0% found this document useful (0 votes)
44 views12 pages

Cambridge O Level: Computer Science 2210/13

This document is an examination paper for the Cambridge O Level Computer Science subject, specifically Paper 1 on Computer Systems, scheduled for October/November 2024. It contains instructions for candidates, information about the marking scheme, and a series of questions covering various topics in computer science, including data storage, binary numbers, email transmission, encryption, and automated systems. The paper is structured to assess students' understanding and application of computer science concepts within a 1 hour 45 minutes timeframe.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views12 pages

Cambridge O Level: Computer Science 2210/13

This document is an examination paper for the Cambridge O Level Computer Science subject, specifically Paper 1 on Computer Systems, scheduled for October/November 2024. It contains instructions for candidates, information about the marking scheme, and a series of questions covering various topics in computer science, including data storage, binary numbers, email transmission, encryption, and automated systems. The paper is structured to assess students' understanding and application of computer science concepts within a 1 hour 45 minutes timeframe.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

* 0000800000001 *

, ,

Cambridge O Level

¬Wz> 4mHuOªEŠ_|5€W
¬¨/rPž¬”j{pƒF5Yb‚
¥•uU55 55Ue •¥U¥U
* 8 1 7 4 1 3 5 8 2 8 *

COMPUTER SCIENCE 2210/13


Paper 1 Computer Systems October/November 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

DC (EV) 348273
© UCLES 2024 [Turn over
* 0000800000002 *

DO NOT WRITE IN THIS MARGIN


2
, ,

1 Data can be measured using different units of storage.

(a) Tick (✓) one box to show which of the following is the largest unit of data storage.

A tebibyte (TiB)

B pebibyte (PiB)

C mebibyte (MiB)

D gibibyte (GiB)

DO NOT WRITE IN THIS MARGIN


[1]

(b) A computer has primary storage.

Give one example of primary storage.

Explain the purpose of your chosen example.

Example ....................................................................................................................................

Explanation ...............................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) All data is converted to binary to be processed by a computer.

(i) Calculate the binary number for the denary number 175. Show all your working.

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

ĬÕú¾Ġ´íÈõÏĪÅĊÞú·þ×
© UCLES 2024 ĬĨ­ñÍĪĠöÑĆĊĠî¿ĩĚćĂ
ĥÅĥÕõÕÅÕąĕõÅąÕąĕÅÕ
2210/13/O/N/24
* 0000800000003 *
DO NOT WRITE IN THIS MARGIN

3
, ,

(ii) Give the binary number for the given hexadecimal numbers.

15 ......................................................................................................................................

2D ......................................................................................................................................

091 ....................................................................................................................................
[3]

Working space
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(d) Binary integers can be added together.

Add the two binary integers using binary addition. Show all your working. Give your answer
in binary.
DO NOT WRITE IN THIS MARGIN

11100011
+ 11001100

[4]

(e) Calculate the denary number for the two’s complement binary integer 10001110. Show all
your working.
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN

Ĭ×ú¾Ġ´íÈõÏĪÅĊÞü·þ×
© UCLES 2024 ĬĨ®òÕĠĤĆèô÷éê·­Ě÷Ă
ĥÅĕĕµµåµĕĥåÅąµĥÕÕÕ
2210/13/O/N/24 [Turn over
* 0000800000004 *

DO NOT WRITE IN THIS MARGIN


4
, ,

2 An employee has a report that they need to email to their employer.

The employee compresses the report file before emailing it.

(a) State the effect the compression has on the report file.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Give two benefits of compressing the report file before emailing it.

DO NOT WRITE IN THIS MARGIN


1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(c) The employee decides to use lossless compression to compress the file.

DO NOT WRITE IN THIS MARGIN


Explain why lossy compression is not suitable.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

DO NOT WRITE IN THIS MARGIN


(d) When the employee enters the email address, the computer uses Unicode to convert the
email address to binary.

(i) State what Unicode is an example of.

..................................................................................................................................... [1]

(ii) Give two advantages of the computer using Unicode instead of American standard code
for information interchange (ASCII).

1 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

ĬÕú¾Ġ´íÈõÏĪÅĊàú·Ā×
© UCLES 2024 ĬĨ®óÕĦĒăÓîðâČěďĊÿĂ
ĥõÅĕõµåĕõÅÕÅŵÅÕÅÕ
2210/13/O/N/24
* 0000800000005 *
DO NOT WRITE IN THIS MARGIN

5
, ,

(iii) Give one disadvantage of the computer using Unicode instead of ASCII.

...........................................................................................................................................

..................................................................................................................................... [1]

(e) The report is broken down into packets to be emailed.

(i) Circle three items of data that can be found in the packet header.

trailer originator’s address payload


DO NOT WRITE IN THIS MARGIN

interrupt input operating system

destination address antivirus packet number


[3]

(ii) Each packet is sent along a different path from the employee’s device to the employer’s
device.

Tick (✓) one box to show the name of this method of sending packets.
DO NOT WRITE IN THIS MARGIN

A packet networking

B packet circuiting

C packet switching

D packet transferring
[1]

(iii) A hardware device is used to control the path that each packet takes.

Give the name of this hardware device.


DO NOT WRITE IN THIS MARGIN

..................................................................................................................................... [1]

(f) The email data is checked for errors after it has been transmitted, using an echo check and a
checksum.

(i) Explain how the echo check is used to check for errors in the email data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]

Ĭ×ú¾Ġ´íÈõÏĪÅĊàü·Ā×
© UCLES 2024 ĬĨ­ôÍĤĎóæČāħÐģËĊïĂ
ĥõµÕµÕÅõĥµąÅÅÕåĕÕÕ
2210/13/O/N/24 [Turn over
* 0000800000006 *

DO NOT WRITE IN THIS MARGIN


6
, ,

(ii) In the checksum error detection method, two values are compared after transmission. If
the values do not match, an error is detected.

Explain why the values not matching would show an error has occurred.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


..................................................................................................................................... [2]

(g) The email data is encrypted using asymmetric encryption before it is sent.

(i) Give one reason why the email data is encrypted.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Give one similarity between symmetric encryption and asymmetric encryption.

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

..................................................................................................................................... [1]

(iii) Give two differences between symmetric encryption and asymmetric encryption.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


[2]

DO NOT WRITE IN THIS MARGIN

ĬÙú¾Ġ´íÈõÏĪÅĊÝü¶þ×
© UCLES 2024 ĬĨ®ôÒĪöùÞÿôϰěêâÿĂ
ĥåĕÕµõÅÕåÕåÅąÕąÕąÕ
2210/13/O/N/24
* 0000800000007 *
DO NOT WRITE IN THIS MARGIN

7
, ,

3 An instruction is fetched from random access memory (RAM) into the memory data register (MDR)
to be decoded.

(a) Identify two other registers that are used in the fetch stage of the cycle.

1 ................................................................................................................................................

2 ................................................................................................................................................
[2]

(b) Complete and annotate the diagram to show how the data is decoded once it has been
DO NOT WRITE IN THIS MARGIN

fetched into the MDR.

MDR
DO NOT WRITE IN THIS MARGIN

[4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÛú¾Ġ´íÈõÏĪÅĊÝú¶þ×
© UCLES 2024 ĬĨ­óÚĠúĉÛùýÛĬģîâïĂ
ĥåĥĕõĕåµµåõÅąµĥĕĕÕ
2210/13/O/N/24 [Turn over
* 0000800000008 *

DO NOT WRITE IN THIS MARGIN


8
,  ,

4 Complete the table to give the missing term or description for the internet terms.

Internet term Description

.................................................. the collection of web pages accessed using the internet

DO NOT WRITE IN THIS MARGIN


the address given to a device when it connects to the
..................................................
internet

...........................................................................................
web browser
...........................................................................................

...........................................................................................

DO NOT WRITE IN THIS MARGIN


the hardware that stores a database of matching website
..................................................
and IP addresses

a type of hardware that can be used to prevent a


..................................................
distributed denial of service (DDoS) attack

DO NOT WRITE IN THIS MARGIN


...........................................................................................
hacking
...........................................................................................

...........................................................................................
[6]
DO NOT WRITE IN THIS MARGIN

ĬÙú¾Ġ´íÈõÏĪÅĊßü¶Ā×
© UCLES 2024 ĬĨ­òÚĦČĀà÷ĆÔʿвćĂ
ĥĕµĕµĕåĕÕąąÅŵÅĕąÕ
2210/13/O/N/24
* 0000800000009 *
DO NOT WRITE IN THIS MARGIN

9
,  ,

5 A farmer has a plough that is an automated system. The plough is used to dig the ground in a field
to prepare it for planting seeds.

The plough uses sensors and a microprocessor to maintain a straight line when digging the
ground.

(a) State what is meant by an automated system.

...................................................................................................................................................

............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN

(b) Describe the role of the microprocessor in this process.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

............................................................................................................................................. [3]

(c) Give two benefits to the farmer of using an automated system for this purpose.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

(d) The plough uses artificial intelligence (AI) to navigate its way around the field.

Explain how the plough makes use of AI for this purpose.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]
ĬÛú¾Ġ´íÈõÏĪÅĊßú¶Ā×
© UCLES 2024 ĬĨ®ñÒĤĈðÙāûĕĎ·Č²÷Ă
ĥĕÅÕõõÅõÅõÕÅÅÕåÕĕÕ
2210/13/O/N/24 [Turn over
* 0000800000010 *

DO NOT WRITE IN THIS MARGIN


10
, ,

6 (a) Complete the statements about cookies.

Use only terms from the list.

Not all terms need to be used. Some terms may be used more than once.

binary close denary expire

hexadecimal image malware operating system

DO NOT WRITE IN THIS MARGIN


permanent persistent session sound

temporary web browser

Cookies are small text files that are stored by a ....................................................... .

....................................................... cookies are ....................................................... text files

that are deleted when the ....................................................... is closed.

DO NOT WRITE IN THIS MARGIN


....................................................... cookies are ....................................................... text files

that are stored on a user’s secondary storage device until they are manually deleted or they

....................................................... .
[7]

(b) Give three examples of the use of cookies.

1 ................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN

ĬÙú¾Ġ´íÈõÏĪÅĊÞü¸þ×
© UCLES 2024 ĬĨ°òÓĨĄĚâðýúæ½¼ĊïĂ
ĥÅÕÕµĕąĕõµąąÅĕÅĕµÕ
2210/13/O/N/24
* 0000800000011 *
DO NOT WRITE IN THIS MARGIN

11
, ,

7 A computer programmer uses an integrated development environment (IDE) when creating a


computer program.

Explain the purpose of the IDE.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÛú¾Ġ´íÈõÏĪÅĊÞú¸þ×
© UCLES 2024 ĬĨ¯ñÛĢĀĪ×Ċô¯òµĠĊÿĂ
ĥÅåĕõõĥõĥÅÕąÅõåÕåÕ
2210/13/O/N/24
* 0000800000012 *

DO NOT WRITE IN THIS MARGIN


12
, ,

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÙú¾Ġ´íÈõÏĪÅĊàü¸Ā×
© UCLES 2024 ĬĨ¯ôÛĬîğäĈû¸Ôę¾Ě÷Ă
ĥõõĕµõĥÕąĥåąąõąÕµÕ
2210/13/O/N/24

You might also like