Untitled Document
Untitled Document
1 hour 45 minutes
Instructions:
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
……………………………………………………………………………………………………………
[4 marks]
(b) Part of a MAC address is given as 3F-2B-A9. Convert the hexadecimal digits to binary.
…………………………………………………………………………………………………………….
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
[3 marks]
…………………………………………………………………………………………………………
………………………………………………………………………………………………………….
[2 marks]
(d) A logical right shift of three places is performed on the binary number 11010100.
(i) Complete the binary register after the right shift.
,........................................................................................................................................................
[1 mark]
(ii) State the effect of this logical shift on the value of the binary number.
…………………………………………………………………………………………………………….
[1 mark]
(e) Convert the denary number -25 to its two's complement binary equivalent in an 8-bit register.
………………………………………………………………………………………………………………
……………………………………………………………………………………………………………
[2 marks]
……………………………………………………………………………………………………………….
.
……………………………………………………………………………………………………………….
.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
[4 marks]
(b) The website allows customers to upload images and videos, which are compressed to
reduce file size.
(i) Describe the difference between lossy and lossless compression.
………………………………………………………………………………………………………………
…………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
[3 marks]
(ii) Suggest one situation where lossless compression would be more appropriate than lossy
compression.
…………………………………………………………………………………………………………
[1 mark]
(c) The company is concerned about the possibility of a phishing attack. Explain what a
phishing attack is and how it could compromise the security of their system.
…………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
[3 marks]
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………
[6 marks]
(b) The computer has been upgraded from a single-core to a quad-core CPU. Explain how this
upgrade affects the performance of the computer.
……………………………………………………………………………………………………………..
………………………………………………………………………………………………………………
……………………………………………………………………………………………………………..
[3 marks]
4. A company uses a mixture of system and application software.
(a) Explain the difference between system software and application software, giving one
example of each.
…………………………………………………………………………………………………………..
…………………………………………………………………………………………………………….
……………………………………………………………………………………………………………..
[3 marks]
(b) Describe the role of the operating system in managing files and memory
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………….
.
[4 marks]
…………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
.
[3 marks]
(b) Data transmission errors can occur. Explain the use of a parity check to detect errors during
data transmission.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………..
[3 marks]
(c) The company is upgrading its network to improve security. Explain how a firewall can help
secure their system.
…………………………………………………………………………………………………………..
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………..
[3 marks]
………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
………………………………………………………………………………………………………………
[4 marks]
………………………………………………………………………………………………………
…………………………………………………………………………………………………………..
[2 marks]
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………..
[2 marks]
(b) ASCII uses 7 bits to represent each character. If the computer switches to Unicode, explain
how this would affect the storage of text data.
……………………………………………………………………………………………………………..
……………………………………………………………………………………………………………….
.
[2 marks]
8. A student is using virtual memory on their computer.
(a) Draw a diagram showing how virtual memory is created and used when the computer runs
out of physical memory (RAM).
…………………………………………………………………………………………………………….
…………………………………………………………………………………………………………..
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
[4 marks]
(b) Explain why a computer might need to use virtual memory when running several large
applications.
……………………………………………………………………………………………………………
…………………………………………………………………………………………………………..
…………………………………………………………………………………………………………….
[3 marks]
10. A company uses Secure Sockets Layer (SSL) to protect data on its
website.
Explain how SSL works and describe how it provides a secure connection when customers
access the website.
………………………………………………………………………………………………………
………………………………………………………………………………………………………..
………………………………………………………………………………………………………..
………………………………………………………………………………………………………
……………………………………………………………………………………………….
………………………………………………………………………………………………………..
………………………………………………………………………………………………………….
…………………………………………………………………………………………………………..
[6 marks]
End of Paper