0% found this document useful (0 votes)
50 views2 pages

Worksheet 1 IGCSE 1

The document is a worksheet for IGCSE 1 that includes various questions related to computer science topics such as input and output devices, data transmission, error detection methods, CPU architecture, printer technologies, binary and hexadecimal conversions, encryption methods, and touch screen technology. Each section requires students to identify, describe, explain, and compare different concepts and technologies. The worksheet aims to assess students' understanding of fundamental computing principles and their applications.

Uploaded by

skondle045
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views2 pages

Worksheet 1 IGCSE 1

The document is a worksheet for IGCSE 1 that includes various questions related to computer science topics such as input and output devices, data transmission, error detection methods, CPU architecture, printer technologies, binary and hexadecimal conversions, encryption methods, and touch screen technology. Each section requires students to identify, describe, explain, and compare different concepts and technologies. The worksheet aims to assess students' understanding of fundamental computing principles and their applications.

Uploaded by

skondle045
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Worksheet 1

Class: IGCSE 1

1. Answer all the questions:


1.a Identify one input device that is part of a smartphone.
1.b Identify two output devices that are part of a smartphone.
1.c All smartphones have a MAC address.
a. Define the term “MAC address.”
b. Describe the structure of a MAC address.
1.d Explain why a smartphone requires both RAM and ROM.
1.e For a tablet device, identify one additional input device (beyond those typically found on a
smartphone) and discuss how it enhances user interaction.
1.f Explain the significance of multi-touch input technology in modern portable devices.
2. Answer all the questions:
2.a List three benefits of using a USB port to connect a mobile device to a computer.
2.b State the type of data transmission used when transferring data using a USB port.
2.c Describe how lossless compression reduces the file size of photos without reducing quality.
2.d Compare USB 2.0 and USB 3.0 in terms of data transmission speed and power efficiency.
2.e Discuss the differences between lossless and lossy compression, and provide an example scenario
for when each might be used.
3. Answer all the questions:
3.a Give two similarities between the check digit and checksum methods.
3.b Identify one other error detection method and describe how it checks for errors.
3.c Explain how the parity bit method detects errors and discuss its limitations.
3.d Describe the principles of cyclic redundancy check (CRC) and its application in error detection.
4. Answer all the questions:
4.a Given a list of computer components, indicate which ones are part of the central processing unit
(CPU) in the Von Neumann model.
4.b Identify three registers that may be used within the CPU.
4.c Besides the decode stage, name the two other stages in the instruction cycle and identify the
component responsible for decoding instructions.
4.d Discuss the differences between Von Neumann and Harvard architectures, noting advantages and
disadvantages of each.
4.e Describe the role of the Control Unit within the CPU and how it contributes to instruction processing.
5. Answer all the questions:
5.a When a paper jam occurs in an inkjet printer, what type of signal is sent to alert the computer?
5.b Identify one benefit and two drawbacks of using an inkjet printer (instead of a laser printer) for
printing photos.
5.c Given several statements about printers, decide which apply to inkjet printers and which to laser
printers.
5.d List and compare three different printer technologies (inkjet, laser, and dot matrix), focusing on their
main advantages and drawbacks.
5.e Explain the process by which printers communicate error messages (such as paper jams) to a
computer system.
6.a Convert the denary numbers 185 , 252 and 127 into their 8-bit binary equivalents.
6.b Convert the denary number 333 into its 12-bit binary equivalent.
6.c Convert the 8-bit binary numbers 10011011 , 01011101 and 11110000 into their hexadecimal
equivalents.
6.e Convert the hexadecimal number A3 into its binary and denary equivalents.
7.a Identify three registers that may be used within the CPU of a Von Neumann system.
7.b Apart from the decode stage, name the two other stages in the instruction cycle and specify the
component responsible for decoding instructions.
7.c Explain why registers are essential for CPU performance and how they affect processing speed.
7.d Describe the fetch-decode-execute cycle in detail, discussing the function of each stage.
8.a Describe how data is encrypted using symmetric encryption, with reference to the process involved.
8.b Compare symmetric encryption with asymmetric encryption, highlighting the advantages and
disadvantages of each approach.
8.c Provide a real-world example where symmetric encryption is preferred for data security.
9.a

Six statements are given about touch screen technology. Tick (3) to show if the statement applies to
Capacitive or Resistive touch screen technology.
9.b Describe the operational principle behind capacitive touch screens and how it differs from resistive
technology.
9.c Discuss potential applications where resistive touch screens might be more suitable than capacitive
ones, and explain why.
10.a Convert the 12-bit binary value 010011000001 to its denary equivalent.
10.b Convert the 12-bit binary value 000011101001 to its hexadecimal equivalent.
10.c Provide three examples of HTML colour codes and explain how the hexadecimal system represents
these colours.
10.d Convert the denary number 200 into both its 8-bit binary and hexadecimal equivalents.
10.e Create a small exercise: Convert a list of denary values (e.g., 45, 78, 150) into 8-bit binary and
hexadecimal forms.

You might also like