0% found this document useful (0 votes)
13 views

Computer Unit Test As

This document is a Cambridge International AS & A Level Computer Science Unit Test Paper that includes instructions for answering questions, information on marks allocation, and various questions related to software development, logic expressions, data security, and encryption methods. It requires candidates to answer all questions in the spaces provided and prohibits the use of calculators and certain writing tools. The test assesses knowledge in ethical practices, artificial intelligence, logic circuits, data security measures, and encryption techniques.

Uploaded by

sumanbasnet80123
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Computer Unit Test As

This document is a Cambridge International AS & A Level Computer Science Unit Test Paper that includes instructions for answering questions, information on marks allocation, and various questions related to software development, logic expressions, data security, and encryption methods. It requires candidates to answer all questions in the spaces provided and prohibits the use of calculators and certain writing tools. The test assesses knowledge in ethical practices, artificial intelligence, logic circuits, data security measures, and encryption techniques.

Uploaded by

sumanbasnet80123
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Unit Test

Cambridge International AS & A Level


* 3 0 1 4 9 9 4 8 4 1 *

COMPUTER SCIENCE 9618/12


Paper 1 Theory Fundamentals

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION

● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

DC (LK) 205797/1
© UCLES 2021 [Turn over
4

1 Aisha manages a team of software developers.

(a) Explain the reasons why it is important that Aisha acts ethically in relation to her team
members.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) The team are developing a computer game where the user plays a board game (such as
chess) against the computer.

Describe how the computer would use Artificial Intelligence (AI) to play the board game.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(c) The final game will be released under a licence.

Tick (3) one or more boxes in each row to identify the licence(s) each statement describes.

Free Open
Commercial
Statement Software Source Shareware
Software
Foundation Initiative

The user can edit the source code

The user must always pay before being


able to use the software

The user can redistribute the software

The user always gets a trial period

[4]

© UCLES 2021 9618/12/M/J/21


5

2 A logic expression is given:

S = (A AND B AND C) OR (B XOR C)

(a) Draw the logic circuit for the given expression.

B S

[4]

(b) Complete the truth table for the logic expression:

S = (A AND B AND C) OR (B XOR C)

A B C Working space S

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

© UCLES 2021 9618/12/M/J/21 [Turn over


14

3 A company has several security measures in place to prevent unauthorised access to the data on
its computers.

(a) Describe the difference between the security and privacy of data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Each employee has a username and password to allow them to log onto a computer. An
employee’s access rights to the data on the computers is set to either read-only, or read and
write.

Identify one other software-based measure that could be used to restrict the access to the
data on the computers.

...................................................................................................................................................

............................................................................................................................................. [1]

(c) The company is also concerned about threats posed by networks and the internet.

Identify two threats to the data that are posed by networks and the internet.

Threat 1 ....................................................................................................................................

...................................................................................................................................................

Threat 2 ....................................................................................................................................

...................................................................................................................................................
[2]

(d) Describe the method how public key encryption is performed.

...................................................................................................................................
...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................

...................................................................................................................................
© UCLES 2021 9618/12/M/J/21
[3]

You might also like