Cambridge O Level: Computer Science 2210/13
Cambridge O Level: Computer Science 2210/13
, ,
Cambridge O Level
¬Wz> 4mHuOªE_|5W
¬¨/rP¬j{pF5Yb
¥uU55 55Ue ¥U¥U
* 8 1 7 4 1 3 5 8 2 8 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (EV) 348273
© UCLES 2024 [Turn over
* 0000800000002 *
(a) Tick (✓) one box to show which of the following is the largest unit of data storage.
A tebibyte (TiB)
B pebibyte (PiB)
C mebibyte (MiB)
D gibibyte (GiB)
Example ....................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(i) Calculate the binary number for the denary number 175. Show all your working.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN
ĬÕú¾Ġ´íÈõÏĪÅĊÞú·þ×
© UCLES 2024 ĬĨñÍĪĠöÑĆĊĠî¿ĩĚćĂ
ĥÅĥÕõÕÅÕąĕõÅąÕąĕÅÕ
2210/13/O/N/24
* 0000800000003 *
DO NOT WRITE IN THIS MARGIN
3
, ,
(ii) Give the binary number for the given hexadecimal numbers.
15 ......................................................................................................................................
2D ......................................................................................................................................
091 ....................................................................................................................................
[3]
Working space
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Add the two binary integers using binary addition. Show all your working. Give your answer
in binary.
DO NOT WRITE IN THIS MARGIN
11100011
+ 11001100
[4]
(e) Calculate the denary number for the two’s complement binary integer 10001110. Show all
your working.
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN
Ĭ×ú¾Ġ´íÈõÏĪÅĊÞü·þ×
© UCLES 2024 ĬĨ®òÕĠĤĆèô÷éê·Ě÷Ă
ĥÅĕĕµµåµĕĥåÅąµĥÕÕÕ
2210/13/O/N/24 [Turn over
* 0000800000004 *
(a) State the effect the compression has on the report file.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give two benefits of compressing the report file before emailing it.
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(c) The employee decides to use lossless compression to compress the file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
..................................................................................................................................... [1]
(ii) Give two advantages of the computer using Unicode instead of American standard code
for information interchange (ASCII).
1 ........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
ĬÕú¾Ġ´íÈõÏĪÅĊàú·Ā×
© UCLES 2024 ĬĨ®óÕĦĒăÓîðâČěďĊÿĂ
ĥõÅĕõµåĕõÅÕÅŵÅÕÅÕ
2210/13/O/N/24
* 0000800000005 *
DO NOT WRITE IN THIS MARGIN
5
, ,
(iii) Give one disadvantage of the computer using Unicode instead of ASCII.
...........................................................................................................................................
..................................................................................................................................... [1]
(i) Circle three items of data that can be found in the packet header.
(ii) Each packet is sent along a different path from the employee’s device to the employer’s
device.
Tick (✓) one box to show the name of this method of sending packets.
DO NOT WRITE IN THIS MARGIN
A packet networking
B packet circuiting
C packet switching
D packet transferring
[1]
(iii) A hardware device is used to control the path that each packet takes.
..................................................................................................................................... [1]
(f) The email data is checked for errors after it has been transmitted, using an echo check and a
checksum.
(i) Explain how the echo check is used to check for errors in the email data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
Ĭ×ú¾Ġ´íÈõÏĪÅĊàü·Ā×
© UCLES 2024 ĬĨôÍĤĎóæČāħÐģËĊïĂ
ĥõµÕµÕÅõĥµąÅÅÕåĕÕÕ
2210/13/O/N/24 [Turn over
* 0000800000006 *
(ii) In the checksum error detection method, two values are compared after transmission. If
the values do not match, an error is detected.
Explain why the values not matching would show an error has occurred.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(g) The email data is encrypted using asymmetric encryption before it is sent.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Give one similarity between symmetric encryption and asymmetric encryption.
..................................................................................................................................... [1]
(iii) Give two differences between symmetric encryption and asymmetric encryption.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
ĬÙú¾Ġ´íÈõÏĪÅĊÝü¶þ×
© UCLES 2024 ĬĨ®ôÒĪöùÞÿôϰěêâÿĂ
ĥåĕÕµõÅÕåÕåÅąÕąÕąÕ
2210/13/O/N/24
* 0000800000007 *
DO NOT WRITE IN THIS MARGIN
7
, ,
3 An instruction is fetched from random access memory (RAM) into the memory data register (MDR)
to be decoded.
(a) Identify two other registers that are used in the fetch stage of the cycle.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Complete and annotate the diagram to show how the data is decoded once it has been
DO NOT WRITE IN THIS MARGIN
MDR
DO NOT WRITE IN THIS MARGIN
[4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÛú¾Ġ´íÈõÏĪÅĊÝú¶þ×
© UCLES 2024 ĬĨóÚĠúĉÛùýÛĬģîâïĂ
ĥåĥĕõĕåµµåõÅąµĥĕĕÕ
2210/13/O/N/24 [Turn over
* 0000800000008 *
4 Complete the table to give the missing term or description for the internet terms.
...........................................................................................
web browser
...........................................................................................
...........................................................................................
...........................................................................................
[6]
DO NOT WRITE IN THIS MARGIN
ĬÙú¾Ġ´íÈõÏĪÅĊßü¶Ā×
© UCLES 2024 ĬĨòÚĦČĀà÷ĆÔʿвćĂ
ĥĕµĕµĕåĕÕąąÅŵÅĕąÕ
2210/13/O/N/24
* 0000800000009 *
DO NOT WRITE IN THIS MARGIN
9
, ,
5 A farmer has a plough that is an automated system. The plough is used to dig the ground in a field
to prepare it for planting seeds.
The plough uses sensors and a microprocessor to maintain a straight line when digging the
ground.
...................................................................................................................................................
............................................................................................................................................. [1]
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
............................................................................................................................................. [3]
(c) Give two benefits to the farmer of using an automated system for this purpose.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN
(d) The plough uses artificial intelligence (AI) to navigate its way around the field.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
ĬÛú¾Ġ´íÈõÏĪÅĊßú¶Ā×
© UCLES 2024 ĬĨ®ñÒĤĈðÙāûĕĎ·Č²÷Ă
ĥĕÅÕõõÅõÅõÕÅÅÕåÕĕÕ
2210/13/O/N/24 [Turn over
* 0000800000010 *
Not all terms need to be used. Some terms may be used more than once.
that are stored on a user’s secondary storage device until they are manually deleted or they
....................................................... .
[7]
1 ................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
DO NOT WRITE IN THIS MARGIN
ĬÙú¾Ġ´íÈõÏĪÅĊÞü¸þ×
© UCLES 2024 ĬĨ°òÓĨĄĚâðýúæ½¼ĊïĂ
ĥÅÕÕµĕąĕõµąąÅĕÅĕµÕ
2210/13/O/N/24
* 0000800000011 *
DO NOT WRITE IN THIS MARGIN
11
, ,
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÛú¾Ġ´íÈõÏĪÅĊÞú¸þ×
© UCLES 2024 ĬĨ¯ñÛĢĀĪ×Ċô¯òµĠĊÿĂ
ĥÅåĕõõĥõĥÅÕąÅõåÕåÕ
2210/13/O/N/24
* 0000800000012 *
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÙú¾Ġ´íÈõÏĪÅĊàü¸Ā×
© UCLES 2024 ĬĨ¯ôÛĬîğäĈû¸Ôę¾Ě÷Ă
ĥõõĕµõĥÕąĥåąąõąÕµÕ
2210/13/O/N/24