0% found this document useful (0 votes)
6 views8 pages

P1 Mock 4

The document is a mock examination paper for O Level students, covering various topics in computer science. It includes questions on input/output devices, binary and hexadecimal conversions, the fetch-decode-execute cycle, RAM vs. ROM, encryption, networking concepts, automated systems, error detection methods, cloud storage, and expert systems. Each question requires detailed answers, calculations, and explanations, testing students' understanding of computer science principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views8 pages

P1 Mock 4

The document is a mock examination paper for O Level students, covering various topics in computer science. It includes questions on input/output devices, binary and hexadecimal conversions, the fetch-decode-execute cycle, RAM vs. ROM, encryption, networking concepts, automated systems, error detection methods, cloud storage, and expert systems. Each question requires detailed answers, calculations, and explanations, testing students' understanding of computer science principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Name: _____________________________________ O Level Paper 1 Mock 4

1. A student uses a desktop computer for video editing.


(a) Identify two input devices the student may use.

1. ............................................................

2. ............................................................ [2]

(b) Identify one output device the student may use.

................................................................ [1]

(c) Identify one type of secondary storage suitable for video editing.

................................................................ [1]

(d) Give two reasons why a desktop computer is more suitable for video editing than a tablet.

1. ...........................................................................................................................................................

...........................................................................................................................................................

2. ...........................................................................................................................................................

.......................................................................................................................................................[2]

2. (a) Convert the denary number 174 to 8-bit binary.


Show your working.

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

Answer: ............................................................ [2]


(b) Convert the binary number 11010111 to hexadecimal.
Show your working

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

Answer: ............................................................ [2]

(c) Tick (✓) the correct statement:

Binary is base 16

Hexadecimal is used to represent MAC addresses

Denary numbers use only 0 and 1

Hexadecimal is used only in text files [1]

3. The binary number 10011100 is a two’s complement number.


(a) Convert it to a denary integer.
Show your working.

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

Answer: ............................................................ [2]

(b) State the effect of performing a logical right shift by two places on the number 10110000.

........................................................................................................................................................................

....................................................................................................................................................................[1]
(c) Perform a logical left shift on 10110000 by one place. Give the result.

........................................................................................................................................................................

....................................................................................................................................................................[1]

(d) Explain the effect of a logical left shift by one place.

........................................................................................................................................................................

....................................................................................................................................................................[1]

4. (a) Describe the role of the following in the fetch–decode–execute cycle:

Program Counter (PC): …………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………………………

Memory Address Register (MAR): ……………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………………………

Memory Data Register (MDR): ………………………………………………………………………………………………………………..

…………………………………………………………………………………………………………………………………………………………… [3]

(b) Identify the register where the instruction is finally stored before execution.

........................................................................................................................................................................

....................................................................................................................................................................[1]

(c) State what is meant by the term "instruction set".

........................................................................................................................................................................

....................................................................................................................................................................[1]
(d) Complete the paragraph:

The instruction is fetched from memory into the ……………………………………………. using the address in the

…………………………………………….. . Then it is passed to the ……………………………………………. for decoding. [2]

5. (a) Explain the difference between RAM and ROM.

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

................................................................................................................................................................... [4]

(b) Give one reason why a computer needs RAM.

........................................................................................................................................................................

....................................................................................................................................................................[1]

(c) Circle three examples of optical storage:

Blu-ray SSD CD USB Floppy Disk DVD Magnetic tape Flash Memory

[2]

(d) Identify one characteristic of solid-state storage.

........................................................................................................................................................................

....................................................................................................................................................................[1]

6. (a) Describe how symmetric encryption works.

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

................................................................................................................................................................... [3]
(b) Complete the paragraph using the following terms:

plain text encrypted public key private key

The data, known as ......................................., is ....................................... using the sender’s

....................................... and can only be decrypted using the receiver’s ....................................... [4]

7. Explain the difference between:

(a) The Internet and the World Wide Web

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

................................................................................................................................................................... [2]

(b) IPv4 and IPv6

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

................................................................................................................................................................... [2]

(c) Identify one use of a MAC address.

................................................................................................................................................................... [1]

(d) Identify the part of a URL that specifies the protocol.

................................................................................................................................................................... [1]
8. A farmer uses an automated irrigation system.

(a) Explain what is meant by an automated system.

........................................................................................................................................................................

................................................................................................................................................................... [1]

(b) Describe how the system might use sensors and a microprocessor to water the crops.

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

................................................................................................................................................................... [5]

(c) State one advantage and one disadvantage of using automation in agriculture.

Advantage:....................................................................................................................................................

......................................................................................................................................................................

Disadvantage:...............................................................................................................................................

......................................................................................................................................................................
[2]
9. A company wants to ensure data is not corrupted during transmission.
(a) Describe how a parity check works.

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

................................................................................................................................................................... [3]

(b) Identify two other error detection methods.

1. ................................................................

2. ................................................................ [2]

(c) Explain the role of a firewall in protecting a network.

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

................................................................................................................................................................... [2]

10. A company uses cloud storage for backup.

(a) Give two advantages and two disadvantages of using cloud storage.

Advantages:

1. ....................................................................................................................................................

2. ....................................................................................................................................................
Disadvantages:

1. ...................................................................................................................................................

2. ................................................................................................................................................... [4]
(b) Identify the type of secondary storage used in data centers.

................................................................................................................................................................... [1]

(c) State one reason why backup is important.

........................................................................................................................................................................

................................................................................................................................................................... [1]

(d) State one reason why encryption is used in cloud storage.

................................................................................................................................................................... [1]

11. A hospital uses an expert system to help diagnose illnesses. The hospital plans to improve
the system using machine learning.

(a) Explain how an expert system helps doctors diagnose illnesses.

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

................................................................................................................................................................... [4]

(b) State two components of an expert system.

1. ......................................................................................................

2. ...................................................................................................... [2]

(c) Explain how machine learning could improve the performance of the expert system.

........................................................................................................................................................................

........................................................................................................................................................................

........................................................................................................................................................................

................................................................................................................................................................... [3]

You might also like