registers are (typically) ……………….. by
mechanisms other than main ……………… and can be accessed more quickly. Almost
all computers, load-store …………………. or not, load …………. from a larger
………………. into ………………… where it is used for …………………. manipulated, or
tested, by some machine instruction

Use the following words: digital, processor, memory, registers, architecture, addressed,
arithmetic, memory, data

Questions

1. Explain the register:

...........................................................................................................................................................

....................................................................................................................................................... [1]

2. Explain two main features of the register

Feature 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Feature 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Explain the importance of the register:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 12
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

1.5 Fetch, Execute, Decode Cycle


1. Fetch Cycle - The fetch cycle begins with retrieving the
address stored in the Program Counter (PC). The address
stored in the PC is some valid address in the
memory holding the instruction to be executed.
(In case this address does not exist we would
end up causing an interrupt or exception).The
Central Processing Unit completes this step by fetching the instruction stored at this
address from the memory and transferring this instruction to a special register -
Instruction Register (IR) to hold the instruction to be executed. The program counter is
incremented to point to the next address from which the new instruction is to be
fetched.
2. Decode Cycle - The decode cycle is used for interpreting the instruction that was
fetched in the Fetch Cycle. The operands are retrieved from the addresses if the need
be.
3. Execute Cycle - This cycle as simply executes the instruction that was fetched and
decoded

QUESTIONS

1. What is the fetch, decode and execute cycle?

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

2. Describe what happens in the fetch cycle:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. What does PC and IR stand for?

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 13
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.6 Von Neumann

QUESTIONS

Important features of the Von Neumann architecture include:

both instructions (code) and data (variables and input/output) are stored in memory
memory is an collection of binary digits (bits) that have been organized into bytes, words,
and regions with addresses
the code instructions and all data have memory addresses
to execute each instruction, it has to be moved to registers

1. Who is Von Neumann?

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

2. Explain Von Neumann Architecture:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Explain two key features of Von Neumann Architecture:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Give one advantage to Von Neumann Architecture:

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 14
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.7 Von Neumann Architecture

b)

a)

QUESTIONS

1. Explain how the following components function within the Von Neumann’s diagram:

Logic Unit

...........................................................................................................................................................

....................................................................................................................................................... [2]

Program Control Unit

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 15
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

1.8 Factor Affect Performance of a PC

Activity
Using the table below, explain each type of computer architecture: [2]

Types Explanation Factors / Performance


clock speed

CPU Cores

Cache

Comp
1
COMPUTER SYSTEMS - 16
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.9 Pipelining

Activity

Complete the following fill in the blanks activity:

Pipelining is an ………………….. technique where multiple ……………….are


overlapped in ……………………. The computer pipeline is …………………. in stages.
Each stage ………………….. a part of an instruction in ………………..The stages are
connected one to the next to …………….. a pipe - instructions enter at one end,
………… through the stages, and exit at the other end.
Pipelining does not decrease the time for individual ……………….. execution. Instead, it
………………….. instruction throughput. The ……………… of the instruction pipeline is
determined by how often an instruction exits the pipeline .

Use the words: increases parallel. execution , Implemented, instruction, instruction,


throughput, progress, form, divided, completes

Questions

1. What is pipeling:

a) Pipelining is where instructions are mapped before execution.


b) Pipelining is where instructions are cached in order for execution.
c) Pipelining is where instructions are overlapped in execution.
d) Pipelining is where instructions are continuously executed

2. Explain how instructions are used in pipelining?

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Give two advantages of pipeling?

Advantage 1

...........................................................................................................................................................

....................................................................................................................................................... [2]

Advantage 2

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 17
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.10 Architecture
Activity

Define the following terms by completing the sentence: [1]

1. Computer Architecture is

............................................................................................................................................................

2. Features of Von Neumann are

............................................................................................................................................................

3. ALU stands for

............................................................................................................................................................

4. MAR stands for

............................................................................................................................................................

5. PC Stands for

............................................................................................................................................................

6. CISC stands for

............................................................................................................................................................

7. RISC stands for

............................................................................................................................................................

8. Fetch performs

............................................................................................................................................................

9. Execute performs

............................................................................................................................................................

10. CPU stands for

............................................................................................................................................................

............................................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 18
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.11 RISC / CISC

Activity

Complete the following fill in the blanks activity:

RISC, or Reduced ………………… Set Computer. is a type of microprocessor


…………………….. that utilizes a small, highly-optimized ……….. of instructions,
………………. than a more ……………. set of instructions often found in other types of
architectures.

Use the words: specialized, set Instruction, architecture, rather

Questions

1. What does RISC and CISC stand for:

...........................................................................................................................................................

....................................................................................................................................................... [2]

2. Explain RISC/CISC Architecture:

RISC

...........................................................................................................................................................

....................................................................................................................................................... [1]

CISC

...........................................................................................................................................................

....................................................................................................................................................... [1]

4. Give two advantage of using RISC/CISC architecture

Advantage 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Advantage 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 19
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

1.12 GPU

Activity

Complete the following fill in the blanks activity:

GPU-………………….. computing is the use of a ……………….. processing unit (GPU)


together with a CPU to accelerate ……………….., analytics, engineering,
……………………….., and enterprise applications. GPU accelerators now power energy-
efficient ………………….in …………………… labs, universities, …………………, and
small-and-medium businesses around the ………………….. GPUs are accelerating in
platforms ranging from, to mobile …………… and tablets, to ……………….and robots.

Use the following words: datacenters phones drones applications world. enterprises,
government scientific accelerated, graphics, cars, consumer

Questions

1. What does GPU stand for

e) Gradient Processor Unit


f) Graph Processor Unit
g) Graphic Processor Unit
h) Graph Processor Unit

2. Explain the main functions of the following types:

GPU

...........................................................................................................................................................

....................................................................................................................................................... [1]

CPU

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Name and explain two devices which use GPU processors

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

...........................................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 20
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

1.13 GPU’s Vs CPU’s


Activity

Complete the following fill in the blanks activity

A simple way to understand the ……………….. between a ………… and ……………… is


to compare how they process tasks. A CPU consists of a few ………………. optimized
for …………… serial processing while a GPU has a massively………………. architecture
consisting of ………………… of smaller, more ………………. cores designed for
handling ………………… tasks simultaneously. GPUs have thousands of cores to
……………….parallel ……………………. efficiently

Use the follow words: multiple, workloads sequential difference, CPU, GPU, cores
parallel, thousands, process, efficient

Questions

1. What do GPU and CPU stand for?

....................................................................................................................................................... [1]

2. Explain the difference between a CPU and a CPU:

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Explain the main functions of a GPU:

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 21
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

1.14 Secondary Storage Media

Activity
Look at the following table and identify a problem, explain how different
input, output and storage devices can be applied to a problem.

Types Problem Device and Applied


Input

Output

Storage

Comp
1
COMPUTER SYSTEMS - 22
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

1.15 Storage Devices

Activity
Look at the following images; identify as many different storage devices as
you can: [6]

b)
a)

c)

d) g)
e) f)

Questions

1. Explain what storage devices are:

............................................................................................................................................................

........................................................................................................................................................[2]

2. Give two purposes of storage devices:

............................................................................................................................................................

........................................................................................................................................................[2]

Comp
1
COMPUTER SYSTEMS - 23
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

1.16 Types Storage Media

Activity
Look at the following table of storage devices/media. For each
device/media, give one advantage/disadvantages: [6]

Types Advantage Disadvantages


Hard Drive

Cd/DVD Rom

USB/Flash
Drive

Comp
1
COMPUTER SYSTEMS - 24
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

Activity

Using the Internet and other sources of information, answer ALL questions:

Questions

1.1.1 - Structure and function of the processor

1. Explain the key components of a CPU:


2. Draw a diagram of the components of a CPU
3. Explain how the ALU and PC functions
4. Explain how pipelining in a processor improve its efficiency.
5. Explain the key features of Von Neumann
6. Explain the key features of Harvard and contemporary processor architecture.
7. Give two different between Von Neumann and Harvard architecture

1.2.1 Types of processor

8. Give the main differences between and uses of CISC and RISC processors.
9. Explain the main different between GPUs and their uses to a CPU
10. Explain how multicore and parallel systems operate

1.3.1 Input, output and storage

11 List as many input, output and storage devices.


12 Explain the uses of magnetic, flash and optical storage devices including speeds, size,
security and reliability.
13 What is the main different between RAM and ROM.?
14 What is Virtual storage?

Extension: List areas which you need to revise and further develop your understanding

Comp
1
COMPUTER SYSTEMS - 25
OCR COMPUTER SCIENCE

1.2 Software and software


development

Comp
1
COMPUTER SYSTEMS - 26
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.1 Operating System


Activity

Complete the following fill in the blanks activity:

An operating ……………. or "OS," is software that ………………….. with the hardware


and allows other ………………….. to run. It is comprised of ……………… software, or
the fundamental files your computer needs to ……… ………. and function. Every
desktop computer, ………………… and ……………….. includes an operating system
that provides basic …………………… for the device

Use the following words: functionality Smartphone tablet, system, programs,


communicates, system, boot up

Questions

1. Which of the following statement describes an OS

a) A program which runs other programs in a computer


b) A program which provides access to both hardware and software in a computer
c) A program which allows you to view the Internet
d) A program which operates a keyboard

2. Explain the main functions of an OS:

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Explain why computer systems require operating system:

...........................................................................................................................................................

....................................................................................................................................................... [1]

4. Give two examples of operating system:

Example1

....................................................................................................................................................... [1]

Example 2

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 27
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.2 Functions of an Operating System

A computer is made up of hardware and software that includes an


operating system. The operating system has many functions .

Activity

Look at the following computer and name four key functions of an OS: [4]

a)

b)

c) d)

QUESTIONS

1. Explain two key functions of an Operating System: [4]

Memory Management .......................................................................................................................

....................................................................................................................................................... [1]

File Management ...............................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 28
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.3 Interrupt Handling


Activity

Complete the following fill in the blanks activity:

An interrupt is a …………………. to the …………………….. emitted by hardware or


………………. indicating an event that needs ……………….. attention. An interrupt
alerts the processor to a high-……………… condition requiring the ……………….. of the
current …………………. the processor is executing. The processor responds by
…………………….. its current………………….., saving its…………… , and executing a
function called an interrupt handler (or an interrupt ………………. routine, ISR) to deal
with the event. This interruption is…………………, and, after the interrupt ……………..
finishes, the processor resumes ……………… activities

Use the words: processor, signal, interruption, priority, suspending, software, immediate,
state, service, handler, normal, activities, code, temporary

Questions

1. What is interrupt handling?

a) A event signalled to the processor by an application software


b) A event assigning an instruction to the processor by a hardware device
c) A event assigning an instructions to the processor by the operating system
d) A event signalled to the processor by hardware/software to be processed

2. Explain how OS performs interrupting handling:

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Give two examples of interrupt handling within an OS:

Example 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Example 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 29
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.4 Scheduling

Activity

Complete the following fill in the blanks activity:

Scheduling is the ……………… by which a specific ……………….. is assigned


resources that needs completing. The process scheduler is the component of the
operating system that is ………………… for deciding whether the currently
…………………. process should continue running. The ………………… may be virtual
…………………… elements such as………………… , processes or data flows, which
are in turn scheduled onto ………………. resources such as processors, network links
or ………………. cards. ………………….. are often implemented so they keep all
compute resources busy (as in load……………….. ), allow multiple ………………… to
share system resources effectively, or to achieve a target quality of service.

Use the words: process, responsible, resources, running, method, hardware,


computation, Schedulers, users, threads, balancing, expansion

Questions

1. What is a scheduling?

a) Responsible for deciding whether the current process requires resources


b) Responsible for deciding whether a process should be terminated
c) Responsible for deciding whether the current process needs updating
d) Responsible for deciding whether the currently running process should continue running

2. Explain how the OS schedules functions:

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Name and explain two types of schedulers:

Example 1

...........................................................................................................................................................

....................................................................................................................................................... [2]

Example 2

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 30
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.5 Memory Management


Activity

Complete the following fill in the blanks activity:

The memory ……………………..function keeps track of the …………………. of each


memory location, either ……………………… or free. It determines how memory is
………………. among competing……………………, deciding who gets memory, when
they ……………… it, and how much they are allowed. When ……………….. is
allocated it determines which memory …………………. will be assigned. It tracks when
memory is freed or ……………………. and updates the status.

Use the words: management, status, allocated, allocated, memory, locations


unallocated, processes, receive

Questions

1. Explain the term “Memory Management”?

a) A array which keeps track of the status of each memory location


b) A function which keeps track of the status of each memory location
c) A variable which keeps track of the status of each memory location
d) A construct which keeps track of the status of each memory location

2. Explain how an OS manages memory:

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Give two examples of how an OS allocates memory:

...........................................................................................................................................................

....................................................................................................................................................... [2]

4. Explain Virtual Memory:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 31
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.6 Types System Software

Activity
Look at the following table of software types. Fo each one explain the purpose
and give an example of use [6]

Types Purpose Use/example


Distributed

embedded,

multi-user

multi-
taskin

Comp
1
COMPUTER SYSTEMS - 32
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

2.7 Types of Systems Applications

Activity
Look at the following table of storage devices/media. For each device/media,
give one advantage/disadvantages: [6]

Types Purpose Use/Example


BIOS

Virtual
Storage

Devices
Drivers

Comp
1
COMPUTER SYSTEMS - 33
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.8 Other Types of Software


There are many types of software which are either custom written, off the shelf,
open sourced or proprietary software.

Activity

Look at the following table of different types of software. For each type of software, explain
and give an example: [6]

Software What it is Example


Open Source

Proprietary

Comp
1
COMPUTER SYSTEMS - 34
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

2.9 Assembler, a compiler and an interpreter

Activity

Read the following about an assembler, a compiler and an interpreter

Match up the explanations [3]

Assembler A program that translates programs from assembly


language to machine language.

Interpreter A program that translates source code into object code.


The compiler derives its name from the way it works,
looking at the entire piece of source code and collecting
and reorganizing the instructions.

Compiler A program that executes instructions written in a high-level


language. There are two ways to run programs written in a
high-level language. It translates high-level instructions into
an intermediate form, which it then executes.

1. What is the purpose of the assembler?

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

2. What is the main difference between the compiler and the assembler?

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Give two reasons why source code must be compiled:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 35
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

2.10 Stages of Compilation

Activity

Look at the following table of stages of complication. For each type of software,
explain and give an example: [6]

Stages What it is Example


lexical
analysis

syntax
analysis

code
generation

optimisation

Comp
1
COMPUTER SYSTEMS - 36
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

2.11 Linkers and Loaders

Activity

Look at the following table of linkers and loaders. For each, explain and give an
example: [6]

Software What it is Example


Linkers

Loaders

Comp
1
COMPUTER SYSTEMS - 37
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.12 System Development Life Cycle

Activity

Complete the following fill in the blanks activity:

The systems ……………… life cycle (SDLC) is a ……………….. model used in project
………………….. that describes the stages involved in an ………………………. system
development project, from an initial ……………….. study through ………………….. of
the completed…………………. Various SDLC ……………… have been developed to
guide the processes involved, including the ……………… model (which was the original
SDLC method); …………… application development (RAD); ……………. application
………………….. (JAD)

Use the words: development, conceptual, management, maintenance, application,


waterfall, rapid, joint, development, methodologies, information

Questions

1. What does SDLC stand for?

a) Software Development Life Cycle


b) System Development Life Cycle
c) Status Development Life Cycle
d) Soft Development Life Cycle

2. What does RAD stand for?

a) Realistic Application Development


b) Rapid Application Development
c) Random Application Development
d) Real Application Development

3. What does JAD stand for?

a) Jackson Application Development


b) Java Application Development
c) Joint Application Development
d) Jane Application Development

4. Explain the SDLC model:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 38
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.13 Waterfall Model

Activity

Complete the following fill in the blanks activity:

The Waterfall …………….. was first …………… Model to be introduced. It is also


referred to as a linear- ………………. life cycle model. It is very simple to understand
and use. In a waterfall model, each ……………….. must be completed ……………….
before the …………… phase can begin. This type of model is basically used for the
……………….which is ……………… and there are no …………….. requirements. the
end of each phase, a ……………….. takes place to ………………. if the project is on the
right …………… and ………………… or not to continue or ………………. the project. In
this model the testing starts only after the …………………… is complete. In waterfall
model phases do not overlap.

Use the words: Model, Process, next, path development, sequential, project, determine,
small, discard, whether, review, fully

Questions

1. Which of the following describes the waterfall model?

a) It is a development-sequential life cycle model


b) It is a binary-sequential life cycle model
c) It is a conceptual-sequential life cycle model
d) It is a linear-sequential life cycle model

2. Explain how the SDLC is used in creating software:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Draw the waterfall model: [4]

Comp
1
COMPUTER SYSTEMS - 39
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.14 Spiral Model

Activity

Complete the following fill in the blanks activity:

The spiral model is similar to the ………………. model, with more emphasis placed on
risk……………….. . The spiral model has ………….. phases: Planning, Risk Analysis,
…………….. and……………... A software project repeatedly passes through these
phases in ………………… (called ………………. in this model). The ……………. spiral,
starting in the ……………….. phase, requirements are gathered and ………………. is
assessed. Each …………… spirals builds on the baseline spiral.

Use the words: Evaluation, incremental, analysis, four, Engineering, baseline, iterations,
planning, risk, subsequent, Spirals

Questions

1. Which of the following describes the spiral model?

a) Similar to an waterfall model with emphasis on risk


b) Similar to an conceptual model with emphasis on risk
c) Similar to an incremental model with emphasis on risk
d) Similar to an redundant model with emphasis on risk

2. Explain the phases of the spiral model:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Draw the spiral model: [4]

Comp
1
COMPUTER SYSTEMS - 40
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.15 Procedural Languages

Activity

Complete the following fill in the blanks activity:

Procedural …………………….. is a type of computer programming language that


specifies a series of well-…………………. steps and procedures within its programming
context to ……………… a program. It contains a ……………………………order of
………………, functions and ……………… to complete a …………… task or program.
Examples include, C, C++, …………… , ………………. which are all procedural types of
languages.

Use the words: computational, language, statements, compose, structured, commands,


Python, Pascal, systematic

Questions

1. Which of the following describes procedural languages?

a) Languages that are well structured composing of pragmatic order


b) Languages that are well structured composing of systematic order
c) Languages that are well structured composing of logical order
d) Languages that are well structured composing of functional order

2. Which of the following are procedural languages?

a) HTML, Pascal, C++, Javascript


b) Javascript, Python,Pascal
c) Python, Pascal, Java
d) Python, Javascript, C++

2. Explain procedural languages

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

4. Give one advantage of procedural languages:

Advantage

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 41
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.16 Assembly Language

Activity

Complete the following fill in the blanks activity:

A programming ………………… that is once ………………… from a computer's


machine language. ……………….. languages consist entirely of ………………. and are
……………….. impossible for humans to ………….. and…………….. . Assembly
languages have the same …………… and set of …………………. as machine
languages, but they enable a programmer to use names instead of numbers.

Use the words: removed, Machine, numbers, read, write, structure, commands,
language, almost

Questions

1. Which of the following assembly language?

a) Programming Language consisting entirely of characters and symbols


b) Programming Language consisting entirely of number and letters
c) Programming Language consisting entirely of zeros and ones
d) Programming Language consisting entirely of functions and procedures

2. What is assembly language also known as:

a) Machine Code
b) Binary Code
c) Hex Code
d) Software Code

3. Explain why assembly language is difficult for humans:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

4. Give three examples of assembly language code:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 42
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

2.17 Little Man Computer

Activity

Complete the following fill in the blanks activity:

Developed for use with "The …………………. of Computer Hardware and Software
Systems: An Information ……………………Approach" Second and Third Editions by
Irv………………….. The Little Man Computer (LMC) was created by Dr. ……………....
…………………….. . The LMC models a simple von ……………………. architecture
computer, so it has all of the basic ………………….. of a ………………computer. The
………….. can be programmed in ……………. or …………………… code, and the
following ………………… will allow you to run your programs

Use the words: Madnick, Stuart Englander, Architecture, LMC, machine, assembly,
Technology, simulator, features, modern, Neumann

Questions

1. Which of the following describe the little man computer:

a) LMC can be programmed in C or C++


b) LMC can be programmed in machine or assembly code
c) LMC can be programmed in Binary or Hex
d) LMC can be programmed in windows and android

2. Who invented the little man computer

a) Stuart Madnick
b) Stuart Riley
c) Stuart Samwick
d) Stuart Little

3. Explain how the little man computer functions:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

4. Give three examples of little man computer code:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [3]

Comp
1
COMPUTER SYSTEMS - 43
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

2.18 What is Pseudocode?


Pseudocode is an artificial and informal language that helps programmers
develop algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool.

1.. If student's grade is greater than or equal to 60

Print "passed"
else
Print "failed"

QUESTIONS

1. What is Pseudo Code?

............................................................................................................................................................

............................................................................................................................................................

........................................................................................................................................................[2]

2. Explain the above Pseudo code:

............................................................................................................................................................

............................................................................................................................................................

........................................................................................................................................................[1]

3. Give two advantages for using Pseudo Code to program:

............................................................................................................................................................

............................................................................................................................................................

........................................................................................................................................................[2]

Comp
1
COMPUTER SYSTEMS - 44
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

Activity

Using the Internet and other sources of information, answer ALL questions:

Questions

1.2.1 Systems Software

1. Explain the need for, function and purpose of operating systems.


2. Describe how an OS Memory Management (paging, segmentation and virtual memory)
functions
3. Interrupts, the role of interrupts and Interrupt Service Routines (ISR), role within the Fetch
Decode-Execute Cycle.
4. Scheduling: round robin, first come first served, multi-level feedback queues, shortest job first
and shortest remaining time.
5. Explain the different between Distributed, embedded, multi-tasking, multi-user and Real Time
operating systems.
6. Give four key functions of the BIOS.
7. What is the primary function of Device drivers?
8. What are Virtual machines?

1.2.2 Applications Generation

9. Explain the nature of applications, justifying suitable applications for a specific purpose.
10. List five different software Utilities.
11Give three differences of Open source vs closed source.
12. Explain how a translator: Interpreters, compilers and assembler function
13. What are the stages of compilation?
14. Explain each stage when producing coding: lexical analysis, syntax analysis, code
generation and optimisation).
15. How do Linkers and loaders function in programming environment?
16. How are libraries used in a programming language?

1.2.3 Software Development

17. Produce a table that explain the waterfall lifecycle, agile methodologies, extreme
programming, the spiral model and rapid application development.
18. Explain the merits and drawbacks of different methodologies

Extension: List areas which you need to revise and further develop your understanding

Comp
1
COMPUTER SYSTEMS - 45
OCR COMPUTER SCIENCE

1.3 Exchanging data

Comp
1
COMPUTER SYSTEMS - 46
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.1 Lossy Vs Lossless


Activity

Complete the following fill in the blanks activity:

Lossless ……………….., every single bit of ………….. that was originally in the file
remains after the file is…………………. . All of the information is completely restored.
……………….. compression reduces a ………….. by permanently …………………..
certain information, especially …………………information. When the file is
uncompressed, only a part of the ……………….. information is still there (although the
user may not notice it). Lossy compression is generally used for …………….. and
sound

Use the words: compression, data, uncompressed, eliminating, redundant, original,


video, lossy, file

Questions

1. Which of the following describes lossless?

e) Lossless is a type of file compression


f) Lossless keeps every bit of a data of a rile after it is uncompressed
g) Lossless is a compression of data to a file
h) Lossless reduces every bit of data of a file after it is compressed

2. Which of the following describes lossy

a) Lossy is a type of compression which delete bits it does not need


b) Lossy reduces the file size by compressing individual bits
c) Lossy reduced a file by removing certain type of information
d) Lossy compresses a file by adding additional information

3. Give two advantages for using Lossy over lossless compression:

Advantage 1

...........................................................................................................................................................

....................................................................................................................................................... [2]

Advantage 2

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 47
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.2 Encryption
Activity

Complete the following fill in the blanks activity:

Encryption is ……………………. the of electronic data into another form,


called…………………. , which ……………………… be easily understood by anyone
except …………………. parties. The primary ………………… of encryption is to protect
the ……………………. of digital ……………. stored on computer systems or
………………….. via the …………………….. or other …………………….. networks.
Modern encryption …………………… play a vital role in the security assurance of IT
systems

Use the words: conversion, ciphertext, authorized, purpose, confidentiality, algorithms,


computer, transmitted, cannot, Internet, data

Questions

1. Which of the following statement describes encryption?

a) Encryption is a method of downloading a file type


b) Encryption is a type of protecting data by using encryptions algorithms
c) Encryption is a method of changing the structure of a file
d) Encryption protect web pages from hackers

2. Explain one method of encryption:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Give two advantages for encryption:

Advantage 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Advantage 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 48
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.3 Hashing

Activity

Complete the following fill in the blanks activity:

………………. is the ………………….. of a string of ……………………. into a usually


…………………. fixed-length value or key that represents the original…………………….
Hashing is used to …………………….and retrieve items in a ………………. because it
is …………….. to find the …………….. using the shorter hashed ………… than to find it
using the original value. It is also used in many ………………… algorithms.

Use the words: Hashing, transformation, characters, database, faster, shorter, key,
encryption, string, index, item

Questions

1. Which of the following statement describes a hashing?

a) Hashing is the transformation of code into characters


b) Hashing is the transformation of a ISO into characters
c) Hashing is the transformation of a string of characters
d) Hashing is the transformation of a variable of characters

2. Explain one method of hashing

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Give two advantages for the use of hashing

Advantage 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Advantage 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 49
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.4 Database

Activity

Complete the following fill in the blanks activity:

A …………………. is a data structure that ………………. Organized…………………...


Most databases contain ………………. tables, which may each include ……………….
different fields. For example, a ………………. database may include tables for
…………………, employees, and ……………… records. Each of these ………………..
would have different ……………… that are ………………… to the information
…………………. in the table

Use the words: database, stores, information, multiple, company, products, financial,
relevant, tables, fields, stored, several

Questions

1. Which of the following statement describes a database?

a) A software application that holds data


b) A software application consisting of tables, forms, queries and reports
c) A program that just sorts a file
d) A software program used to collect images

2. Explain one method designing a database:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Give two advantages for normalisation when designing a database:

Advantage 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Advantage 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 50
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.5 Normalisation
Activity

Complete the following fill in the blanks activity:

…………………. usually involves …………….. a database into two or more


……………….. and defining ……………… between the tables. The objective is to
………………. data so that additions, …………….. , and modifications of a …………….
can be made in just one table and then ……………….. through the rest of the database
via the defined relationships.

Use the words: Normalization, dividing, tables, relationships, deletions, deletions, field,
propagated, isolate

Questions

1. What is a normalisation?

a) A process of adding to a database into two or more tables


b) A process of changing a database into ten or more tables
c) A process of dividing a database into two or more tables
d) A process of deleting database into two or more tables
2. Explain how normalisation and data modelling are effective in database development

...........................................................................................................................................................

....................................................................................................................................................... [2]
3. Explain the process of the following normalisation:
1NF

...........................................................................................................................................................

....................................................................................................................................................... [1]

2NF

...........................................................................................................................................................

....................................................................................................................................................... [1]

3NF

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 51
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.6 Entity Relationship Diagram


Activity

Complete the following fill in the blanks activity:

An entity-…………………. diagram (ERD) is a ………………… representation of an


information ……………….. that shows the relationship between people, objects, places,
…………………… or events within that system. An ………….. is a data …………………
technique that can help define ……………….. processes and can be used as the
…………………….. for a ……………………. database. There are three types,
…………………… (1:1). One-to-many (1:M). and ……………………. (M:N).

Use the words: One-to-one , relationship, graphical, system, modeling, business,


foundation, relational, Many-to-many, concepts, ERD

Questions

1. What does ERD stand for?

a) Eternal relationship diagram


b) External relationship diagram
c) Entity relationship diagram
d) A program which operates a keyboard

2. Draw the following ERD symbols: [3]

1 to 1 ............................................................................................................................ .

Many to 1 ............................................................................................................................ .

Many to Many ........................................................................................................................... .

3. Draw an example of an ERD for a Online Streaming Movies Database that include tables
called, customers, Online Streams (Movies) and Sales [4]

Comp
1
COMPUTER SYSTEMS - 52
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.7 Primary and Foreign Keys

Activity

Complete the following fill in the blanks activity:

A …………………. key is a unique identifier for a database ………………... When a


……………….. is created, one of the fields is typically ……………. as the primary key.
While the primary ……………… is often a ………………. , it may also be a ……………
field or other ……………. type. For example, if a …………………. contains definitions
of ……………………. terms, it would make ………….. that each term is only listed once
in the database. By ……………….. the "Term" field as ………. primary key, it would
ensure that no term is ……………… more than once in the database.

Use the words: primary, assigned, number, database, defining, record, text, listed,
sense, key, data, table, the, computer

Questions

1. What is a primary key?

...........................................................................................................................................................

....................................................................................................................................................... [1]

2. What is a foreign key?

a) A primary key within the same table


b) A foreign key within the same table
c) A primary key within another name
d) A primary key with a structured defined data type

3. Give two advantages for using a primary key in a database:

Advantage 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Advantage 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 53
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.8 DBMS

Activity

Complete the following fill in the blanks activity:

A …………………. of programs that enables you to store, modify, and extract


………………… from a database. There are many different types of …………………….
, ranging from small …………………….that run on ………………… computers to huge
systems that run on…………………… . The following are examples of database
applications: computerized ……………….. systems, automated …………………
machines, flight …………………. systems and computerized parts inventory systems

Use the following words: DBMSs, collection, reservation, mainframes, systems, library,
teller, information, personal

Questions

1. What does DBMS stand for

a) Distinctive Management System


b) Database Memory System
c) Database Management System
d) Database Modular System

2. Explain the difference between DBMS and a standard database:

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Give two advantages for a DBMS:

Advantage 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Advantage 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 54
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.9 SQL
Activity

Complete the following fill in the blanks activity:

………….. (Structured ……………….. Language) is a standard interactive and


programming ………………………. for getting information from and ……………..…. a
……………………... Although SQL is both an ………………. and an ISO standard, many
database products support SQL with …………………. extensions to the
……………………… language. ……………………… take the form of a ………………….
language that lets you select, insert, update, find out the …………………… of data, and
so forth. There is also a programming interface.

Use the words: Query, SQL, updating, language, ANSI, proprietary, standard, command,
location, Queries, database

Questions

1. SQL Stand for:

a) Structured Query Language


b) Style Ouery Language
c) System Query Language
d) Sort Query Language

2. Explain the purpose of SQL within a database:

...........................................................................................................................................................

....................................................................................................................................................... [1]

3. Give two examples of the use of SQL in a database environment:

Example 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Example 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 55
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.10 Transaction Processing

Activity
Look at the following table that include types of transaction processing.
For each type give a brief explanation the purpose and example of
use[6]

Type Purpose Example/Use


Acid
(Atomicity,
Consistency,
Isolation,
Durability

record
locking and

redundancy

Comp
1
COMPUTER SYSTEMS - 56
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.11 Databases

Activity

Define the following terms by completing the sentence: [1 each]

1. A database is

............................................................................................................................................................

2. An example of a database application would be

............................................................................................................................................................

3. Normalisation is

............................................................................................................................................................

4. 1NF stands for

............................................................................................................................................................

5. DBMS stands for

............................................................................................................................................................

6. 3NF stands for

............................................................................................................................................................

7. BNF is

............................................................................................................................................................

8. Polish notion is also known as

............................................................................................................................................................

9. A definition of polish notion is

............................................................................................................................................................

10. LIFO stands for

............................................................................................................................................................

............................................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 57
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.12 Characteristics of Networks

QUESTIONS

1. Which of the following terms defines “LAN”:

a) Local Access Network


b) Local Amount Network
c) Local Area Network
d) Local Activity Area

2. Which of the following terms defines ”WAN”:

a) Wider Area Network


b) Wide Area Network
c) Wise Area Network
d) Wind Area Network

3. Give one advantage for the use of the following types of network:

LAN

...........................................................................................................................................................

....................................................................................................................................................... [1]

WAN

...........................................................................................................................................................

....................................................................................................................................................... [1]

4. Explain the difference between LAN and WAN:

Difference 1

...........................................................................................................................................................

....................................................................................................................................................... [1]

Difference 2

...........................................................................................................................................................

....................................................................................................................................................... [1]

Comp
1
COMPUTER SYSTEMS - 58
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.13 Network Hardware/Software

Activity
Look at the following table of types of networks and list each type of
hardware/software needed: [6]

Network Hardware/Software
LAN

WAN

Comp
1
COMPUTER SYSTEMS - 59
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.14 Packet Switching


Packet switching is the approach used by some computer network
protocols to deliver data across a local or long distance connection.
Examples of packet switching protocols are Frame Relay, IP and X.25.

QUESTIONS

1. What is packet switching?

a) Type of network in which relatively complex units of data called packets


b) Type of network in which relatively small units of data called packets
c) Type of network in which relatively dedicated units of data called packets
d) Type of network in which relatively large units of data called packets

2. What is circuit switching?

a) Type of network in which a relative path is used on a double line


b) Type of network in which a complex path is used on a single line
c) Type of network in which a physical path is used on a single line
d) Type of network in which a constructive path is used on a double line

3. Give one advantage for the following types of data switching:

Packet:

...........................................................................................................................................................

....................................................................................................................................................... [1]

Circuit:

...........................................................................................................................................................

....................................................................................................................................................... [1]

4. Explain the difference between packet and circuit switching:

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 60
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.15 Protocols
Network protocols like HTTP, TCP/IP, and SMTP provide a foundation that
much of the Internet is built on.

QUESTIONS

1. Which of the following statement explain what network protocols are:

a) Network protocols are programmes which allow a network download


b) Network protocol defines rules and conventions for communication between network
devices.
c) Network protocols are list of user requirements for a network
d) Network protocols include different methods of accessing a file on a network

2. Explain physical and logical protocols:

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Explain the following protocols:

TCP

...........................................................................................................................................................

....................................................................................................................................................... [1]

IP

...........................................................................................................................................................

....................................................................................................................................................... [1]

4. Explain the importance to data transmission:

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [3]

Comp
1
COMPUTER SYSTEMS - 61
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.16 Network Protocols


Network protocol defines rules and conventions for communication
between network devices.
Activity

Define the following terms by completing the sentence: [1]

1. TCP is

...........................................................................................................................................................

2. IP stands for

...........................................................................................................................................................

3. SMTP provides

...........................................................................................................................................................

4. FTP is

...........................................................................................................................................................

5. POP provides

...........................................................................................................................................................

6. HTTP is

...........................................................................................................................................................

7. In OSI, Layer 1 is known as:

...........................................................................................................................................................

8. In OSI, Data link is

...........................................................................................................................................................

9. In OSI, Transport layer is

...........................................................................................................................................................

10. UDP is

...........................................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 62
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

3.17 Data Transmissions

Activity

Define the following terms by completing the sentence: [1]

1. Data transmission is

............................................................................................................................................................

2. Full Duplex is

............................................................................................................................................................

3. Parity checks are

............................................................................................................................................................

4. Packet switching is

............................................................................................................................................................

5. Circuit switching is

............................................................................................................................................................

6. TCP stands for

............................................................................................................................................................

7. An example of IP is

............................................................................................................................................................

8. IP stands for

............................................................................................................................................................

9. A network protocol is

............................................................................................................................................................

10. SMTP provides

............................................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 63
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.18 Antivirus Software

Activity

Answer the following questions:

1. Explain the term “Antivirus”

a) A program which monitors incoming connections to a computer system


b) A program which scans, quarantines or deletes viruses or other threats
c) A program that scans a hard drive for system resources on a computer system
d) A program which monitors system files and folders on a computer system

2. Give two main functions of an antivirus software application:

............................................................................................................................................................

........................................................................................................................................................[2]

3. Give two advantages of using antivirus application:

Advantage 1

............................................................................................................................................................

........................................................................................................................................................[1]

Advantage 2

............................................................................................................................................................

........................................................................................................................................................[1]

4. Give two potential dangers for not using an antivirus application:

Danger 1

............................................................................................................................................................

........................................................................................................................................................[2]

Danger 2

............................................................................................................................................................

........................................................................................................................................................[2]

Comp
1
COMPUTER SYSTEMS - 64
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.19 Firewall Software


Activity

Answer the following questions:

1. Which of the following explains the term “Firewall”:

a) A program which allows real time information of system resources


b) A program which provides protection against virus and Trojans
c) A program which protects a computer from external threats by monitoring network
communications
d) A program which deletes unwanted files and folders

2. Give two main functions of a firewall:

Function 1

............................................................................................................................................................

........................................................................................................................................................[2]

Function 2
............................................................................................................................................................

........................................................................................................................................................[2]

3. Give two advantages of using a firewall:

Advantage 1

............................................................................................................................................................

........................................................................................................................................................[2]

Advantage 2

............................................................................................................................................................

........................................................................................................................................................[2]

4. Give three potential dangers to a computer system when not using a firewall:

............................................................................................................................................................

........................................................................................................................................................[3]

Comp
1
COMPUTER SYSTEMS - 65
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.20 Web Technologies


Using the table below, Explain each type moral and ethical issues a business could face
business and give an example: [6]

Types What it is Example / Use


HTML, CSS and
JavaScript.

Search engine
indexing.

PageRank
algorithm.

Server and client


side processing.

Comp
1
COMPUTER SYSTEMS - 66
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

3.21 Page Rank Algorithms


Activity
Complete the following fill in the blanks activity:

PageRank is one of the ……………. Google uses to determine a page’s


…………………. or importance. PageRank is a ……………… value that ………………..
how important a page is on the……………... Google ………………. that when one page
links to ……………….. page, it is effectively …………… a vote for the other page. The
more votes that are …………… for a page, the more …………………… the page must
be. Also, the importance of the page that is casting the vote …………………. how
important the vote itself is. ………………… calculates a page's importance from the
votes cast for it.

Use the words: methods, numeric, represents, Google, casting, relevance, determines,
web, figures, important, another, cast

Questions

1. Which of the following describe page rank algorithms?

a) A method that changes the purposes of web pages


b) A method that determines the relevance of web pages
c) A method that deletes the importance of web pages
d) A method that sorts the relevance of web pages

2. Give two factors associated with using page rank algorithms

Factor 1

............................................................................................................................................................

........................................................................................................................................................[2]

Factor 2
............................................................................................................................................................

........................................................................................................................................................[2]

3. Explain how Google using these algorithms:

............................................................................................................................................................

............................................................................................................................................................

........................................................................................................................................................[2]

........................................................................................................................................................[2]

Comp
1
COMPUTER SYSTEMS - 67
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

Activity

Using the Internet and other sources of information, answer ALL questions:

Questions

1.2.4 Types of Programming Language

1. Explain the Need for and characteristics of a variety of programming paradigms.


2. What is Procedural languages and Assembly language
3. Write simple programs with the Little Man Computer instruction se
4. Modes of addressing memory (immediate, direct, indirect and indexed).
5. Name three types of Object-oriented languages
6. Explain how pseudo code is used showing understanding of classes, objects, methods,
attributes, inheritance, encapsulation and polymorphism.

1.3.1 Compression, Encryption and Hashing

7. Produce a table that compares Lossy vs Lossless compression.


8. Explain the different between Symmetric and asymmetric encryption.
9 Explain two Different uses of hashing.

1.3.2 Databases

10. Explain the function of a Relational database, flat file, primary key, foreign key, secondary
key, entity relationship modelling
11. Explain the stages of Normalisation
12. SQL – Interpret and modify.
13. Transaction processing, ACID (Atomicity, Consistency, Isolation, Durability), record locking
and redundancy.

1.3.3 Networks

14. Explain the TCP/IP Stack.


15. What is DNS and Protocol layering?
16. Give two differences for a LAN and WANs
17. Give two differences for Packet and circuit switching.
18. Name the main threats to Network security and how to prevent them
19. Explain the differences of Client-server and peer to peer networks

1.3.4 Web Technologies

20. What are HTML, CSS and JavaScript.


21. Explain Search engine indexing.
22. What is PageRank algorithm.
23. Explain Server and client side processing.

Comp
1
COMPUTER SYSTEMS - 68
OCR COMPUTER SCIENCE

1.4 Data types, data structures


and algorithms

Comp
1
COMPUTER SYSTEMS - 69
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

4.1 Units

There are several different types of units in computing, For example, 1 Bit =
Binary Digit and 8 Bits = 1 Byte. 1024 Bytes = 1 Kilobyte, 1024 Kilobytes = 1
Megabyte, 1024 Megabytes = 1 Gigabyte , 1024 Gigabytes = 1 Terabyte, 1024
Terabytes = 1 Petabyte

Activity

Look at the following table about units of data, give a brief explanation and example of the
size: [6]

Units Explanation Example


Bit

Nibble

Kilobyte

Megabyte

Gigabyte

Terabyte

Comp
1
COMPUTER SYSTEMS - 70
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

4.2 What is Binary?


The binary numeral system, or base-2 numeral system, represents
numeric values using two symbols: 0 and 1. Because computers use the
binary number system, powers of 2 play an important role. This is why
everything in computers seems to come in 8s (2 to the 3rd power), 64s
(2 to the 6th power), 128s (2 to the 7th power), and 256s (2 to the 8th
power).

QUESTIONS

1. Which of the following terms describes binary:

a) A number system that doesnot combination of zeros and ones


b) A number system that complications how zeros and ones are used
c) A number system that uses combination of zeros and ones
d) A number system that updates the use of zeros and ones

2. From the above images, what is the binary code for 1, 3, and F:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Explain how binary functions within a modern computer .

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 71
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

4.3 What is Hexadecimal?


Refers to the base-16 number system, which consists of 16 unique symbols:
the numbers 0 to 9 and the letters A to F. For example, the decimal number 15
is represented as F in the hexadecimal numbering system. The hexadecimal
system is useful because it can represent every byte (8 bits) as two
consecutive hexadecimal digits. It is easier for humans to read hexadecimal
numbers than binary numbers.

QUESTIONS

1. Which of the following terms describes hexadecimal

a) Hexadecimal is a base 8 system used to rectify how binary is represented


b) Hexadecimal is a base 16 system used to simplify how binary is represented
c) Hexadecimal is a base 32 system used to simplify how binary is represented
d) Hexadecimal is a base 64 system used to organise how binary is represented

2. From the above images, what value is 1000 and 111 in Hexadecimal and decimal?

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Give two reasons for the use of hexadecimal:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 72
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

4.4 What is ANSI/Unicode?


ANSI characters 32 to 127 correspond to those in the 7-bit ASCII
character set, which forms the Basic Latin Unicode character range.
Characters 160–255 correspond to those in the Latin-1 Supplement
Unicode character range. Positions 128–159 in Latin-1 Supplement are
reserved for controls, but most of them are used for printable characters in ANSI;
the Unicode equivalents are noted in the table below.

QUESTIONS

1. Which of the following terms describes ANSI:

a) A standard for deleting set encoding


b) A standard for changing set encoding
c) A standard for character set encoding
d) A standard for updating set encoding

1. What does ANSI stand for:

a) Australian National Standards Institute


b) Anglo-American National Standards Institute
c) Austria National Standards Institute
d) American National Standards Institute

2. From the above table, what is # and “in ANSI code:

............................................................................................................................................................

............................................................................................................................................................

........................................................................................................................................................[2]

Comp
1
COMPUTER SYSTEMS - 73
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

4.5 Data Representation In Binary Form


A base 2 8-bit number system represented by the numeric values of 0 or 1,
also known as ON or OFF, and is the primary language that computers use to
communicate. Below is an example of the maximum 8-bit value of 255, which is
11111111 in binary. To get this value add each column, so 1 + 2 + 4 + 8 + 16 + 32
+ 64 + 128 = 255.

Value: 128 64 32 16 8 4 2 1
ON/OFF: 1 1 1 1 1 1 1 1

Counting on a computer normally start with 0, instead of 1. Therefore, counting all the bits
does equal 255, however, if you start at 0, it is really 256. Below is another example of
10001101, which is 141 or 1 + 4 + 8 + 128.

Value: 128 64 32 16 8 4 2 1
ON/OFF: 1 0 0 0 1 1 0 1

QUESTIONS

1. Explain the purpose of binary?

...........................................................................................................................................................

....................................................................................................................................................... [1]

2. Using the above table, work out the following binary digits: [9]

0110111 ............................................................................................................................................

01101101 ..........................................................................................................................................

11000111...........................................................................................................................................

0011101.............................................................................................................................................

1010101.............................................................................................................................................

0110011.............................................................................................................................................

1101011.............................................................................................................................................

111011...............................................................................................................................................

0100111.............................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 74
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

4.6 Binary Calculations

Activity

Using the following example:

Value: 512 256 128 64 32 16 8 4 2 1


ON/OFF: 1 0 1 0 0 0 1 1 0 1

Questions

1. Using the above table, work out the following binary digits: [9]

10111101 ..........................................................................................................................................

10110111 ..........................................................................................................................................

11010111 ...........................................................................................................................................

10110101 ...........................................................................................................................................

1011101 .............................................................................................................................................

01100011 ...........................................................................................................................................

11011111 ...........................................................................................................................................

00110111 ...........................................................................................................................................

0011111 .............................................................................................................................................

00110111 ...........................................................................................................................................

10111111 ...........................................................................................................................................

0001111 .............................................................................................................................................

1111111 .............................................................................................................................................

1111101 .............................................................................................................................................

10111011 ...........................................................................................................................................

00111011 ...........................................................................................................................................

1100111011.......................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 75
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

4.7 Bitwise manipulation and masks


Activity

Complete the following fill in the blanks activity:

A bitwise ……………………. operates on one or more bit patterns or binary


…………………………. at the ……………………. of their ……………….. bits. It is a fast,
………………………………….action directly supported by the processor, and is used to
……………… values for comparisons and ……………... On simple low-cost
………………… , typically,………………. operations are substantially faster than
division, several times faster than ………………….., and sometimes significantly faster
than addition:

Use the words: operation, manipulate, calculations, multiplication, individual, numerals,


primitive, bitwise

Questions

1. Which of the following explains the term “bitwise manipulation:

a) It operates on complex bit patterns at individual bits


b) It operates on sound bit patterns at individual bits
c) It operates on more bit patterns at individual bits
d) It operates on double bit patterns at individual bits

2. Give two main advantages of bitwise operations:

Advantage 1

............................................................................................................................................................

........................................................................................................................................................[2]

Advantage 2
............................................................................................................................................................

........................................................................................................................................................[2]

3. Give one example of bitwise operation in any language:

Example 1

............................................................................................................................................................

........................................................................................................................................................[2]

Comp
1
COMPUTER SYSTEMS - 76
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

4.8 Floating Point Arithmetic


Activity
Complete the following fill in the blanks activity:

Floating-point ………………….. is considered an …………………. subject by many


people. This is rather ……………………. because floating-point is …………….. in
…………………. systems. Almost every language has a floating-point …………………. ;
computers from PCs to ………………………….. have floating-point accelerators; most
compilers will be called upon to compile floating -point ………………… from time to time;
and …………………… every ……………………… system must ………………….. to
floating-point exceptions such as overflow.

Use the words: arithmetic, ubiquitous, datatype, supercomputers, algorithms, respond,


surprising, operating, virtually, esoteric, computer

Questions

1. Which of the following describe floating point arithmetic?

a) Floating-point numbers are represented in computer hardware as base 10


b) Floating-point numbers are represented in computer hardware as base 2
c) Floating-point numbers are represented in computer hardware as base 15
d) Floating-point numbers are represented in computer hardware as base 12

2. Explain floating point arithmetic:

............................................................................................................................................................

........................................................................................................................................................[2]

3. Give one advantage and one disadvantage of floating point:

Advantage 1

............................................................................................................................................................

........................................................................................................................................................[1]

Advantage 2

............................................................................................................................................................

........................................................................................................................................................[1]

Comp
1
COMPUTER SYSTEMS - 77
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

4.9 Arrays
Activity

Complete the following fill in the blanks activity:

C programming …………………. provides a data ………………. called the array, which


can …………………. a fixed-size ……………….. collection of elements of the same type.
An array is used to store a ……………………. of data, but it is often more useful to think
of an array as a collection of ……………………… of the same type. Instead of declaring
……………………….. variables, such as number0, number1, ..., and number99, you
declare one array variable such as ………………….. and use numbers[0], numbers[1],
and ..., numbers[99] to ……………… individual variables. A specific element in an array
is accessed by an index.

Use the words: language, collection, individual, structure, variables, sequential, store
represent, numbers

Questions

1. Which of the following explains an array?

a) Stores double-size sequential collection of elements of the same type


b) Stores fixed-size sequential collection of elements of the different type
c) Stores fixed-size sequential collection of elements of the same type
d) Stores multiple-size sequential collection of elements of the same type

2. Give two reasons for using an array:

Reason1

............................................................................................................................................................

........................................................................................................................................................[2]

Reason 2
............................................................................................................................................................

........................................................................................................................................................[2]

3. Give one example of an array in any language: (Python Lists)

Advantage 1

............................................................................................................................................................

........................................................................................................................................................[2]

Comp
1
COMPUTER SYSTEMS - 78
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

4.10 Boolean Logic


Activity

Complete the following fill in the blanks activity:

Boolean …………………. and truth tables can be used to describe …………………


expressions.. Boolean Operators are simple words (…………. , OR, NOT or AND
…………. ) used as …………………… to combine or exclude ……………………. in a
search, resulti ng in more ………………. and productive results. This should save time
and effort by ………………….. inappropriate hits that must be ……………………. before
discarding.

Use the following words: algebra, NOT, AND, conjunctions, scanned, eliminating,
keywords, focused

Questions

1. Which of the following describes Boolean Logic”:

a) A process of logical expressions consisting of operations


b) A process of logical verbs consisting of operators
c) A process of logical expressions consisting of operators
d) A process of illogical expressions consisting of operators

2. Give two examples of Boolean Logic:

Example 1

............................................................................................................................................................

........................................................................................................................................................[2]

Example 2
............................................................................................................................................................

........................................................................................................................................................[2]

3. Give two advantages for using Boolean Logic:

Advantage 1

............................................................................................................................................................

........................................................................................................................................................[2]

Advantage 2

............................................................................................................................................................

Comp........................................................................................................................................................[2]
1
COMPUTER SYSTEMS - 79
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

4.11 Karnaugh Map


Activity

Complete the following fill in the blanks activity:

A Karnaugh map (K-map) is a ………………….. method used to minimize Boolean


expressions without having to use ……………….. algebra theorems and
equation………………… . A K-map can be thought of as a special …………………….of
a truth ………………….. . Using a K-map, expressions with two to four variables are
easily minimized. Expressions with five to six …………………. are more difficult but
……………………, and expressions with …………………… or more variables are
extremely difficult (if not impossible) to minimize using a K-map.

Use the following words: pictorial, achievable, Boolean, manipulations, variables, seven.
Version, table

Questions

1. Which of the following describe Karnaugh Map:

a) A method of using binary to minimise Boolean expressions


b) A method of using arrays to minimise Boolean expressions
c) A method of using pictorial to minimise Boolean expressions
d) A method of using to variables to minimise Boolean expressions

2. Give two main reasons for Karnuagh Maps

Reason 1

............................................................................................................................................................

........................................................................................................................................................[2]

Reason 2
............................................................................................................................................................

........................................................................................................................................................[2]

3. Give two advantages for Using Karnuagh Maps:

Advantage 1

............................................................................................................................................................

........................................................................................................................................................[2]

Advantage 2

............................................................................................................................................................
Comp
1 ........................................................................................................................................................[2]

COMPUTER SYSTEMS - 80
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

4.12 De Morgan’s Law


Activity

De Morgan's laws are used to simplify Boolean equations so that you can build equations only
involving one sort of gate, generally only using NAND or NOR gates. This can lead to cheaper
hardware. There are two laws that you need to remember:

Rule 1 Rule 2

Questions

1. Which of the following explains De Morgan;s law”:

a) The law is used to reduce Boolean equations involving gates


b) The law is used to amplify Boolean equations involving gates
c) The law is used to simplify Boolean equations involving gates
d) The law is used to confuse Boolean equations involving gates

2. Give two advantages for De Morgan’s Laws

Advantage 1

............................................................................................................................................................

........................................................................................................................................................[2]

Advantage 2
............................................................................................................................................................

........................................................................................................................................................[2]

3. Give an example of De Morgan’s Law

Example1

............................................................................................................................................................

............................................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 81
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

4.13 Logic Gates and Truth Tables


Activity

Here is an example of a two input gate. It is an AND gate and the truth table for this gate can be
seen to the right of it.

Three Input AND Gate

Here is an example of a three input AND gate. Notice that the truth table for the three input gat e is similar
to the truth table for the two input gate. It works on the same principle, this time all three inputs need to be
high (1) to get a high output.

Four Input AND Gate

Here is an example of a four input AND gate. It also works on the same principle, all four inputs need to
be high (1) to get a high out put. The same principles apply to 5, 6,..., n input gates.

Comp
1
COMPUTER SYSTEMS - 82
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

4.14 Understanding Logic Gates and Truth Tables


Activity

1 What does an EXOR gate do?

a) Give a high output when one or more of its inputs are high
b) Give a high output when only one of its inputs are high
c) Give a low output when one or more of its inputs are high
d) Give a low output when only one of its inputs are high

2. Which of the following symbols represents a NOR gate?

a) b)

c) d)

3. What does connecting together the inputs of NAND and NOR gates do?

a) Help produce multi-input gates


b) Produce and EXNOR gate
c) Produce a NOT gate
d) Delete the gate

4. How do you make a NAND gate out of an AND gate using inverters (NOT gates)?

a) Invert the output from the AND gate


b) Invert both the inputs to the AND gate
c) Invert one of the inputs to the AND gate
d) Invert both the inputs and output of the AND gat

5. How do you make an AND gate out of an OR gate using inverters (NOT gates)?

a) Invert the output from the NAND gate


b) Invert both the inputs to the NAND gate
c) Invert one of the inputs to the NAND gate
d) invert both the inputs and output of the NAND gate

Comp
1
COMPUTER SYSTEMS - 83
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

4.15 D Flip Flops


Activity

Complete the following fill in the blanks activity:

Sequential ……………. is a form of binary ……………… design that employs one or


more inputs and one or more…………………. , whose states are related by defined
…………….. that depend, in part, on previous states. Each of the ………………. and
output(s) can ……………….. either of two states: logic 0 (low) or logic 1 (high). A
common example of a circuit employing ……………………….logic is the flip-flop, also
called a …………………. gate. A simple ……………….. has two stable states. The flip-
flop maintains its states indefinitely until an input pulse called a ……………… is received

Use the words: bistable, flip-flop, logic, inputs, rules, trigger, circuit, outputs, attain,
sequential

Questions

1. Which of the following describes D Flip Flop:

a) Type of logic in binary form designed to produce less than one inputs
b) A Type of logic in binary form designed to revere engineer one or more inputs
c) Type of logic in binary form designed to produce one or more inputs
d) Type of logic in binary form designed to produce one or more outputs

2. Give two reasons for the use of Flip Flops:

Reason 1

............................................................................................................................................................

........................................................................................................................................................[2]

Reason 2

............................................................................................................................................................

........................................................................................................................................................[2]

3. Give one example of Flip-Flop

............................................................................................................................................................

........................................................................................................................................................[1]

Comp
1
COMPUTER SYSTEMS - 84
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

Activity

Using the Internet and other sources of information, answer ALL questions:

Ques tions

1.4.1 Data Types

1. What are integers, real/floating point, characters, strings and Boolean.


2. Explain the representation of positive integers in binary.
3. Explain how to convert positive integers between binary hexadecimal and denary.
4. What is Floating point arithmetic, positive and negative numbers, addition and subtraction.
5. Explain Bitwise manipulation and masks: shifts, combining with AND, OR, and XOR.
6. What are characters sets (ASCII and UNICODE)
7. How can ASCII be represented in binary

1.4.2 Data Structures

8. What are arrays and type of arrays used in records, lists, tuples.
9. What are stack, queue, tree, binary search tree and hash table?

1.4.3 Boolean Algebra

10. Explain the key principles of Boolean logic.


11. How can Boolean expressions be manipulated
12. What are Karnaugh maps within Boolean expressions?
13. Explain De Morgan’s Laws,
14. What are logic gate diagrams and truth tables?
15. Explain D type flip flops, half and full adders.

Extension: List areas which you need to revise and further develop your understanding

Comp
1
COMPUTER SYSTEMS - 85
OCR COMPUTER SCIENCE

1.5 Legal, moral, cultural and


ethical issues

Comp
1
COMPUTER SYSTEMS - 86
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

5.1 Legislation
There are many different types of legislation which govern ICT and computing
within the UK.

Activity

Look at the following table, explain each type of legislation: [6]

Legislation Purpose Main Features


Data
Protection
Act

Copyright and
Patent Act

Freedom of
Information
Act

Comp
1
COMPUTER SYSTEMS - 87
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

5.2 Understanding the Data Protection Act

ACTIVITY

Read the following exact about the Data Protection Act and fill in the blanks

The Data ……………….. Act was created to govern the way data is used. The DPA
gives ………………….. certain rights regarding information ………………….. about
them. It places ………………….. on those who process ……………………(data
controllers) while giving …………………. to those who are the subject of that data (data
subjects). ……………….information covers both facts and opinions about the
…………….. There are 8 principles of the DPA:

1. Fairly and lawfully processed


2. Processed for limited purposes
3. Adequate, relevant and not excessive
4. Accurate
5. Not kept for longer than is necessary
6. Processed in line with your rights
7. Secure
8. Not transferred to other countries without adequate protection

Use the words: Protection, individual, Personal, individuals, information, held, rights

Questions

1. Explain the purpose of Data Protection Act?

...........................................................................................................................................................

....................................................................................................................................................... [1]

2. Give two examples of how the Data Protection Act can be implemented:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Explain why data should not to be kept for longer than necessary and giving an example:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 88
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

5.3 Understanding the Computer Misuse Act


ACTIVITY

Read the following exact about Computer Misuse Act:

The Computer Misuse Act is a law that was introduced relating how computers are used. There
are three key elements of the Computer Misuse Act:

1. Unauthorised access to computer material: Any attempt to gain unauthorised access to a


computer system is illegal. The attempt does not have to be successful. Simply trying to
access a computer system that you do not have permission to access is illegal. Under this
section of the Act simply trying to "guess" another user's password or trying to load a file that
you do not have permission to load would be an offence. Anyone committing such an offence
can be punished by up to six months in prison and a fine of up to £2000.
2. Unauthorised access with intent to commit further offences: If unauthorised access to a
computer system is achieved and this access is used to carry out a further offence e.g.
changing the contents of a file to increase your bank balance then the penalties are much
stronger. A prison term of up to five years can be imposed as can a large fine.
3. Unauthorised modification of computer material: This offence covers deliberate erasure
or corruption of computer data. It also covers the deliberate introduction of a virus onto a
computer system. A prison term of up to five years can be imposed for committing this
offence

1. Explain the purpose of the Computer Misuse Act?

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

2. Give three key principles of the Computer Misuse Act:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [3]

3. Explain two potential punishments for breaking the Computer Misuse Act:

...........................................................................................................................................................

....................................................................................................................................................... [2]

...........................................................................................................................................................

Comp
1
COMPUTER SYSTEMS - 89
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

5.4 Data Protection Act


Activity

Data Protection Act is a law which protects how data is used, stored and transmitted

1. Explain the main purpose of the Data Protection Act:

a) Legislation to use personal data


b) Legislation to update personal data
c) Legislation to protect personal data
d) Legislation to delete personal data

2. Name the eight principles of the Data Protection Act:

............................................................................................................................................................

............................................................................................................................................................

............................................................................................................................................................

........................................................................................................................................................[8]

3. Give two examples on how the Data Protection Act applies to businesses:

Example 1

............................................................................................................................................................

........................................................................................................................................................[1]

Example 2

............................................................................................................................................................

........................................................................................................................................................[1]

4. Explain the penalties for not following the Data Protection Act:

............................................................................................................................................................

........................................................................................................................................................[1]

Comp
1
COMPUTER SYSTEMS - 90
OCR COMPUTER SCIENCE

Name……………………………………… Date…………….........

5.5 Computer Misuse Act

Activity

1. What is the Computer Misuse Act?

a) Legislation to protect misuse of computer equipment


b) Legislation to protect use of computer equipment
c) Legislation to allow misuse of computer equipment
d) Legislation to protect abuse of computer equipment

2. Name the three main offences the Computer Misuse Act is designed for:

............................................................................................................................................................

........................................................................................................................................................[3]

3. Give two different real life examples of Computer Misuse Act:

Example 1

............................................................................................................................................................

........................................................................................................................................................[1]

Example 2

............................................................................................................................................................

........................................................................................................................................................[1]

4. Give two types of people mainly prosecuted by the computer Misuse Act:

Type 1
............................................................................................................................................................

........................................................................................................................................................[1]

Type 2

............................................................................................................................................................

........................................................................................................................................................[1]

Comp
1
COMPUTER SYSTEMS - 91
OCR COMPUTER SCIENCE
Name……………………………………… Date…………….........

5.6 Regulation of Investigatory Powers Act 2000


Activity

1. What does the RIPA do?

a) Regulating the powers of private companies to carry out surveillance and


investigation
b) Regulating the powers of Hench funds to carry out surveillance and investigation
c) Regulating the powers of systems to carry out surveillance and investigation
d) Regulating the powers of properties to carry out surveillance and investigation

2. Give two main purposes of RIPA

Purpose 1

............................................................................................................................................................

........................................................................................................................................................[1]

Purpose 2

............................................................................................................................................................

........................................................................................................................................................[1]

3. What year was RIPA introduced

a) 2001
b) 2000
c) 2002
d) 2003

4. What are the penalties for not following RIPA:

Penalties

............................................................................................................................................................

........................................................................................................................................................[2]

Penalties

............................................................................................................................................................

........................................................................................................................................................[2]

Comp
1
COMPUTER SYSTEMS - 92
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

5.7 Copyright and Patent Act


ACTIVITY

Read the following exact about Computer Misuse Act and fill in the blanks:

The Copyright ………………….. and …………….. Act of 1988 states, that it is illegal to
copy software without the …………………………of the person or company that
……………………. the copyright for the software. The ………………….. holder is usually
the author of the software or the company that the ……………………….. works for.
Illegal copying of ………………….. reduces the income of software companies. Having
……………………… money in ………………… the software in the first place these
………………..need to earn income from software ………………. to recover these costs
and make a profit.

Specific offences which are outlawed by the Act are:

The unauthorised copying of software.


The sale of software that is known to be copied.
The provision of software or hardware specifically designed to copy a particular piece of
software.

Use the words: Designs, Patents, copyright, software, sales, permission, author, invested,
owns, producing

Questions

1. Explain the purpose of Copyright and Patent Act?

............................................................................................................................................................

............................................................................................................................................................
.
........................................................................................................................................................[1]

2. Give two examples of breaches of the Copyright and Patent Act

............................................................................................................................................................

........................................................................................................................................................[2]

3. Explain who is mostly affected by illegal copying of software:

............................................................................................................................................................

............................................................................................................................................................

........................................................................................................................................................[2]

Comp
1
COMPUTER SYSTEMS - 93
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

5.8 Computer in the Workforce


ACTIVITY

Complete the following activity by filling I the blanks:

Computers have ……………………..the workplace and …………………….. as a whole.


…………………… and organizations have become dependent on computers to connect
them to co-workers, …………………., customers and information. ………………………
are used to track schedules, ……………………… information and provide needed data.
Although computers have provided workers countless tools for …………………. and
easier access to ……………………….. nearby or abroad, there are ………………………
effects. These include more than the obviously dreaded system failures and …………….
crimes.

Use the words: transformed, Computers, cyber, streamline, People, business information,
negative, society, vendors

Questions

1. Which for the following describes computers in the workforce?

a) Computer are used to complete jobs including track schedules


b) Computer are used to assist in jobs including track schedules
c) Computer are used to make jobs including track schedules
d) Computer are used to not do jobs including track maintenance

2. Give examples of computers in the workforce:

............................................................................................................................................................

............................................................................................................................................................

........................................................................................................................................................[2]

3. Give one advantage and one disadvantage for computers in the workforce:

Advantage

............................................................................................................................................................

........................................................................................................................................................[1]

Disadvantage

............................................................................................................................................................

........................................................................................................................................................[1]

Comp
1
COMPUTER SYSTEMS - 94
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

5.9 Automated decision making

ACTIVITY

Complete the following activity by filling I the blanks:

Automated decision-………………….. is when a video workflow automation system


determines which ……………………..of a process to run, based upon ………………
within the workflow, while the ………………….. is running. The newest
………………………of tools for video workflow …………………….and automation allow
the ability to model and ………………….. this type of decision-making. decision-making.
…………………typically can be made upon a wide ……………………..of data present in
a workflow. For example, decisions may be made using the results of media analysis —
the examination of file headers to de termine …………………properties,
……………………….of media metadata, video or audio analysis, quality measurements
or ……………. checks.

Use the words: making, Decisions, media, automate, data, reference, design, extraction,
variety, branches

Questions

1. What does ADM stand for:

a) Actual Decision Making


b) American Decision marking
c) Automated Decision Marking
d) Automated Decision Making

2. Explain how ADM is used in industry?

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

3. Explain two types of properties used for decision making in media analysis:

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 95
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

5.10 Censorship on the Internet

ACTIVITY

Complete the following activity by filling I the blanks:

Internet ……………………….. is the control or ………………………… of what can be


accessed, …………………….. , or viewed on the Internet. It may be carried out by
………………………… or by …………………… organizations at the behest of
government, regulators, or on their own initiative. ………………………. and
organizations may ………………….. in self-censorship for moral, religious, or business
reasons, to conform to societal norms, due to………………………, or out of fear of
……………………. or other consequences. The extent of ……………………censorship
varies on a country-to-country basis

Use the words: censorship, suppression, published, governments, Individuals,


intimidation, legal, private, Internet

Questions

1. What is censorship:

a) A process of controlling how information is accessed


b) A process of allowing how information is accessed
c) A process of distributing how information is accessed
d) A process of developing how information is accessed

2. Why would government censor information?

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [3]

3. Give an example of censorship from a real world situation:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 96
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

5.11 Artificial Intelligence


ACTIVITY

Complete the following activity by filling in the blanks:

Artificial …………………. is the simulation of ……………………... intelligence processes


by machines, especially computer ………………… . These ………………… include
learning (the ……………………. of information and rules for using the information),
reasoning (using the …………………. to reach ……………………or definite
conclusions), and self-correction. Particular applications of AI include
………………….systems, speech ……………………., and machine vision.

Use the words: intelligence, systems, processes, acquisition, recognition, expert,


approximate, rules, human

Questions

1. What does AI stand for:

a) Arithmetic Intelligence
b) Actual Intelligence
c) Artificial Intelligence
d) American Intelligence

2. Explain the main purposes of AI:

...........................................................................................................................................................

...........................................................................................................................................................

....................................................................................................................................................... [3]

3. Give two advantages for AI:

Advantage 1:

...........................................................................................................................................................

....................................................................................................................................................... [2]

Advantage 2

...........................................................................................................................................................

....................................................................................................................................................... [2]

Comp
1
COMPUTER SYSTEMS - 97
OCR COMPUTER SCIENCE

Name……………………………………… Class…………….........

5.12 Types of Issues

Activity
Using the table below, explain each type of issues affecting computer science: [6]

Types Explanation Example


Automated
decision making

Artificial
intelligence

Censorship and
the Internet.

Piracy and
offensive
communications.

Comp
1
COMPUTER SYSTEMS - 98
OCR COMPUTER SCIENCE
Name……………………………………… Class…………….........

Activity

Using the Internet and other sources of information, answer ALL questions:

Questions

1.5.1 Computing related legislation

1. Name the 8 principles of the Data Protection Act 1998.


2. What are the three main principles of the Computer Misuse Act 1990?
3. Explain the Copyright Design and Patents Act 1988.
4. Explain the purpose of the Regulation of Investigatory Powers Act 2000.

1.5.2 Moral and ethical Issues

5. Name the main moral issues affected in computing


6. What are ethical issues affecting computing?
7. Explain how computers in the workforce has revolutionised the work force industry
8. What are automated decision making systems?
9. Explain Artificial intelligence
10. What Environmental effects has computer had?
11. What is Censorship on the Internet?
12. How can governments monitor behaviour?
13. What type of system analyse personal information.
14. What is Piracy and offensive communications?
15. What are layout, colour paradigms and character sets?

Extension: List areas which you need to revise and further develop your understanding

Comp
1
COMPUTER SYSTEMS - 99
OCR COMPUTER SCIENCE

Worksheet Answers

Comp
1
COMPUTER SYSTEMS - 100
OCR COMPUTER SCIENCE

Comp 1 Answers
ALL answers are not executives. - Accept other relevant answers that students submit.

Questions Answers
1.1 1. a) AMD Phenom II Socket AM3, b) Intel I7, c) Intel I5
2. Purpose: purpose of the CPU in executing instructions and the structure of the CPU
relating to its function.
3. Provide Caching, Faster Instruction execution,
1.2 a) Memory
b)ALU
c)Control Unit
d)Input/Output

1. An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic
operations within the CPU
1.3 1 Mark for Each

ALU - Arithmetic logic unit


PC – Program Counter
MAR Memory Address Register
MDR Memory Data Register
CIR Current Instruction Register
CU Control Unit
IR Instruction Register

2. The cache is used to hold recently used (and speculatively - soon to be used) data
and instructions in a fast memory closest to the CPU, so that consequent access
requests from the CPU to the same memory areas are responded as fast as possible.
3. Advantages – Speeds up processing, executes/store next instruction to load into the
CPU
1.4 Answers for fill in the blanks

A processor register is a small amount of storage available as part of a CPU or


other digital processor. Such registers are (typically) addressed by mechanisms
other than main memory and can be accessed more quickly. Almost all
computers, load-store architecture or not, load data from a larger memory into
registers where it is used for arithmetic, manipulated, or tested, by some
machine instruction

1. Register is small storage within the CPU


2. Store Data, Register data within the main memory, loads data into larger memory
3. Provides large amounts to data to be executed within the CPU
1.5 1.A cycle of fetching, executing, decoding instructions within the CPU
2. Data is fetched and stored in the PC, the
3. Program Counter, Instruction Register
1.6 1 John von Neumann was a brilliant mathematician, synthesizer, and promoter of the
stored program concept, whose logical design of the IAS became the prototype of most
of its successors - the von Neumann Architecture.
2. Von Neumann architecture was originally published in John von Neumann's report of
Comp the EDVAC on June 30, 1945. This architecture is comprised of an Arithmetic Logic Unit

1
COMPUTER SYSTEMS - 101
OCR COMPUTER SCIENCE

(ALU), memory, Input/Output, and a control unit. This design is still used, in one form or
another, in all computers and many electronic devices produced today
3 both instructions (code) and data (variables and input/output) are stored in memory
memory is an collection of binary digits (bits) that have been organized into bytes,
words, and regions with addresses
4 Advantages - Advantage of the von Neumann architecture are flexibility: instructions
(code) and data can occupy the same "bucket" of memory.
1.7 a)Input/Output
b) Main Memory
1. Logic Unit - In the Von Neumann’s architecture, the arithmetic/logical unit (ALU) and
the Control Unit (CU) are separate components, but in modern systems they are
integrated into the processor. The ALU has 3 sections, the register, the ALU circuitry,
and the pathways in between.
Program Control Unit -The processing unit can be broken down into a coupe of
subunits, the ALU, the processing control unit and the program counter.
1.8 Clock Speed – Speed of the CPU
Higher clock speed, faster instructions are executed and programs are loaded quicker
CPU Core – Number of Core units within the CPU
Quad core have greater speed executing instructions compared to dual core or single
core processors
Cache – Memory type within the CPU, L1 or L2
Higher the level 2 cache, more instructions are loaded to be executed quicker
1.9 Answers for fill in the blanks

Pipelining is an implementation technique where multiple instructions are overlapped


in execution. The computer pipeline is divided in stages. Each stage completes a part of
an instruction in parallel. The stages are connected one to the next to form a pipe -
instructions enter at one end, progress through the stages, and exit at the other end.
Pipelining does not decrease the time for individual instruction execution. Instead, it
increases instruction throughput. The throughput of the instruction pipeline is
determined by how often an instruction exits the pipeline.

1B
2 - instructions enter at one end, progress through the stages, and exit at the other end.
2. Advantages - it increases instruction throughput, stage completes a part of an
instruction in parallel.
1.10 1. Computer Architecture is
2. Features of Von Neumann are the use of ALU,PC, Main Memory and Input/Output
3. ALU stands for Arithmetic Logic Unit
4. MAR stands for Memory Address register
5. PC Stands for Program Counter
6. CISC stands for Complex Instruction Set Computer
7. RISC stands for Reduced Instruction Set Computer
8. Fetch performs the process of gathering the instruction
9. Execute performs the process of applying/completing the instruction
10. CPU stands for Central Processing Unit

Comp
1
COMPUTER SYSTEMS - 102
OCR COMPUTER SCIENCE
1.11 Answers for fill in the blanks

RISC, or Reduced Instruction Set Computer. is a type of microprocessor architecture that


utilizes a small, highly-optimized set of instructions, rather than a more specialized set of
instructions often found in other types of architectures.

1 Reduced Instruction Set Computer and Complex Instruction Set Computers


2. Risc, Low cycles per second, large code sizes, Emphasis on software
CiSC - Small code sizes, high cycles per second, Emphasis on hardware
3 Advantages include:
Speed. Since a simplified instruction set allows for a pipelined, superscalar design RISC
processors often achieve 2 to 4 times the performance of CISC processors
Simpler hardware. Because the instruction set of a RISC processor is so simple, it uses up
much less chip space; extra functions, such as memory management units
Shorter design cycle. Since RISC processors are simpler than corresponding CISC processors,
they can be designed more quickly, and can take advantage of other technological
developments

1.12 Answers for fill in the blanks

GPU-accelerated computing is the use of a graphics processing unit (GPU) together with a
CPU to accelerate scientific, analytics, engineering, consumer, and enterprise applications.
GPU accelerators now power energy-efficient datacenters in government labs, universities,
enterprises, and small-and-medium businesses around the world. GPUs are accelerating
applications in platforms ranging from cars, to mobile phones and tablets, to drones and
robots.

1 – c – graphic processor Unit


2. GPU - A graphics processing unit that contains hundreds of cores to enable high end
graphics.
CPU – A processing unit which limited cores which executers computer instructions and
software application, including OS, Application software
3. Mobile Phones, Robots, Drones, Tablets, Graphics Cards
1.13 Answers for fill in the blanks

A simple way to understand the difference between a CPU and GPU is to compare how they
process tasks. A CPU consists of a few cores optimized for sequential serial processing while
a GPU has a massively parallel architecture consisting of thousands of smaller, more efficient
cores designed for handling multiple tasks simultaneously. GPUs have thousands of cores to
process parallel workloads efficiently

1. Graphics Processor Unit and Central Process Unit


2. Differences in number of cores within each process unit
3 Lighting effects, object transformations, and 3D motion.
1.14 Input -Accept Any type of computer input
Output Accept Any type of computer output
storage Accept Any type of computer storage
1.15 a) USB Flash Drive
b) SSD
c) CD Rom
Comp d)Hard Drive

1
COMPUTER SYSTEMS - 103
OCR COMPUTER SCIENCE
e) DVD Rom
f) External Hard Drive
g) SD memory cards etc

1. Devices which are used to store data/files depending on the type of storage device
2. To large amounts of data for different purposes, eg for backup, storage, to transport or
transfer
1.16 Other Answers can be accepted

Hard Drive – Advantage – Large Storage, Faster Access, Disadvantage – Internet, None
portable
CD Rom – Advantage – Large Storage, Portable, Writeable – Disadvantage, cant be damaged
USB Flash Advantage – Large Storage, Portable, Writeable - – Disadvantage, cant be
damaged

2.1 Fill in the blanks Activity

An operating system, or "OS," is software that communicates with the hardware and
allows other programs to run. It is comprised of system software, or the fundamental
files your computer needs to boot up and function. Every desktop computer, tablet,
and Smartphone includes an operating system that provides basic functionality for
the device

1. B
2. Provide interface between hardware and software, memory management, file and user
management. Resource management. System/Secuirty
3. To run/operator the computer hardware using device drivers and provide an interface for
the user and computer
4. Windows 10, 8.1, 7, Linux, Android, IOS

2.2 Any of the following can be inserted


Resource Management, File/User Management/ Memory Management, System Security,
Device/Hardware Operation
1 The Os provides memory management to allocated how memory is stored on the hard
drive and RAM
2 Provide interface/organisation of files within the hard drive using file allocation tables to
assign files to specific locations within the hard drive.
2.3 Answers for fill in the blanks activity:

An interrupt is a signal to the processor emitted by hardware or software indicating an event


that needs immediate attention. An interrupt alerts the processor to a high-priority
condition requiring the interruption of the current code the processor is executing. The
processor responds by suspending its current activities, saving its state, and executing a
function called an interrupt handler (or an interrupt service routine, ISR) to deal with the
event. This interruption is temporary, and, after the interrupt handler finishes, the processor
resumes normal activities

2.4 Answers for fill in the blanks activity:

Scheduling is the method by which a specific process is assigned resources that


needs completing. The process scheduler is the component of the operating system
Comp that is responsible for deciding whether the currently running process should

1
COMPUTER SYSTEMS - 104
OCR COMPUTER SCIENCE
continue running. The resources may be virtual computation elements such as
threads, processes or data flows, which are in turn scheduled onto hardware
resources such as processors, network links or expansion cards. Schedulers are
often implemented so they keep all compute resources busy (as in load balancing),
allow multiple users to share system resources effectively, or to achieve a target
quality of service

1D
2. The process scheduler is the component of the operating system that is
responsible for deciding whether the currently running process should continue
running. The resources may be virtual computation elements such as threads,
processes or data flows,
3 Medium-term scheduling -the medium-term scheduler temporarily removes processes
from main memory and places them in secondary memory
Short-term scheduling -he short-term scheduler (also known as the CPU scheduler) decides
which of the ready, in-memory processes is to be executed
2.5 Answers for fill in the blanks

The memory management function keeps track of the status of each memory location,
either allocated or free. It determines how memory is allocated among competing
processes, deciding who gets memory, when they receive it, and how much they are
allowed. When memory is allocated it determines which memory locations will be assigned.
It tracks when memory is freed or unallocated and updates the status.

1B
2 Memory management is the process of controlling and coordinating computer memory,
assigning portions called blocks to various running programs to optimize overall system
performance. Memory management resides in hardware, in the OS (operating system), and
in programs and applications.

3 Via Virtual Memory or within the RAM - program requests a block of memory, a part of the
memory manager called the allocator assigns that block to the program
4
virtual memory is a memory management technique that is implemented using both
hardware and software. It maps memory addresses used by a program, called virtual
addresses, into physical addresses in computer memory. Main storage as seen by a process
or task appears as a contiguous address space or collection of contiguous segments. The
operating system manages virtual address spaces and the assignment of real memory to
virtual memory.

2.6 Distributed - A distributed system is a software system in which components located on


networked computers communicate and coordinate their actions by passing messages.
Embedded software is computer software, written to control machines or devices that are
not typically thought of as computers. It is typically specialized for the particular hardware
that it runs on and has time and memory constraints.
Multi-user software is software that allows access by multiple users of a computer. Time-
sharing systems are multi-user systems.
multi-tasking - In a computer operating system, multitasking is allowing a user to perform
more than one computer task (such as the operation of an application program)
2.7 BIOS
BIOS (basic input/output system) is the program a personal computer's microprocessor uses
Comp to get the computer system started after you turn it on. It also manages data flow between

1
COMPUTER SYSTEMS - 105
OCR COMPUTER SCIENCE

the computer's operating system and attached devices such as the hard disk, video adapter,
keyboard, mouse and printer.

Virtual Storage
Virtual storage is the pooling of physical storage from multiple network storage devices into
what appears to be a single storage device that is managed from a central console.

Devices Drivers
A device driver is a program that controls a particular type of device that is attached to your
computer. There are device drivers for printers, displays, CD-ROM readers, diskette drives,
and so on. When you buy an operating system, many device drivers are built into the
product.
2.8 Open Source
Open source software is software whose source code is available for modification or
enhancement by anyone. "Source code" is the part of software that most computer users
don't ever see; it's the code computer programmers can use to change how a piece of
software works.

Proprietary
Proprietary software or closed source software is computer software licensed under
exclusive legal right of the copyright holder with the intent that the licensee is given the
right to use the software only under certain conditions, and restricted from other uses, such
as modification, sharing, studying

2.9 Assembler
A program that translates programs from assembly
language to machine language.

Interpreter
A program that translates source code into object code.
The compiler derives its name from the way it works,
looking at the entire piece of source code and collecting
and reorganizing the instructions.

Compiler
A program that executes instructions written in a high-level
language. There are two ways to run programs written in a
high-level language. It translates high-level instructions into
an intermediate form, which it then executes.
2 translates programs from assembly language to machine language.
3. Interpreter translates and compiler complies code
4. To be understood by the CPU and written in a format the OS can understand
2.10 lexical analysis
lexical analysis is the process of converting a sequence of characters (such as a computer
program or web page) into a sequence of tokens (strings with an identified "meaning").
syntax analysis
yntactic analysis, or parsing, is needed to determine if the series of tokens given are
appropriate in a language - that is, whether or not the sentence has the right shape/form.
code generation
Code generation is the process by which a compiler's code generator converts some
Comp intermediate representation of source code into a form (e.g., machine code) that can be

1
COMPUTER SYSTEMS - 106
OCR COMPUTER SCIENCE

readily executed by a machine


Optimisation - Optimization is a very broad term. In general it implies modifying the system
to make some of its aspect to work more efficiently or use fewer resources or be more
robust.

2.11 A linker combines one or more object files and possible some library code into either some
executable, some library or a list of error messages.
A loader reads the executable code into memory, does some address translation and tries to
run the program resulting in a running program or an error message (or both)Loaders

2.12 Answers for fill in the blanks

The systems development life cycle (SDLC) is a conceptual model used in project
management that describes the stages involved in an information system development
project, from an initial feasibility study through maintenance of the completed application.
Various SDLC methodologies have been developed to guide the processes involved,
including the waterfall model (which was the original SDLC method); rapid application
development (RAD); joint application development (JAD)

1B
2B
3C
4 . Consists of stages in development of a software application from design to deve lopment,
each stage completed sequentially before the next stage is completed
2.13 Answers for fill in the blanks

The Waterfall Model was first Process Model to be introduced. It is also referred to as a
linear-sequential life cycle model. It is very simple to understand and use. In a waterfall
model, each phase must be completed fully before the next phase can begi n. This type of
model is basically used for the project which is small and there are no uncertain
requirements. the end of each phase, a review takes place to determine if the project is on
the right path and whether or not to continue or discard the project. In this model the
testing starts only after the development is complete. In waterfall model phases do not
overlap.
1D
2 . Each phase must be completed fully before the next phase can begin. This type of model
is basically used for the project which is small
3 Diagram of each stage

2.14 Answers for fill in the blanks

The spiral model is similar to the incremental model, with more emphasis placed on risk
analysis. The spiral model has four phases: Planning, Risk Analysis, Engineering and
Evaluation. A software project repeatedly passes through these phases in iterations (called
Spirals in this model). The baseline spiral, starting in the planning phase, requirements are
gathered and risk is assessed. Each subsequent spirals builds on the baseline spiral.
1A
2. The spiral model has four phases: Planning, Risk Analysis, Engineering and Evaluation.
3 Diagram of each stage needs to be drawn

Comp
1
COMPUTER SYSTEMS - 107
OCR COMPUTER SCIENCE

2.15 Answers for fill in the blanks

Procedural language is a type of computer programming language that specifies a series of


well-structured steps and procedures within its programming context to compose a
program. It contains a systematic order of statements, functions and commands to
complete a computational task or program. Examples include, C, C++, Pascal, Python which
are all procedural types of languages
1B
2C
3. Specifies a series of well-structured steps and procedures within its programming context
4 Advantages, well structured, high level language that includes functions/procedures
2.16 Answers for fill in the blanks

A programming language that is once removed from a computer's machine language.


Machine languages consist entirely of numbers and are almost impossible for humans to
read and write. Assembly languages have the same structure and set of commands as
machine languages, but they enable a programmer to use names instead of numbers.
1b
2a
3 . Machine languages consist entirely of numbers and are almost impossible for humans to
read and write.
4 INC, ADD, Count
2.17 Answers for fill in the blanks

Developed for use with"The Architecture of Computer Hardware and Software Systems:
An Information Technology Approach" Second and Third Editions by Irv Englander
The Little Man Computer (LMC) was created by Dr. Stuart Madnick. The LMC models a
simple von Neumann architecture computer, so it has all of the basic features of a modern
computer. The LMC can be programmed in machine or assembly code, and the following
simulator will allow you to run your programs

1b
2a
3 The LMC has nine instructions. Each instruction has an assembly mnemonic that is
equivalent to a three-digit (decimal) instruction. In this numerical instruction, the first digit
usually represents the instruction, and the second and third digits usually represent a
mailbox address.
4 INP OUT HLT
2.18 1 Pseudcode is a type of structured language used to produce algoryhtms or code
2 Student grade must be higher than 60 to attain a pass, else less than 60, student has
attained a failr
3. Easy to write, understand and develop. Provides structure to algorithms and coding

3.1 Answers for fill in the blanks activity:

Lossless compression, every single bit of data that was originally in the file remains after the
file is uncompressed. All of the information is completely restored. lossy compression
reduces a file by permanently eliminating certain information, especiall y redundant
information. When the file is uncompressed, only a part of the original information is still
there (although the user may not notice it). Lossy compression is generally used for video
Comp and sound

1
COMPUTER SYSTEMS - 108
OCR COMPUTER SCIENCE

1A
2B
3 Reduces file size and Easy to transport
3.2 Answers for fill in the blanks

Encryption is the conversion of electronic data into another form, called ciphertext, which
cannot be easily understood by anyone except authorized parties. The primary purpose of
encryption is to protect the confidentiality of digital data stored on computer systems or
transmitted via the Internet or other computer networks. Modern encryption algorithms
play a vital role in the security assurance of IT systems

1B
2 Ciphertext, which cannot be easily understood by anyone except authorized parties
3 Advantages: Protects, file/folders from unwanted sources. Can only be decipher by a key.

3.3 Answers for fill in the blanks

Hashing is the transformation of a string of characters into a usually shorter fixed-length


value or key that represents the original string. Hashing is used to index and retrieve items
in a database because it is faster to find the item using the shorter hashed key than to find it
using the original value. It is also used in many encryption algorithms.

1C
2 Hashing is the transformation of a string of characters into a usually shorter fixed-length -
Indexing
3. Advantages, easy to index and retrieve items in the database, faster and efficient
3.4 Answers for fill in the blanks activity:

A database is a data structure that stores organized information. Most databases contain
multiple tables, which may each include several different fields. For example, a company
database may include tables for products, employees, and financial records. Each of these
tables would have different fields that are relevant to the information stored in the table
1B
2 Normalisation
3 Provide structure to the database, produces fieldnames/primary keys for tables and
indentifies relationships between tables
3.5 Answers for fill in the blanks

Normalization usually involves dividing a database into two or more tables and defining
relationships between the tables. The objective is to isolate data so that additions,
deletions, and modifications of a field can be made in just one table and then propagated
through the rest of the database via the defined relationships.
1A
2 Produces defined relationship between tables and identifies tables/content to be
produced.
3 First /second Normal Form - fundamental rules for database normalization and relates to a
single table within a relational database, producing tables and relationships. 3NF states that
all column reference in referenced data that are not dependent on the primary key should
be removed.
3.6 Answers for fill in the blanks activity:
Comp
1
COMPUTER SYSTEMS - 109
OCR COMPUTER SCIENCE

An entity-relationship diagram (ERD) is a graphical representation of an information system


that shows the relationship between people, objects, places, concepts or events within that
system. An ERD is a data modeling technique that can help define business processes and
can be used as the foundation for a relational database. There are three types, One -to-one
(1:1). One-to-many (1:M). and Many-to-many (M:N).
1C
2 Accept Any drawing with the correct symbols
3 Accept 3 tables linked together via primary keys to foreign keys showing M:N relationships
3.7 Answers for fill in the blanks

A primary key is a unique identifier for a database record. When a table is created, one of
the fields is typically assigned as the primary key. While the primary key is often a number, it
may also be a text field or other data type. For example, if a database contains definitions of
computer terms, it would make sense that each term is only listed once in the database. By
defining the "Term" field as the primary key, it would ensure that no term is listed more
than once in the database.
1 Unique identifier within a table
2C
3 provide unique identifier for a database record, able to organise the database, provide
links or relationship between the database, not able to duplicate tables or fieldnames.
3.8 Answers for fill in the blanks activity:

A collection of programs that enables you to store, modify, and extract information from a
database. There are many different types of DBMSs, ranging from small systems that run on
personal computers to huge systems that run on mainframes. The following are examples of
database applications: computerized library systems, automated teller machines, flight
reservation systems and computerized parts inventory systems

1C
2 DBMS are large database system used for ATM/Libray systems
3. Provides quick access to information, stores large amounts of information,
organises/structures the information.

3.9 Answers for fill in the blanks

SQL (Structured Query Language) is a standard interactive and programming language for
getting information from and updating a database. Although SQL is both an ANSI and an ISO
standard, many database products support SQL with proprietary extensions to the standard
language. Queries take the form of a command language that lets you select, insert, update,
find out the location of data, and so forth. There is also a programming interface.
1A
2 Queries take the form of a command language that lets you select, insert, update
3 SQL Queries can be used to retrieve large amounts of
records from a database quickly and efficiently. Well Defined Standards Exist:
SQL databases use long-established standard, which is being adopted by ANSI & ISO. Non-
SQL
databases do not adhere to any clear standard.
* No Coding Required: Using standard SQL it is easier to manage database systems without
having to write substantial amount of code.
3.10 Atomicity. In a transaction involving two or more discrete pieces of information, either all of
Comp the pieces are committed or none are.

1
COMPUTER SYSTEMS - 110
OCR COMPUTER SCIENCE

Consistency. A transaction either creates a new and valid state of data, or, if any failure
occurs, returns all data to its state before the transaction was started.
Isolation. A transaction in process and not yet committed must remain isolated from any
other transaction.
Durability. Committed data is saved by the system such that, even in the event of a failure
and system restart, the data is available in its correct state.
record locking - is the technique of preventing simultaneous access to data in a database, to
prevent inconsistent results
redundancy
Data redundancy is a condition created within a database or data storage technology in
which the same piece of data is held in two separate places. This can mean two dif ferent
fields within a single database, or two different spots in multiple software environments or
platforms. Whenever data is repeated, this basically constitutes data redundancy. This can
occur by accident, but is also done deliberately for backup and recovery purposes.

3.11 1. A database is a organised system.


2. An example of a database application would be
3. Normalisation is the process of producing a database with relationships
4. 1NF stands for first normal form
5. DBMS stands for database management system
6. 3NF stands for third normal form
7. BNF is Backus Normal Form or Backus–Naur Form
8. Polish notion is also known as Polish prefix notation
9. A definition of polish notion is orm of notation for logic, arithmetic, and algebra.
10. LIFO – last in first out
3.12 1C
2B
3 LAN – localised/shared access – WAN – distribution/access to information across larger
areas
4 Localised networks/Global network
3.13 LAN – Switches, Wireless Access Points, Servers, Thin Client PC, Printer
WAN – Switch/Router/Server/File Server/Mail Server
3.14 1B
2C
3 Advantages: Small packets transmission, less loss and more reliability. Reduced latency
4 Difference - type of network in which relatively small units of data called packets/ type of
network in which relatively small units of data called packets
3.15 1B
2 physical and logical protocols are based on the OSI model, consisting of 7 layers.
3 TCP – transport datagram across a network – IP – provides unique number to identify a
client on a network
4 Data transmission allows data to be transported across a network
3.16 Accept marks for each

1. TCP is a network protocol used for transporting data packets


2. IP stands for Internet Protocol
3. SMTP provides Simple Mail transfer protocol
4. FTP is File transfer protocol
5. POP provides the sending/receiving of email
6. HTTP is web based protocol
Comp 7. In OSI, Layer 1 is known as: Physical

1
COMPUTER SYSTEMS - 111
OCR COMPUTER SCIENCE

8. In OSI, Data link is layer 2


9. In OSI, Transport layer is layer 4
10. UDP is User Datagram Protocol
3.17 1. Data transmission is process of transmitting data
2. Full Duplex is , a connection between two devices is capable of sending data in both
directions simultaneously
3. Parity checks are A parity bit, or check bit is a bit added to the end of a string of binary
code that indicates whether the number of bits in the string with the value one is even or
odd
4. Packet switching is Packet-switched describes the type of network in which relatively
small units of data called packets are routed through a network
5. Circuit switching is Circuit-switched is a type of network in which relatively small units of
data called packets
6. TCP stands for Transmission control protocol
7. An example of IP is 192.168.0.1
8. IP stands for Internet Protocol
9. A network protocol is a process of transport information across the intenet
10. SMTP provides sending/receiving email
3.18 1D
2. Monitor system files, protect against download of virus/Trojans
3 Advantages – protect system files from virus/deletion
4 OS can be corrupted by virus/Trojans / personal data can be stolen / system becomes
vulnerable to attack and DDOS
3.19 1C
2 Monitors incoming/outgoing network connections
3 Provides a shield against outside threats / Stops external attacks through DDOS
4 Virus/Hacks/Trojan/DDOS attack – Stop files transmitting data to external sources
3.20 HTML, CSS and JavaScript.
Web Technology languages to produce webpages and specific scripts, eg login scripts
Search engine indexing
Search engine indexing collects, parses, and stores data to facilitate fast and accurate
information retrieval. Index design incorporates interdisciplinary concepts from linguistics,
cognitive psychology, mathematics, informatics, and computer science. An alternate name
for the process in the context of search engines designed to find web pages on the Internet
is web indexing.
PageRank algorithm.
The Google algorithm's most important feature is arguably the PageRank system, a patented
automated process that determines where each search result appears on Google's search
engine return page. Most users tend to concentrate on the first few search results, so
getting a spot at the top of the list usually means more user traffic.
Server and client side processing.

The Server - This technology is responsible for serving pages.


The Client - This technology requests pages from the Server, and displays them to the user.
In most cases, the client is a web browser.
3.21 Answers for fill in the blanks activity:

PageRank is one of the methods Google uses to determine a page’s relevance or


importance. PageRank is a numeric value that represents how important a page is on the
web. Google figures that when one page links to another page, it is effectively casting a vote
Comp for the other page. The more votes that are cast for a page, the more important the page

1
COMPUTER SYSTEMS - 112
OCR COMPUTER SCIENCE

must be. Also, the importance of the page that is casting the vote determines how
important the vote itself is. Google calculates a page's importance from the votes cast for it.
1B
2 Sorts/index/votes of the relevance of a website
3 . Google figures that when one page links to another page, it is effectively casting a vote
for the other page.

4.1 A bit is a value of either a 1 or 0 (on or off). – Nibble A Nibble is 4 bits.


Byte -Today, a Byte is 8 bits. 1 character, e.g. "a", is one byte.
Kilobyte (KB) - A Kilobyte is 1,024 bytes. 2 or 3 paragraphs of text.
Megabyte (MB) A Megabyte is 1,048,576 bytes or 1,024 Kilobytes 873 pages of plaintext
(1,200 characters) 4 books (200 pages or 240,000 characters)
Gigabyte (GB) A Gigabyte is 1,073,741,824 (230) bytes. 1,024 Megabytes, or 1,048,576
Kilobytes.
894,784 pages of plaintext (1,200 characters)
4,473 books (200 pages or 240,000 characters)
640 web pages (with 1.6MB average file size)
341 digital pictures (with 3MB average file size)
256 MP3 audio files (with 4MB average file size)
1 650MB CD
Terabyte (TB) A Terabyte is 1,099,511,627,776 (240) bytes, 1,024 Gigabytes, or 1,048,576
Megabytes.

4.2 1C
2 1 – 0001 3 –0011 G -1111
3 Computers can only use binary numbers. A binary number is a representation of any other
number broken down into powers of 2. This allows the number to consist simply of on and
off signals. Computers can only see any signal as an electrical state, on or off, so you need
binary numbers for the computer to understand them.
4.3 1B
2 1000 – 8, 1111 - F/15
3Simplifies use of the binary, allows binary to be converted into letters
4.4 1C
2D
3 32 and 35
4.5 1 - A binary code represents text or computer processor instructions using the binary
number system's two binary digits, 0 and 1. The binary code assigns a bit string to each
symbol or instruction.
0110111 - 55
01101101 - 109
11000111 -199
0011101 - 29
1010101 - 85
0110011 - 51
1101011 - 107
111011 - 59
0100111 - 39
10111101 - 189
10110111 -183
11010111 -215
Comp 10110101 -181

1
COMPUTER SYSTEMS - 113
OCR COMPUTER SCIENCE

1011101 -93
01100011 -99
11011111 -223
00110111 -55
0011111 -31
10111111 -191
00111111 -63
0001111 -15
1111111 -127
1111101 -125
10111011 -187
00111011 -59
1100111011 -827
4.7 Answers for fill in the blanks

A bitwise operation operates on one or more bit patterns or binary numerals at the level of
their individual bits. It is a fast, primitive action directly supported by the processor, and is
used to manipulate values for comparisons and calculations. On simple low-cost processors,
typically, bitwise operations are substantially faster than division, several times faster than
multiplication, and sometimes significantly faster than addition:

1. C
2 Advantages, faster execution of operating on low cost processors, faster on division
3. &
Binary AND Operator copies a bit to the result if it exists in both operands.
(A & B) will give 12 which is 0000 1100
4.8 Answers for fill in the blanks

Floating-point arithmetic is considered an esoteric subject by many people. This is rather


surprising because floating-point is ubiquitous in computer systems. Almost every language
has a floating-point datatype; computers from PCs to supercomputers have floating-point
accelerators; most compilers will be called upon to compile floating-point algorithms from
time to time; and virtually every operating system must respond to floating-point exceptions
such as overflow.

1B
2 Floating-point numbers are represented in computer hardware as base 2 (binary)
fractions. For example, the decimal fraction
3 1. Advantage Provides a very large range
2. Disadvantage Rounds off large numbers
4.9 Answers for fill in the blanks

C programming language provides a data structure called the array, which can store a fixed-
size sequential collection of elements of the same type. An array is used to store a collection
of data, but it is often more useful to think of an array as a collection of variables of the
same type. Instead of declaring individual variables, such as number0, numbe r1, ..., and
number99, you declare one array variable such as numbers and use numbers[0],
numbers[1], and ..., numbers[99] to represent individual variables. A specific element in an
array is accessed by an index.

Comp 1C

1
COMPUTER SYSTEMS - 114
OCR COMPUTER SCIENCE

2Y ou declare the type of an array. The type indicates what type of objects/values you can
put in the array. (An ArrayList object stores Object objects).
Arrays can either hold primitive values or object values.
You must decide the size of the array when it is constructed.
3 List arrays : myList=[1,2,3,4,5,6]
4.10 Answers for fill in the blanks

Boolean algebra and truth tables can be used to describe logical expressions.. Boolean
Operators are simple words (AND, OR, NOT or AND NOT) used as conjunctions to combine
or exclude keywords in a search, resulting in more focused and
productive results. This should save time and effort by eliminating inappropriate hits that
must be scanned before discarding.

1C
2 And / OR / NOT or AND NOT
3 save time and effort by eliminating inappropriate hits – Provide only two possible
answers. Results are more focussed and defined
4.11 Answers for fill in the blanks

A Karnaugh map (K-map) is a pictorial method used to minimize Boolean expressions


without having to use Boolean algebra theorems and equation manipulations. A K-map can
be thought of as a special version of a truth table . Using a K-map, expressions with two to
four variables are easily minimized. Expressions with five to six variables are more difficult
but achievable, and expressions with seven or more variables are extremely difficult (if not
impossible) to minimize using a K-map.
1C
2 Use of pictorial method, minimises expression
3 Easier to develop and understand – use of clear expressions and achievable variables.
4.12 1C
2 Simples Boolean – uses AND or NOR
3. Accept any example
4.13

Three Input OR Gate

Comp Four Input OR Gate

1
COMPUTER SYSTEMS - 115
OCR COMPUTER SCIENCE

4.14 1B
2B
3C
4A
5D
4.15 Answers for fill in the blanks activity:

Sequential logic is a form of binary circuit design that employs one or more inputs and one
or more outputs, whose states are related by defined rules that depend, in part, on previous
states. Each of the inputs and output(s) can attain either of two states: logic 0 (low) or logic
1 (high). A common example of a circuit employing sequential logic is the flip-flop, also
called a bistable gate. A simple flip-flop has two stable states. The flip-flop maintains its
states indefinitely until an input pulse called a trigger is received
1C
2 has two stable states, waits for A trigger to be received
3 Accept any example for the mark

5.1 DPA – protection personal data


Copyright - protect rights of individual work
Freedom of Information – promote the release of information in the public interest
5.2 Answers for fill in the blanks

The Data Protection Act was created to govern the way data is used. The DPA gives
individuals certain rights regarding information held about them. It places on those
who process data controllers) while giving. to those who are the subject of that data
(data subjects).information covers both facts and opinions about the There are 8
principles of the DPA:

1 Protect personal data


2 Enforcement and Government reporting
3. Has to be relevant and up-to-date – old data must be deleted

5.3 1 Stop illegal use of computer equipment/material or unauthorised access to computers


2Unauthorised access to computer material, Unauthorised access with intent to commit
further offences, Unauthorised modification of computer materi al:
3 Prison term 5 yrs or fine
5.4 1A
1. Fairly and lawfully processed
2. Processed for limited purposes
Comp 3. Adequate, relevant and not excessive

1
COMPUTER SYSTEMS - 116
OCR COMPUTER SCIENCE

4. Accurate
5. Not kept for longer than is necessary
6. Processed in line with your rights
7. Secure
8. Not transferred to other countries without adequate protection
3. Accept any real examples for the marks
4. Fine of money
5.5 1A
22Unauthorised access to computer material, Unauthorised access with intent to commit
further offences, Unauthorised modification of computer material
3 Accept any real work examples
3 Hackers/ Hacking groups, scammers/fraudsters
5.6 1A
2 Monitor surveillance govern investigation
3B
4 Fine and prison sentences
5.7 Answers for fill in the blanks

The Copyright Designs and Patents Act of 1988 states, that it is illegal to copy software
without the permission of the person or company that owns the copyright for the software.
The copyright holder is usually the author of the software or the company that the author
works for. Illegal copying of software reduces the income of software companies. Having
invested money in producing the software in the first place these companies need to earn
income from software sales to recover these costs and make a profit.

1 Protect the rights of individual or companies work


2 Copying of logos/materials – software privacy
3 Music industry, film industry, software companies
5.8 Answers for fill in the blanks

Computers have transformed the workplace and society as a whole. People and
organizations have become dependent on computers to connect them to co-workers,
vendors, customers and information. Computers are used to track schedules,
streamline information and provide needed data. Although computers have provided
workers countless tools for business and easier access to information nearby or
abroad, there are negative effects. These include more than the obviously dreaded
system failures and cyber crimes.

1A
2 Use of ATM, robtots, self managing system, expert systems
3 Increase productivity and efficiency – people lose their jobs, replaced by computers

5.9 Answers for fill in the blanks

Automated decision-making is when a video workflow automation system determines which


branches of a process to run, based upon data within the workflow, while the workflow is
running. The newest generation of tools for video workflow design and automation allow
the ability to model and automate this type of decision-making. decision-making. Decisions
typically can be made upon a wide variety of data present in a workflow. For example,
decisions may be made using the results of media analysis — the examination of file headers
to determine media properties, extraction of media metadata, video or audio analysis,
Comp quality measurements or reference checks

1
COMPUTER SYSTEMS - 117
OCR COMPUTER SCIENCE
1C
2 To model existing system, make decision using these systems for production/media
industry
3 video or audio analysis, quality measurements or reference checks
5.10 Answers for fill in the blanks

Internet censorship is the control or suppression of what can be accessed, published, or


viewed on the Internet. It may be carried out by governments or by private organizations at
the behest of government, regulators, or on their own initiative. Individuals and
organizations may engage in self-censorship for moral, religious, or business reasons, to
conform to societal norms, due to intimidation, or out of fear of legal or other
consequences. The extent of Internet censorship varies on a country-to-country basis

1A
2 Stop certain types of information being in the public domain
3 Accept any answer here from a real world example
5.11 Answers for fill in the blanks

Artificial intelligence is the simulation of human intelligence processes by machines,


especially computer systems. These processes include learning (the acquisition of
information and rules for using the information), reasoning (using the rules to reach
approximate or definite conclusions), and self-correction. Particular applications of AI
include expert systems, speech recognition, and machine vision.
1C
2.purpose of simulation of human intelligence processes by machines
3 Get machines to do jobs humans can do, improve efficincy and productivity in the
workforce etc
5.12 Automated decision making - Automated decision-making is when a video workflow
automation system determines which branches of a process to run, based upon data within
the workflow
Artificial intelligence - Artificial intelligence is the simulation of human intelligence processes
by machines,
Censorship and the Internet - Internet censorship is the control or suppression of what can
be accessed, published, or viewed on the Internet
Piracy and offensive communications. – Piracy of software and stop harassment of other
using communication, eg email/social media

Comp
1
COMPUTER SYSTEMS - 118

You might also like