0% found this document useful (0 votes)
64 views4 pages

Practice Paper1 AnswerScheme Sec05

This document is an examination paper for Cambridge International AS & A Level Computer Science, covering various topics including data representation, networking, hardware, Boolean logic, operating systems, databases, security, ethics, and algorithm design. It contains instructions for answering questions, a total mark of 75, and specific guidelines on the use of materials and writing tools. The paper includes questions that require conversions, explanations, definitions, and algorithm writing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views4 pages

Practice Paper1 AnswerScheme Sec05

This document is an examination paper for Cambridge International AS & A Level Computer Science, covering various topics including data representation, networking, hardware, Boolean logic, operating systems, databases, security, ethics, and algorithm design. It contains instructions for answering questions, a total mark of 75, and specific guidelines on the use of materials and writing tools. The paper includes questions that require conversions, explanations, definitions, and algorithm writing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Cambridge International AS & A Level

COMPUTER SCIENCE 9618/12

Paper 1 Theory Fundamentals

1 hour 30 minutes

INSTRUCTIONS

 Answer all questions.

 Use a black or dark blue pen.

 Write your name, centre number and candidate number in the boxes at the top of the page.

 Write your answer to each question in the space provided.

 Do not use an erasable pen or correction fluid.

 Do not write on any bar codes.

 You may use an HB pencil for any diagrams, graphs or rough working.

 Calculators must not be used in this paper.

INFORMATION

 The total mark for this paper is 75.

 The number of marks for each question or part question is shown in brackets [ ].

 No marks will be awarded for using brand names of software packages or hardware.

1. Data Representation and Multimedia

(a) Convert the decimal number 187 into an 8-bit binary number. [2]

 187 in binary: 10111011 [2 marks]

(b) Explain the purpose of Unicode and how it differs from ASCII. [2]

 Unicode provides a universal character set supporting multiple languages and symbols. [1]

 ASCII is limited to 128 or 256 characters, whereas Unicode supports thousands of characters.
[1]

(c) Describe the difference between lossy and lossless compression. Give one example for each type.
[4]

 Lossy compression permanently removes data to reduce file size, affecting quality. Example:
JPEG for images. [2]

 Lossless compression reduces file size without losing data. Example: ZIP for text files. [2]
2. Communication and Networking

(a) Define the term IP address. [2]

 A unique numerical identifier assigned to a device on a network. [1]

 Used for communication between devices over the internet. [1]

(b) Explain how packet switching is used in data communication. [3]

 Data is divided into packets, each sent independently. [1]

 Packets take the most efficient route to the destination. [1]

 At the destination, packets are reassembled in order. [1]

(c) The following table shows types of network topology. Complete the table by describing each
topology. [4]

Topology Description

Bus
A single central cable connects all devices. Failure of the cable affects the whole network.

Each device connects to a central hub/switch. Failure of a single device does not affect
Star
others.

Ring Devices are connected in a closed loop, and data passes in one direction.

Mesh Devices are interconnected, providing multiple paths for data transmission.

3. Hardware and System Architecture

(a) State one function of the Control Unit (CU) in the CPU. [1]

 Directs the flow of data and instructions within the CPU. [1]

(b) Identify two advantages of solid-state drives (SSD) over hard disk drives (HDD). [2]

 Faster data access speed. [1]

 More durable as there are no moving parts. [1]

(c) Explain how a buffer is used in data transfer. [2]

 Temporary storage for data during transfer. [1]

 Helps manage differences in processing speed between sender and receiver. [1]

(d) Describe the role of interrupts in a computer system. [3]

 Signals that temporarily stop CPU execution to handle urgent tasks. [1]

 The CPU saves its current state and executes the interrupt service routine. [1]

 After processing, the CPU resumes its previous task. [1]


4. Boolean Logic

(a) Write the Boolean expression for the following logic circuit. [3] (Logic circuit diagram given)

 Expression: X = (A AND B) OR (NOT C) [3]

(b) Complete the truth table for the logic expression:

X=AAND(BORNOTC)X = A AND (B OR NOT C)

ABCX

0 000

0 010

0 101

0 110

1 001

1 010

1 101

1 110

5. Operating Systems and Software

(a) Describe the role of virtual memory in an operating system. [3]

 Uses part of the hard drive as RAM when physical memory is full. [1]

 Allows more applications to run simultaneously. [1]

 Slower than actual RAM due to disk access time. [1]

(b) Identify and explain one example of utility software that improves system performance. [3]

 Disk Defragmenter: Rearranges fragmented files for faster access. [1]

 Reduces file access time and improves system efficiency. [2]

6. Databases

(a) Define the term primary key in a relational database. [1]

 A unique identifier for a record in a table. [1]

(b) The following table is not in First Normal Form (1NF). Explain how to modify it to achieve 1NF. [4]

 Separate subjects into individual rows to ensure atomicity. [2]


 Introduce a new Student-Subject table to remove repeating groups. [2]

7. Security and Privacy

(a) State two types of malware and explain their impact. [4]

 Virus: Attaches to files and spreads, corrupting data. [2]

 Spyware: Secretly collects user information without consent. [2]

(b) Describe how encryption improves data security. [2]

 Converts data into unreadable format using an encryption key. [1]

 Ensures only authorized users can decrypt and access the data. [1]

8. Ethics and Ownership

(a) Explain two ethical issues associated with artificial intelligence (AI). [4]

 Job displacement: AI replacing human jobs affects employment. [2]

 Bias and fairness: AI systems may reinforce societal biases. [2]

(b) Define intellectual property in the context of computer science. [2]

 Legal ownership of ideas, software, and digital creations. [1]

 Prevents unauthorized use, copying, or distribution. [1]

9. Algorithm Design and Programming

(a) State the purpose of a flowchart in programming. [1]

 A visual representation of an algorithm for better understanding. [1]

(b) Write an algorithm in pseudocode to find the largest number from a list of five user inputs. [4]

 DECLARE largest AS INTEGER

 FOR i = 1 TO 5:

 INPUT num

 IF num > largest THEN largest = num

 PRINT largest

You might also like