0% found this document useful (0 votes)
2 views15 pages

CS Exam Answers by Topic

The document outlines various topics related to computer systems, including components of a computer, types of processors, input/output/storage, systems software, applications generation, data structures, networks, and web technologies. It discusses the functions of buses, special registers, processor architectures (CISC vs RISC), memory management, and the importance of protocols in networking. Additionally, it covers software testing methods, abstraction in programming, and the regulation of technological surveillance.

Uploaded by

mohit.reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views15 pages

CS Exam Answers by Topic

The document outlines various topics related to computer systems, including components of a computer, types of processors, input/output/storage, systems software, applications generation, data structures, networks, and web technologies. It discusses the functions of buses, special registers, processor architectures (CISC vs RISC), memory management, and the importance of protocols in networking. Additionally, it covers software testing methods, abstraction in programming, and the regulation of technological surveillance.

Uploaded by

mohit.reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

CS Exam Answers By Topic:

1.1.1Components of a Computer:
Describe 3 buses used to convey information between the special
registers (6):
- Control bus is used to send control signals from the control unit to
the other registers in the CPU. It is used to coordinate the FDE cycle.
- Data bus is used to transfer data from one location to another
- Address bus carries the location address where the data is going to
or from

Explain need for PC, MAR and MDR (6):


- PC holds the location address for the next instruction to be
executed. It is copied to the MAR and it is incremented by 1 in each
FDE cycle
- The MAR holds the address of the instruction to be fetched from
memory given from the PC. It holds the address of the data to be
fetched from memory given from CIR
- The MDR holds the data or instructions that were fetched from the
main memory at the address held in the MAR. It is transferred to the
CIR (and split into opcode and operand.)

Describe 2 ways an accumulator is used (4):


- It temporarily holds results of calculations from the ALU in the CPU
to be used later
- It acts as the I/O of the processor and acts as a buffer

Describe the use of special registers and their functions during the fetch-
decode-execute cycle, including jump instructions, reading from and
writing to memory (8):

Describe the role of the CU (2):


- The control unit sends out control signals via the control bus to
synchronise the registers.
- It manages the smooth running of the FDE cycle and decodes
instructions.
1.1.2Types of Processor
Compare CISC architecture and RISC architecture (4):
- Each instruction in CISC can take multiple cycles to complete
- There are many complex instructions available
- In RISC, an instruction performs a simple task
- Limited number of instructions are available and complex tasks can
only be done by combining many instructions together
Advantage of RISC compared to CISC (2): Programs run faster due to
simpler instructions as pipelining is possible

Check PMT for question on co-processors

Give 3 other features of Von Neumann architecture other than instructions


are executed in a linear sequence (3):
- Data and instructions are stored in a shared memory
- Single control unit
- Uses FDE cycle
- (One instruction at a time)

Differences between CISC and RISC (4):


- CISC is more complex
- Instructions in CISC take more than 1 clock cycle to complete
- RISC requires more RAM
- CISC many addressing modes (indirect, direct – check onenote) /
CISC may have more registers (need to store more things
temporarily)
When talking about clock cycles between CISC and RISC, you must say
CISC or RISC
instructions.

Describe the Harvard architecture (2):


- Harvard architecture has a fixed memory size for data and
instructions
- Data and instructions use separate buses

Explain why it is suitable for (a washing machine) (2):


- Fixed instruction size as instructions will never change
- Removes the need for secondary storage
- (No need for memory to be shared between data and instructions)
(Parallel processing)

1.1.3Input, Output, and Storage:


Explain 2 advantages of this monitoring system having its OS stored in
ROM (2):
- ROM is quick to start up so the system can be started up quickly (in
emergency)
- ROM cannot be edited

State 2 differences between RAM and ROM (2):


- RAM is volatile, ROM is not
- RAM can be edited, ROM cannot

1.2.1Systems Software:
Explain why the first come, first served scheduling method may not be
efficient (2):
- Once a job has started, other jobs cannot be processed
- Jobs that are slow or take a long time to finish, e.g. a printer, would
take up a lot of processor time

Explain why scheduling is necessary (4):


- Scheduling is necessary so that many jobs can be completed
- in the shortest time possible
- It is necessary to ensure jobs are processed fairly
- and to make efficient use of processor time and resources

Explain why memory management is necessary (3):


- Organise the use of main memory
- by converting logical addresses into physical addresses
- Allows programs to share memory
- (Allows programs larger than main memory to run [through virtual
memory])

Describe paging (3):


- Memory locations are split
- into equal size divisions
- Pages are physical divisions

Explain what is meant by ‘segmentation’ (2):


- Memory is divided up into unequal sizes
- Segments are logical divisions

State 2 similarities between paging and segmentation:


- Both ways of partitioning main memory
- Both ways of allowing programs to be stored non-contiguously
- (Use of virtual memory to swap parts of programs)

Sim + Diff:
- Both examples of partitioning memory
- Both allow programs to be stored non-contiguously in memory
(a benefit of both)
- In paging, memory is split up into equal sized divisions whereas in
segmentation, memory is split up into unequal divisions which
mimic the logical flow of a program
- In paging, the divisions are physical, whereas in segmentation, the
divisions are logical

1.2.2Applications Generation:
Describe what is meant by utility (2):
- Carries out a specific task
- To optimise and maintain a computer system
- (E.g. defragmenter or virus checker)

File handlers (3):


- Manages data storage
- Used for moving or creating files
- Used to access files

Hardware drivers (3):


- Allows the OS to communicate with a hardware device without
knowing its specifics
- Used to communicate with the hardware
- E.g. when would be used to install a new keyboard

Backup utility (3):


- Automatically makes a copy of files on a different location
- in case of corruption
- To make incremental backups
- (To ensure data is backed up)

Explain the need for intermediate code and its purpose in a virtual
machine (8):
Intermediate code:
Is simplified code that…
…is between high level & machine code
…is produced by compiler
…runs on any computer
…allows portability between machines
Allows sections of code to be written in different languages…
…by different programmers
…suitable for specific tasks
Error free
Virtual machine:
A theoretical computer which provides…
…an environment in which a translator is available
Uses an interpreter to run the intermediate code
Points in the context:
A translator is used to convert code from one language to another…
…from source code to object code
Mention of types of translator: compilers, interpreters, assemblers

Describe what is meant by the term ‘open source software’ (2):


- Open source software is software which does not require a license to
use
- And where its source code is available to view freely and modify to
fit a user’s particular needs.
1.4.2 Data Structures:
Useful definitions:
An array is a data structure with multiple data values of the same data
type, and are stored contiguously in memory.
A list is a data structure that contains multiple ordered items and the
items can occur more than once. Elements in a list are stored non-
contiguously

State the meaning of the term static (1):


- Size is fixed when structure is created and cannot change during
processing
- E.g. Array

Dynamic (1):
- Size of data structure can change during processing
- Disadvantage: harder to implement as storage required is unknown
initially

Explain why a queue is a suitable data structure (3):


- A queue is first in first out (FIFO)
- this allows questions to be retrieved in the order that they are
stored
- Questions can also be added to the end
Useful to note: A Priority Queue is a data structure where each element
is associated with a priority, and elements with higher priority are
dequeued before those with lower priority.
Queues are dynamic.
(PAPER 2)

Hexadecimal numbers can represent larger numbers in fewer characters


than binary
Hexadecimal numbers are faster to write down
Normalised form allows numbers to be more accurate in the given number
of bits (not marked as bold but better to include this).

State 2 benefits of using a relational database instead of a flat file


database (2):

State the difference between a foreign key and a primary key (2):
- A primary key will only appear once in a table as it is a unique
identifier
- A foreign key may appear multiple times in a table as they refer to
other tables
1.3.3 Networks:
Describe what is meant by a LAN (2):
- A LAN is a Local Area Network
- that covers a small geographical area

Describe what is meant by WAN (2):


- WAN is a Wide Area Network
- that covers a large geographical area

State 2 characteristics of a LAN and WAN (4):


- LAN is over a small geographical area
- Infrastructure is usually owned by the network owner
- WAN covers a large geographical area
- Infrastructure owned by third parties

State 2 advantages of having a LAN instead of a set of stand-alone


machines (2):
- A LAN allows the computers to communicate with each other
- It allows sharing of data
- (Easier to maintain files)

Describe how packet switching is used to transmit data from one


computer to another on a network (5):
- Data is split into equal sized blocks (called packets)
- Each packet has a header of information (including destination
address and the place of the packet in the complete message)
- (Each packet is placed on the network and) each may travel by a
different route
- (At each node on the network the destination address is read and
the) best route is found
- Packets need to be reordered at the destination

Circuit switching (3):


- A direct link is formed between two devices
- This link is maintained for the entire conversation between the
devices
- Circuit switching requires the two devices to transfer and receive
data at the same rate.
Explain 2 advantages of using packet switching instead of circuit switching
(4):
- One advantage is that data is safe from being intercepted
- because it is impossible for all the packets to be intercepted as they
all take different routes
- Another advantage is that they make efficient use of a network
- as they do not hold up a part of a network for long periods of time
Explain what is meant by the term ‘TCP/IP stack’. (3):
- Stands for transmission control protocol/internet protocol
- A protocol is a set of rules
- for communicating across a network
- (Each protocol belongs to a different layer)
- The layers are ATNL

Layers:

 Application Layer – Specifies what protocol is to be used in order to


relate the application that’s being sent.
 Transport Layer – Uses TCP to establish a connection between the 2
devices. It then splits up data into packets and labels these packets
with necessary information. If any packets are lost, the transport
layer requests retransmission.
 Internet Layer – Adds the source and destination IP addresses. The
combination of the IP address and the port number is called a socket
address. Routers operate on the internet layer to forward packets.
 Network Interface / Data Link Layer – This is the connection between
the devices, and it adds the MAC address identifying the NIC cards
of the source and destination computers.
 This is a stack, on the recipients they go from bottom to top, but
vice versa for the sender’s computer.

Piece of hardware needed to connect LAN to WAN (2):


- A router
- Is a device that passes data between two networks

A protocol is a set of rules governing data transmission between devices


in a network.

Describe what is meant by a peer to peer network (2):


- A peer to peer network is a network which connects multiple devices
called nodes together. This means that data is shared between all
the nodes and there is no centralised server.
- Devices on the network have equal status/no central server
- Devices on the network share data

Explain why protocols are important on a network (2):


- They allow them to communicate
- by ensuring all devices follow the same rules
- (So they interpret data in the same way)

Explain how the DNS plays a role in websites being loaded (4):
check mohit’s notes for more – these/below are to be completed after
mock)
1.3.4 Web Technologies:
Describe what is meant by the term JavaScript (2):
- JavaScript is a scripting language that is used within HTML to add
interactivity to a web page
- A programming language that runs in a web browser
- that can be embedded into HTML
- with <script> tag
- to add interactivity to a web page

Explain why it is usually the case that JavaScript is interpreted rather than
compiled (2):
- It is usually interpreted because it needs to be run on multiple
different computer architectures rather than a single type, and if
you compile it it can only run on one type of device, but it needs to
be accessed by many other devices of different types
- JavaScript is likely to be run on a variety of machines
- with different architectures
- Compiled code is machine dependent
- whereas interpreters run on high level code
- which is machine independent

Explain the difference between a HTML id attribute and a HTML class


attribute (2):
- Only 1 element can be given an id / id is unique
- Class can be assigned to multiple items

Describe the purpose of the Regulation of Investigation Powers Act (3):


- Limits the extent
- to which public bodies
- can use technological surveillance
- (This can include monitoring internet activity)
- (Electronic communications)
- (And forcing users to hand over encryption keys)
Paper 2:

Describe how black box testing can be used to test a program (3):
- Tests the expected output
- based on input
- Does not look at the code / only looks at program specification

Describe white box testing (2):


- White box testing is when you use the source code
- to test all the different possible paths through the program
- Trace tables are used

Describe the Rapid Application Development process (4):


- At the end of each cycle a prototype is created
- Feedback is then used to inform the next generation and any
changes are made
- The process repeats
- until the prototype becomes the final product

State why a programmer might choose to declare a variable as a floating


point number (1):
- The variable may need to store decimal numbers
- To store very large/small values

Choose one search algorithm and describe how this algorithm works (5):
Binary Search:
- Works on an ordered set of data
- Find mid-point
- If equal to midpoint, report found
- If less than midpoint, move lower bound 1 higher than the midpoint
- If greater than mid-point, move upper bound 1 less than the
midpoint
- Repeat doing this until the value is found / sub-list is empty
Linear:
- Can work on both and unordered
- Get first element
- If equal report found
- If not equal move to the next element
- Repeat for all the elements until the value is found / end of list
reached
Explain why characterx and charactery are passed byRef and not byVal
(3):
- ByRef changes the value in the variable passed
- ByRef passes the address/location
- ByVal only a copy of the data is passed
- (ByVal the change would be lost when the procedure ended)

Explain, using examples, how abstraction would be used to create the


virtual world. (4):
Description (2):
- Remove unnecessary elements
- Reduce computational resources required
- (Focus on the main purpose of program / does not detract from the
main purpose of the program)
Examples (2):
- Appearance of characters is replaced by object / character is a stick
man
- Scenery is removed / e.g. trees not included
(for these questions you just need to practise)

Describe what is meant by the term ‘abstraction’ (2):


- Remove unnecessary details
- Simplifying a complex problem
- Focussing on only the necessary parts

Give two reasons why Eve should use abstraction when designing the
game (2):
- Reduce programming time/cost
- Program requires less memory
- (Simpler to solve the problem)
- (Reduces complexity of programming code)

Explain why a queue is a suitable data structure (3):


- A queue is first in first out (FIFO)
- this allows questions to be retrieved in the order that they are
stored
- Questions can also be added to the end
Useful to note: A Priority Queue is a data structure where each element
is associated with a priority, and elements with higher priority are
dequeued before those with lower priority.
Queues are dynamic.
Identify one additional reason why abstraction is necessary apart from
making it easier to produce the software (1):
- Reduces the amount of memory / processing required
- (Reduces complexity)
- (Reality contains things that aren’t relevant to a computer program)
- (Reduces design / programming effort)

Explain the benefits of using subprograms to produce this software (4):


- Efficiency
- Small sub-programs are easier to read / understand / modify
- Write once and call many times
- Avoids repeated code
- (Can reuse in other programs)
- (Subroutines can be tested individually and added to the main
program)
- (Can give procedures to different programmers to build)

Bubble sort (specific to question: must write in pseudocode + array


passed in by reference to sort array and change value of array outside
function, so globally):
Describe the steps involved in the enqueue algorithm (4):
- Check if the queue is full
- (by checking if the start and end pointers are equal)
- If the queue is full, return full
- Otherwise increment the end pointer
- and add the new item at the position indicated by the end pointer
- (return added item)

You might also like