0% found this document useful (0 votes)
11 views10 pages

Cs Pre Mock

This document is an examination paper for a Computer Science theory test, consisting of various questions related to digital images, data compression, error detection, binary representation, and internet concepts. Candidates are instructed to answer directly on the question paper without additional materials or calculators. The paper includes specific sections for different topics, each with allocated marks and instructions for completion.

Uploaded by

gaming center
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views10 pages

Cs Pre Mock

This document is an examination paper for a Computer Science theory test, consisting of various questions related to digital images, data compression, error detection, binary representation, and internet concepts. Candidates are instructed to answer directly on the question paper without additional materials or calculators. The paper includes specific sections for different topics, each with allocated marks and instructions for completion.

Uploaded by

gaming center
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

CANDIDATE NAME

ROLL NO. Tim e: 1hour-45mins

DATE: _________________

COMPUTER SCIENCE 2210/01

Paper 1 Theory

• Candidates answer on the Question Paper.


• No Additional Materials are required.
• Calculators are NOT allowed.
READ THESE INSTRUCTIONS FIRST
• Write your name in the spaces at the top of this page.
• Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or
rough working.
• Do not use staples, paper clips, glue or correction fluid.
• DO NOT WRITE IN ANY PARENTHESIS.
INFORMATION
The total mark for this paper is 75.
• The number of marks for each question or part question is shown in brackets [ ].
• No marks will be awarded for using brand names of software packages or hardware
Q1.

Working space
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.........................................................................................................................................................
Q2. Nadia creates a digital image for a school project.

(a) Give one example of an image format.


.............................................................................................................................................[1]
(b) Describe how a digital image file is stored by a computer.
..................................................................................................................................................
..................................................................................................................................................
........................................................................................................................................ ..........
..................................................................................................................................................
..................................................................................................................................................
............................................................................................................................................ [3]

(c) Nadia compresses the digital image file before emailing it to a friend.

(i) State what is meant by data compression.


...........................................................................................................................................
..................................................................................................................................... [1]

(ii) Explain why Nadia compresses the digital image file before emailing it.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [ 2]

(iii) Nadia’s email service uses parity bits as a method of error detection during the transmission
of data. Describe how the parity bits are used to detect errors.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(iv) Identify and describe one other method of error detection used during the transmission of
data.

Method ..............................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]

Q3. A car park has a payment machine that allows a customer to pay for their parking. The cost
of parking is displayed as a denary number on a screen on the payment machine.

The cost of parking is stored in two 8-bit binary registers.

For the parking cost of $10.50:

• register 1 stores the denary value 10 as binary

• register 2 stores the denary value 50 as binary.

(a) Give the parking cost that would be displayed on the payment machine when the
registers store:
• register 1: 00010001
• register 2: 01000110
Parking cost displayed

Parking cost displayed $ ........................................................................................................... [1]

Working space
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
(b) The parking cost of $14.98 is displayed on the payment machine. Give the 8-bit binary
numbers that are stored in the registers to display the parking cost.

Register 1 .................................................................................................................................
Register 2................................................................................................................................[2]
Working space
...................................................................................................................................................
...................................................................................................................................................
(c) The payment machine gives the customer a ticket when they have paid their parking
cost. Each ticket has a 4-digit hexadecimal ticket number that is stored as binary. The
binary number 1010000000111101 is stored for a customer’s ticket number. Give the
hexadecimal ticket number that would be displayed on this customer’s ticket.

Hexadecimal ticket number ................................................................................................ [4]


Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(d) Explain why data input into the payment machine needs to be converted to binary.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]

(e) When a customer is leaving the car park they arrive at a barrier. The customer needs to
insert their ticket into a system at the barrier. This system reads the ticket number then
checks whether the parking cost has been paid for the car. The barrier is raised if it has been
paid. The system uses a microprocessor. Describe the role of the microprocessor in the
system and how it checks whether the parking cost has been paid.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Q4. Joelle is a student who uses the Internet.

(a) The table contains five terms or definitions that relate to the Internet. Complete the
table by writing each missing term or definition.
Q5. A garage uses an expert system to help diagnose any problems with cars that need repair.
(a) The expert system is an example of artificial intelligence (AI).

Describe what is meant by AI.


...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) A car has a problem with its braking system, so it is brought into the garage. Explain how the
expert system operates and how it is used to help diagnose the problem.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
………..................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [5]

Q6. A company has a website. Users use the internet and the world wide web to access the
website. (a) Describe the difference between the internet and the world wide web.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................ [2]
(b) The website has a uniform resource locator (URL). The URL has three different parts. Identify
the three different parts that are included in the URL.

1 .................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................ [3]
(c) One function of a web browser is to provide an address bar for a user to enter a URL. Give
three other functions of a web browser.

1 .................................................................................................................................................

2 ................................................................................................................................................

3 ................................................................................................................................................ [3]
Q7. A device can be given an internet protocol (IP) address. This can be an IPv4 or IPv6.

(a) Give one similarity between IPv4 and IPv6.


...................................................................................................................................................
.................................................................................................................................................. [1]
(b) Describe two differences between IPv4 and IPv6.

1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [4]

(c) A web page is requested using an IP address.

(i) Identify the system that stores a database of uniform resource locators (URLs) and their
corresponding IP addresses.
..................................................................................................................................... [1]

(ii) Identify the software that sends a request to the IP address to obtain the web page data.
..................................................................................................................................... [1]

Q8. A student is writing a help guide about how to recognise and avoid the cyber-security threat
of pharming.

(a) Give three appropriate solutions he could include.

1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
................................................................................................................................................... [3]
(b) The student also wants to include information in the help guide about the use of social
engineering as a cyber-security threat.

Describe what is meant by social engineering. Include one example of social engineering in your
answer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) The student includes information about the security solution of access levels. Describe what
is meant by access levels.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]

You might also like