Paper 1 HL MS
Paper 1 HL MS
1. State two compatibility issues that may occur when two information technology (IT)
systems are merged. [2]
● Language differences / lexical differences present across datasets to be
merged;
● Data representation differences / different data structures (e.g., date format,
incompatible file formats);
● Incompatible hardware;
● Incompatible operating systems / different software versions;
3. Identify three functions of the control unit (CU) in the central processing unit (CPU)
[3]
● Decodes the instructions
● Control Signal Generation // controls all the other internal components of the
CPU
● Timing and Sequencing // The CU manages the timing and order of
operations, ensuring that each step in the execution of an instruction happens
in the correct sequence and at the right time.
● Retrieves and stores data/addresses from RAM // writes or reads the data
to/from the location in RAM
4. State three pieces of information that a data packet must contain. [3]
● Destination Address
● Source Address
● Payload
○ Correct root;
○ Correct left sub-tree;
○ Correct right sub-tree;
7. Identify two usability problems that can occur in a voice recognition system. [2}
○ Accuracy Issues
○ Limited Vocabulary and Understanding.
○ Need Training
fun(N)
if N > 0 then
return (N mod 10) + fun(N div 10)
else
return 0
end if
end fun
fun(1216)
= 6 + fun(121) 1 mark
= 6 + (1 + fun(12)) 1 mark
= 6 + (1 + (2 + fun(1))) 1 mark
= 6 + (1 + (2 + ((1 mod 10) + fun(1 div 10))))
= 6 + (1 + (2 + (1 + fun(0))))
= 6 + (1 + (2 + (1 + 0))) // since fun(0) returns 0, the recursion ends here
= 6 + (1 + (2 + 1))
= 10 1 mark
[4]
The function fun(N) calculates the sum of the digits of a positive number N. (1
mark for sum and 1 for postive)
[2]
Section B
● (ii) Describe one method that can be used to prevent data loss
[2]
Regular backups of all critical data, which can be stored off-site or in
the cloud to ensure it can be recovered in case of data loss. (1 mark)
● Use of Uninterruptible Power Supplies (UPS) to prevent data loss
due to power outages or surges. (1 mark)
● Implementing disk mirroring or RAID (Redundant Array of
Independent Disks) systems to duplicate data across multiple drives,
which ensures data is not lost if one drive fails. (1 mark)
● Employing version control systems to keep track of changes and
allow rollback to previous versions in case of data corruption. (1
mark)
A new vaccine has been distributed that would be of benefit to some of the
doctor's patients. A large number of personalized letters need to be written to
these patients, inviting them to visit the doctor's practice to be vaccinated.
When the doctor visits a patient in their home, she needs to be able to access the
patient's medical records stored on the central computer in the practice.
(d) Outline two reasons for the use of a virtual private network
(VPN) in this situation. [4]
● Security:
○ data encryption provided by the VPN (1 Mark)
○ encryption protects sensitive data from unauthorized
access.(1 Mark)
● Remote Access:
○ remote access capability provided by the VPN. (1 Mark)
○ allows the doctor to retrieve patient records as if they were on
the local network. (1 Mark)
(e) Explain why the speed of data transmission across a mobile network
can vary. [3]
11. A systems analyst has been employed to make proposals on how to improve the
current operation of a design company.
(a) (i) Identify one other method of obtaining information from the
end-users. [1]
● Phone interviews
● Online surveys
● Focus groups
● Observation
● Document analysis
● Online user forums or communities
(ii) Outline one advantage of using the method identified in part
(a)(i) in preference to interviews. [2]
(Question 11 continued)
● Detecting and Fixing Bugs: Testing helps identify and uncover software
defects, bugs, and errors.
● Ensuring Functionality and Quality: Testing verifies that the software meets
the specified requirements and functions as intended.
● Validating System Integration: During implementation, various software
components, modules, or subsystems are integrated to form a cohesive
system.
● Assessing Performance and Scalability: Testing allows for evaluating the
performance of the software under different conditions and workloads.
● Verifying Security and Compliance: Testing is essential for validating the
security of the software and ensuring that it adheres to relevant standards,
regulations, or industry best practices.
● Enhancing User Experience: Testing is critical for ensuring a positive user
experience.
● Building Confidence and Trust: Thorough testing instills confidence in the
software's reliability and performance.
(d) Explain one ethical problem associated with using images. [3]
Images are sometimes larger than the limit placed on email attachments. For
example, a 60 MB image file needs to be sent by email without losing quality, but a
file larger than 10MB cannot be uploaded as an attachment.
(e) (i) Describe how large image files can be sent by email. [3]
● File Compression: Use file compression software or tools to reduce the size
of the image file without compromising its quality. You can compress the
image file into a more compact format, such as ZIP or RAR. This can
significantly reduce the file size, making it easier to send as an email
attachment. However, note that some email providers may still have
limitations on the maximum compressed file size.
● Cloud Storage Links: Instead of attaching the large image file directly to the
email, upload the file to a cloud storage service like Google Drive, Dropbox,
or OneDrive. Once uploaded, generate a shareable link for the file and
include it in the email. This way, the recipient can access and download the
file from the cloud storage service without any size limitations. Ensure that the
cloud storage account has sufficient space to accommodate the large image
file.
● File Transfer Services: There are specialized file transfer services designed
for sending large files. These services allow you to upload your image file to
their servers and generate a secure download link. You can then include the
download link in the email for the recipient to access and download the file.
Examples of such services include WeTransfer, SendSpace, or Filemail.
● FTP (File Transfer Protocol): If you have access to an FTP server, you can
upload the large image file to the server and provide the recipient with the
FTP server details, including the login credentials and file location. The
recipient can then use an FTP client to connect to the server and download
the file. FTP is suitable for larger files and is commonly used for file transfers.
● Splitting the File: If none of the above methods are feasible, you can split
the large image file into smaller parts using file splitting software. This divides
the file into several segments, each below the attachment size limit. You can
then send each segment as a separate email attachment, and the recipient
can reconstruct the original file using file merging software.
(ii) State one other hardware or software problem associated with the
use of images. [1]
● Insufficient Storage
● Inadequate Processing Power
● Display Quality and Calibration
● Incompatible Hardware Devices
(a) (i) Identify two types of sensor that can be used to detect approaching
cars. [2]
Acceptable answers may include:
Infrared sensors
Ultrasonic sensor
Inductive loop sensors
pressure?
(ii) Outline why sensors are appropriate input devices in this situation. [2]
(b) Suggest the type of memory that could be used to store the control
program in the microprocessor. [2]
ROM (1 mark)
Because (1 mark)
Non-volatile: will retain on power loss
Read-only access: data stored in ROM cannot be easily modified or
altered.
Fast and direct access: ROM allows for fast and direct access to the
stored program instructions.
Cost-effective: ROM is a relatively inexpensive memory type compared to
other storage options like RAM (Random Access Memory).
The traffic lights at the crossroads are also connected to a microprocessor. A person
who wishes to cross the road presses a button at a traffic light. This causes an
interrupt.
(ii) Explain how the microprocessor can deal with this interrupt. [3]
The microprocessor recognizes the interrupt signal and suspends its current
execution.
After the interrupt is processed, the microprocessor resumes the normal program
execution.
Cameras are installed on the top of the traffic lights at the crossroads.
(d) (i) Outline one benefit of monitoring the traffic with cameras. [2]
Cameras can provide visual data, allowing for better monitoring and analysis of traffic
conditions.
They can help identify traffic patterns and congestion hotspots for better traffic management.
Cameras can assist in detecting and recording traffic violations or accidents for law
enforcement or insurance purposes.
(ii) Outline one concern about monitoring the traffic with cameras.[2]
Privacy concerns: Cameras may intrude upon individuals' privacy if used inappropriately or
without proper regulations.
Data security: There could be risks associated with storing and transmitting video data,
potentially leading to unauthorized access or misuse.
Surveillance concerns: The constant monitoring of traffic with cameras might raise concerns
about excessive surveillance and its impact on civil liberties.
13. A programmer is developing a program to record information about
patients as they arrive at the emergency department of a hospital.
Due to the unplanned nature of patient attendance, the emergency department must
provide treatment for a range of illnesses and injuries, some of which may be critical
and require immediate attention.
The programmer decided to use a linked list for storing the patients' data.
(b) Explain why a queue data structure is not suitable in this situation [3]
A queue data structure follows the First-In-First-Out (FIFO) principle, where the element that
enters first is the first one to be removed.
In the emergency department scenario, patient treatment priority may not strictly follow the
FIFO principle.
Patients with more serious symptoms may require immediate attention, regardless of their
arrival order.
A linked list allows flexibility in updating and rearranging the order of patients based on their
symptoms' severity.
The information about the most seriously ill patient is held at the beginning of the linked
list. The linked list should be updated as each new patient arrives at the emergency
department.
(c) Describe how the linked list should be updated if a new patient arrives at the
emergency department with more serious symptoms than all the other
patients.
[3]
(d) Describe how the linked list should be updated if a new patient
arrives at the emergency department and has more serious symptoms
than some patients but less serious symptoms than others. [4]
Static data structures are fixed sized (for example, arrays) whilst dynamic data
structures (for example, trees, linked lists) have flexible size;
The size of static data structures is predetermined; the amount of memory once
allocated to them at compile time cannot change on run time whereas dynamic data
structures they can grow or shrink as needed to contain the data to be stored;
For example, the score that Judge 4 awarded to Mary Tann (NAMES [ l J) is 8.9 and can be
found in SCORES (l] [4].
(a) State the judge who awarded the highest score to the competitor Tea Fox. [1]
Answer: 3
(b) Construct an algorithm that determines and outputs the number of times the
highest attainable score was awarded in this competition. [4]
Answer:
- Search through the 2D array to find highest score (which is =10) - use of
any applicable loop (nested for loop for ex) - 2 marks - a correct row and
column loop
- Declaration of the variable that represents the count of the highest score
and increment by 1
- If statement with the correct condition (highest attainable score = 10.0)
- Output of the count of the highest score
highest_score_count = 0
for n in 0 to 19:
for j in 0 to 7:
If SCORES[ n ] [ j ] = 10.0
highest_score_count += 1
OUTPUT highest_score_count
WHILE LOOP example:
n=0
j=0
If SCORES[ n ] [ j ] = 10.0:
highest_score_count += 1
j+=1
n+=1
j=0
A competitor's final score is calculated by ignoring the highest and the lowest mark
awarded and averaging the remaining marks.
For example, the highest mark awarded to Lilly Bush was 7.9, and the lowest mark was
6.9,so her final score was(7.2+ 6.9 + 6.9 + 6.9 +6.9 + 7.2)/6.
(c) Construct an algorithm in pseudocode to output the name and the final score for
every competitor. [10]
Answer:
2 marks - for looping through 2D array (rows and columns)
1 mark - finding min score (if statement) - searching through all the scores
1 mark - finding max score - searching through all the scores
1 mark - assigning min score to a variable, such as minScore
1 mark - assigning max score to a variable, such as maxScore
1 mark - for calculating total and average
1 mark - for subtracting max_Score / min_Score from total_Score or any valid alternative
calculation
1 mark - for correct use of row index and column index throught the solution
1 mark - for outputting name and score with correct indices
min_Score = SCORES[n][0]
max_Score = SCORES[n][0]
total_Score = 0
for j in range 0 to 7:
total_Score -= minScore
total_Score -= maxScore