Cs Pre Mock
Cs Pre Mock
DATE: _________________
Paper 1 Theory
Working space
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.........................................................................................................................................................
Q2. Nadia creates a digital image for a school project.
(c) Nadia compresses the digital image file before emailing it to a friend.
(ii) Explain why Nadia compresses the digital image file before emailing it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [ 2]
(iii) Nadia’s email service uses parity bits as a method of error detection during the transmission
of data. Describe how the parity bits are used to detect errors.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(iv) Identify and describe one other method of error detection used during the transmission of
data.
Method ..............................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
Q3. A car park has a payment machine that allows a customer to pay for their parking. The cost
of parking is displayed as a denary number on a screen on the payment machine.
(a) Give the parking cost that would be displayed on the payment machine when the
registers store:
• register 1: 00010001
• register 2: 01000110
Parking cost displayed
Working space
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
(b) The parking cost of $14.98 is displayed on the payment machine. Give the 8-bit binary
numbers that are stored in the registers to display the parking cost.
Register 1 .................................................................................................................................
Register 2................................................................................................................................[2]
Working space
...................................................................................................................................................
...................................................................................................................................................
(c) The payment machine gives the customer a ticket when they have paid their parking
cost. Each ticket has a 4-digit hexadecimal ticket number that is stored as binary. The
binary number 1010000000111101 is stored for a customer’s ticket number. Give the
hexadecimal ticket number that would be displayed on this customer’s ticket.
(e) When a customer is leaving the car park they arrive at a barrier. The customer needs to
insert their ticket into a system at the barrier. This system reads the ticket number then
checks whether the parking cost has been paid for the car. The barrier is raised if it has been
paid. The system uses a microprocessor. Describe the role of the microprocessor in the
system and how it checks whether the parking cost has been paid.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Q4. Joelle is a student who uses the Internet.
(a) The table contains five terms or definitions that relate to the Internet. Complete the
table by writing each missing term or definition.
Q5. A garage uses an expert system to help diagnose any problems with cars that need repair.
(a) The expert system is an example of artificial intelligence (AI).
Q6. A company has a website. Users use the internet and the world wide web to access the
website. (a) Describe the difference between the internet and the world wide web.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................ [2]
(b) The website has a uniform resource locator (URL). The URL has three different parts. Identify
the three different parts that are included in the URL.
1 .................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................ [3]
(c) One function of a web browser is to provide an address bar for a user to enter a URL. Give
three other functions of a web browser.
1 .................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................ [3]
Q7. A device can be given an internet protocol (IP) address. This can be an IPv4 or IPv6.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [4]
(i) Identify the system that stores a database of uniform resource locators (URLs) and their
corresponding IP addresses.
..................................................................................................................................... [1]
(ii) Identify the software that sends a request to the IP address to obtain the web page data.
..................................................................................................................................... [1]
Q8. A student is writing a help guide about how to recognise and avoid the cyber-security threat
of pharming.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
................................................................................................................................................... [3]
(b) The student also wants to include information in the help guide about the use of social
engineering as a cyber-security threat.
Describe what is meant by social engineering. Include one example of social engineering in your
answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The student includes information about the security solution of access levels. Describe what
is meant by access levels.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]