CS Paper1 Chapter
CS Paper1 Chapter
...................................................................................................................................................
...................................................................................................................................................
[1]
(b) Describe two benefits of using USB connections between a computer and a device.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
1 2 3 4 5
[10]
7 (a) One of the key features of von Neumann computer architecture is the use of buses.
Bus Description
(b) The seven stages in a von Neumann fetch-execute cycle are shown in the table below.
Put each stage in the correct sequence by writing the numbers 1 to 7 in the right hand column.
The first one has been done for you.
Sequence
Stage
number
the instruction is then copied from the memory location contained
in the MAR (memory address register) and is placed in the MDR
(memory data register)
[6]
8 An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is represented
by an 8-bit register, A, and the number of minutes is represented by another 8-bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.
A B
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
0 0 0 1 0 0 1 0 : 0 0 1 1 0 1 0 1
[2]
(b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the
hours and minutes of the alarm time.
C D
Hours Minutes
[2]
(c) Describe how the microprocessor can determine when to sound the clock alarm.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(d) The LCD (liquid crystal display) on the clock face is back-lit using blue LEDs (light emitting
diodes). The brightness of the clock face is determined by the level of light in the room. The
amount of light given out by the LEDs is controlled by a control circuit.
Describe how the sensor, microprocessor and LEDs are used to maintain the correct
brightness of the clock face.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(e) Modern LCD monitors and televisions use LED back-lit technology.
Give two advantages of using this new technology compared to the older cold cathode
fluorescent lamp (CCFL) method.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
2 The majority of mobile phones use touch screens. Three common technologies are used by
different mobile phone manufacturers.
• resistive
• capacitive
• infrared
(i) Describe how your chosen technology works to allow a user to make selections by touching
the screen.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(ii) Give one benefit and one drawback of your chosen technology when used on mobile phone
touch screens.
Benefit
...................................................................................................................................................
...................................................................................................................................................
Drawback
...................................................................................................................................................
...................................................................................................................................................
[2]
3 Four input devices, four descriptions and four applications are shown below.
Draw a line to connect each input device to its correct description. Then connect each description
to its correct application.
7 (a) Street lighting is controlled automatically. A light sensor and a microprocessor are used to
decide when to switch each street light on or off.
Describe how the sensor, microprocessor and light interact to switch the street light on or off.
Include in your answer how the microprocessor stops the street lights being frequently
switched on and off due to brief changes in the light intensity.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Name three different sensors (other than light and pH) and describe an application for each
of these sensors.
Sensor 1 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 3 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[6]
Tick (✓) the appropriate boxes in the table below to show which features apply to these three
types of software.
[3]
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
Sensor Application
Light
Monitor the pollution levels in a river
sensor
(b) Automatic doors in a building are controlled by the use of infrared sensors and a
microprocessor.
Describe how the sensors and the microprocessor are used to automatically open a door as
a person approaches.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
4 (a) Nikita wishes to print out some documents and connects her printer to the computer using
one of the USB ports.
.......................................................................................................................................[1]
1 .......................................................................................................................................
...........................................................................................................................................
2 .......................................................................................................................................
...........................................................................................................................................
3 .......................................................................................................................................
...........................................................................................................................................
[3]
(iii) The printer runs out of paper while it is printing the documents. A signal is sent to the
processor to request that the problem is dealt with.
.......................................................................................................................................[1]
(b) State one suitable application for each printer below. A different application must be given for
each printer.
...................................................................................................................................................
3D printer ..................................................................................................................................
...................................................................................................................................................
[2]
(c) Name another type of printer and describe one way in which it is different from the printers
named in part (b).
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[3]
• DVD-RW
• DVD-RAM
• CD-ROM
• Blu-ray disc
Tick (✓) the appropriate boxes in the table to indicate which of the features apply to each
example of optical storage media.
DVD-RW
DVD-RAM
CD-ROM
Blu-ray disc
[4]
(b) Solid state drives (SSD) are replacing hard disc drives (HDD) in some computers.
1 .......................................................................................................................................
...........................................................................................................................................
2 .......................................................................................................................................
...........................................................................................................................................
3 .......................................................................................................................................
...........................................................................................................................................
[3]
(ii) Explain why many web servers still use hard disc drive (HDD) technology.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...............................................................................................................................................[1]
(b) The barcode in part (a) contains the denary value 2640
Convert this value to hexadecimal.
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) An airport uses the type of barcode shown in part (a) to advertise local places of interest.
Describe how a visitor landing at the airport could use these barcodes to help plan their visit.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
1 Complete the following by writing either compiler, interpreter or assembler in the spaces
provided.
Name three other sensors that could be used in the following applications.
Application Sensor
[3]
Description Device
[5]
6 Signals are sent to and from the components of a processor using buses.
Bus 1 ....................................................................
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Bus 2 ....................................................................
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
8 Complete the paragraph by choosing six correct terms from the list.
• Optical
• On-line
• RAM
• HDD
• Primary
• SSD
• Secondary
• ROM
• Off-line
A computer has two different types of memory. .................................... memory is not directly
accessed by the CPU, but it allows a user to store data that can easily be accessed by applications.
Two examples of this type of memory are .................................... and .................................... . The
the CPU. It allows the processor to access data and instructions that are stored in this memory.
9 A supermarket has a system that allows customers to check out their own shopping.
Identify and describe the purpose of two input devices and one output device used in this system.
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Purpose ............................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
A
X
B
A B Output (X)
0 0
0 1
1 0
1 1
[1]
(a) Identify two different sensors used in this application. Give an example of how each sensor
could be used in the chemical factory.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
[4]
(b) Describe how the sensors and a microprocessor are used to monitor a process.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [5]
1 Name three different buses that are used in the fetch-execute cycle.
Bus 1 ................................................................................................................................................
Bus 2 ................................................................................................................................................
Bus 3 ................................................................................................................................................
[3]
Primary
Example 1 ........................................................................................................................................
Example 2 ........................................................................................................................................
Secondary
Example 1 ........................................................................................................................................
Example 2 ........................................................................................................................................
Off-line
Example 1 ........................................................................................................................................
Example 2 ........................................................................................................................................
[6]
Laser printer High powered laser that uses the x‑y plane.
[4]
TSA Pre
Passenger Webb / Alan
Boarding
Group B 15 Boarding
Position
Flight 683
JFK – LAX
Date Thursday, November 10, 2016
Departs 8.15 pm
Gate C4
Time, gate and terminals may change - check monitors
Identify what type of barcode A is an example of. Explain how the data stored in this type of
barcode is read.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
(c) A computer includes an Integrated Circuit (IC) and a Universal Serial Bus (USB) for data
transmission.
Describe how the computer uses these for data transmission, including the type of data
transmission used.
IC ..............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
USB ..........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
9 A cold store is kept at a constant low temperature using a sensor, a microprocessor and a cooling
unit.
Explain how the sensor and microprocessor will maintain a constant low temperature.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
5 Six components of the Von Neumann model for a computer system and six descriptions are given.
Component Description
Arithmetic logic
Carries out the calculations on data.
unit (ALU)
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) Explain how the barcode system could help the supermarket manage its stock.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(c) An infrared touch screen is used to view and navigate the supermarket stock system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2018 2210/11/M/J/18
9
(d) The supermarket uses secondary storage and off-line storage to store data about its stock.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
9 A business wants to use a biometric security system to control entry to the office.
Explain how the biometric security system will make use of the biometric device and the
microprocessor to control entry to the office.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
6 Kelvin correctly answers an examination question about the Von Neumann model.
• accumulator (ACC)
• address bus
• arithmetic logic unit (ALU)
• control unit (CU)
• data bus
• executed
• fetches
• immediate access store (IAS)
• memory address register (MAR)
• memory data register (MDR)
• program counter (PC)
• saved
• transmits
Any calculations that are carried out on the data are done by the
He needs to send just the machine code for the program to his friend, electronically.
Identify which translator will be most suitable for Dimitri to use. Explain your choice.
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
.............................................................................................................................................. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
© UCLES 2018 2210/12/M/J/18
9
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
She presses an icon on her touch screen but her action is not registered.
(i) Explain why the touch screen will not register her touch.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
Explain how Alexandra could use her mobile device whilst still wearing gloves.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
11 A factory uses a security system to control a security light. The system uses a sensor and a
microprocessor.
Explain how the security system makes use of the sensor and the microprocessor to control the
security light.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
97 – 5C – E1
Each pair of digits is stored as binary in an 8-bit register.
(a) Show what the binary register stores for each pair of the given digits.
97
5C
E1
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Example 1 .................................................................................................................................
...................................................................................................................................................
Example 2 .................................................................................................................................
...................................................................................................................................................
[2]
3 Five descriptions of different input or output devices are given in the table.
Complete the table by stating the name of each input or output device.
[5]
(b) Lola is also concerned that the data she stores could be subject to accidental damage or
accidental loss.
(i) State three ways that the data Lola stores could be accidentally damaged or accidentally
lost.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Give two methods that Lola could use to help keep her data safe from accidental damage
or accidental loss.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(a) It currently requires employees to enter a username and a password to log-in to an account.
Each password must be 8 letters.
Improvement 1 ..........................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Improvement 2 ..........................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
The company can purchase a server with either solid state storage or magnetic storage. After
discussion, it decides to purchase a file server with magnetic storage.
Explain why the company chose magnetic storage rather than solid state storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
Using the list given, complete Annie’s answer by inserting the correct six missing terms. Not all
terms will be used.
• Assembly
• Converter
• Denary
• Hexadecimal
• High-level language
• Low-level language
• Machine Code
• Source Code
• Syntax
• Translator
....................................................................... language.
[6]
(a) Identify three input devices that can be connected to a personal computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Identify three output devices that can be connected to a personal computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The computers in the finance company use both primary and secondary storage.
..................................................................................................................................... [1]
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
3 Vanessa writes a paragraph as an answer to an examination question about the central processing
unit (CPU).
Use the list given to complete Vanessa’s answer by inserting the correct six missing terms.
Not all terms will be used.
• Components
• Data
• Decoded
• Executed
• Fetched
• Instructions
• RAM
• ROM
• Secondary storage
into the CPU where it is then ........................................................ . Once this has taken place the
4 (a) Marley wants to store a video he has created for his school project.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) (i) Marley also needs to store ten 8-bit colour images in a file for his project.
Calculate the total file size in megabytes (MB) for all Marley’s images.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(ii) Marley prints the images for his project using an inkjet printer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
5 A music company wants to send a new music file to many radio stations. It will send the music file
the day before the release date so that the radio stations can store the file ready for release.
The music company does not want the radio stations to be able to open the music file until 09:00
on the release date.
Identify two security measures and describe how each measure can be used to make sure the
music file cannot be opened until the release date.
Description .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Description .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
7 (a) An office has an automated lighting system. When movement is detected in the office the
lights are switched on. If movement is not detected for a period of 2 minutes the lights are
switched off. The system uses a sensor and a microprocessor.
Describe how the automated lighting system uses a sensor and a microprocessor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
............................................................................................................................................. [1]
(b) Identify two output devices that are part of the smartphone.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
[2]
(e) Modern smartphones can be secured with a biometric system that is built into the phone.
(i) Identify two biometric systems that would be suitable for securing a smartphone.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(ii) Explain why modern smartphones are secured with a biometric system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Carla uses the USB port to connect her mobile device to her computer, to transfer her photos.
(a) Give three benefits of using a USB port to connect the mobile device to the computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(b) State the type of data transmission used when transferring data using a USB port.
............................................................................................................................................. [1]
(c) Carla wants to reduce the file size of the photos she has transferred to her computer.
She does not want the quality of the photos to be reduced, so she uses lossless compression.
Describe how lossless compression reduces the file size of the photos.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(a) Benny is printing some photos and the paper gets jammed in the printer.
............................................................................................................................................. [1]
(b) Identify one benefit and two drawbacks of Benny using an inkjet printer, instead of a laser
printer, to print his photos.
Benefit ......................................................................................................................................
...................................................................................................................................................
Drawback 1 ...............................................................................................................................
...................................................................................................................................................
Drawback 2 ...............................................................................................................................
...................................................................................................................................................
[3]
Tick (✓) to show whether the statement applies to an Inkjet printer or a Laser printer.
Inkjet Laser
Statement
(✓) (✓)
Uses a rotating drum to transfer the image to the paper
Uses powdered toner
Uses nozzles to spray droplets on to the paper
Uses a print head mechanism that moves side to side
[4]
1 A Von Neumann model for a computer system has a central processing unit (CPU) that makes
use of registers.
Register 1 .................................................................................................................................
Register 2 .................................................................................................................................
Register 3 .................................................................................................................................
[3]
Stage 1 ..............................................................................................................................
Stage 2 ..............................................................................................................................
[2]
(ii) Identify the component of the CPU that is responsible for decoding instructions.
..................................................................................................................................... [1]
2 Both an interpreter and a compiler can be used when writing a program in a high-level language.
(a) Explain why a programmer would make use of both an interpreter and a compiler.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Tick (3) to show if the statement applies to Capacitive or Resistive touch screen technology.
Capacitive Resistive
Statement
(3) (3)
Cheaper to manufacture
[6]
8 Leonard has a new laser printer to print letters for his business.
Leonard connects his printer to his computer using the USB port.
(a) Give three benefits of using the USB port to connect the printer to the computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(b) State two benefits and one drawback of Leonard using a laser printer, instead of an inkjet
printer, to print the letters.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
[3]
(i) Give two examples of when a printer would generate an interrupt signal.
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
Identify the software in the computer that will receive and manage all interrupt signals.
..................................................................................................................................... [1]
Tick (3) to show if the statement applies to hard disk drive (HDD) storage or
solid state drive (SSD) storage.
HDD SSD
Statement
(3) (3)
It is non-volatile storage
[6]
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
[2]
1 Benedict has a computer that is assigned an Internet Protocol (IP) address. The IP address is:
198.167.214.0
(a) Convert the denary values 167 and 214 from the IP address to 8-bit binary.
167
214
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) Benedict’s computer is also assigned a Media Access Control (MAC) address.
...........................................................................................................................................
..................................................................................................................................... [1]
Difference 1 .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Difference 2 .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
She stores three copies of the data using a hard disk drive (HDD), a solid state drive (SSD) and a
USB flash memory drive.
(a) Identify three devices Julia can use to input personal data into her computer.
Device 1 ....................................................................................................................................
Device 2 ....................................................................................................................................
Device 3 ....................................................................................................................................
[3]
(b) Six statements are shown about HDDs, SSDs and USB flash memory drives.
Tick (✓) to show which statements apply to each type of storage. Some statements can apply
to more than one type of storage.
USB flash
memory
Statement
HDD SSD drive
(✓) (✓) (✓)
it is non-volatile
(c) Julia uses a USB connection to transfer data onto her USB flash memory drive.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
..................................................................................................................................... [1]
5 Jamelia has a greenhouse that she uses to grow fruit and vegetables. She needs to make sure
the temperature in the greenhouse stays between 25 °C and 30 °C (inclusive).
A system that has a temperature sensor and a microprocessor is used to maintain the temperature
in the greenhouse. The system will:
Describe how the system uses the temperature sensor and the microprocessor to maintain the
temperature in the greenhouse.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
Tick (3) to show if the statement applies to magnetic, solid state or optical storage. Some
statements may apply to more than one type of storage.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
(iii) Identify which type of storage would be the most suitable for use in a web server and
justify your choice.
Justification ........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
(c) Describe the operation of USB flash memory and how it stores data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
5 A security light system is used by a factory. The light only comes on when it is dark and when
movement is detected. The light will stay on for 1 minute before switching off.
Sensors and a microprocessor are used to control the security light system.
(a) Identify two sensors that would be used in the security light system.
Sensor 1 ...................................................................................................................................
Sensor 2 ...................................................................................................................................
[2]
(b) Describe how the sensors and the microprocessor control the security light system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
(a) (i) Tick (3) to show which type of data is stored in an MP3 file.
Tick (3)
Video
Sound
Image
[1]
(ii) Tick (3) to show whether the MP3 file is a lossy compressed file or a lossless compressed
file or not a compressed file.
Tick (3)
2 A computer is designed using the Von Neumann model for a computer system.
(a) Data is fetched from primary storage into the CPU to be processed.
(i) State the name of the primary storage from where data is fetched.
..................................................................................................................................... [1]
(ii) The CPU performs a cycle to process data. Fetch is the first stage in this cycle.
State the names of the second and third stages in the cycle.
(iii) Identify two components within the CPU that are used in the fetch stage of the cycle.
Component 1 .....................................................................................................................
Component 2 .....................................................................................................................
[2]
3 Three types of storage media are magnetic, optical and solid state.
............................................................................................................................................. [1]
(b) Optical storage uses a laser to store and read data from a disk.
Explain how the laser is used to store and read data from the disk.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) A business is creating a new mobile device that has an SSD as secondary storage.
(i) Give three reasons why an SSD is the most suitable secondary storage for their mobile
device.
Reason 1 ...........................................................................................................................
...........................................................................................................................................
Reason 2 ...........................................................................................................................
...........................................................................................................................................
Reason 3 ...........................................................................................................................
...........................................................................................................................................
[3]
(ii) Identify two examples of software that can be stored on the SSD.
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
11 (a) The paragraph describes the process of printing a document using an inkjet printer.
Complete the paragraph using the most appropriate terms from the list. Not all of the terms in
the list need to be used.
• binary
• buffer
• drum
• information
• interrupt
• laser
• liquid
• nozzles
• operating system
• powder
• thermal bubble
• toner
Data is sent from the computer to the printer. The data is held in a print
processed to be printed.
technology.
If the paper jams in the printing process, the printing stops and an
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
© UCLES 2022 2210/11/M/J/22 [Turn over
11
7 Cassie stores data for her business every day. She stores the data using optical data storage.
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
(b) Six statements are given about the operation of three different types of storage.
Tick (3) to show which statements apply to each type of storage. Some statements may
apply to more than one type of storage.
Type of storage
Magnetic Optical Solid state
Statement
(3) (3) (3)
[6]
3 The flowchart on the opposite page shows what happens when the barcode on a product is
scanned at the checkout in a supermarket. The barcodes are used in an automatic stock control
system.
Using item number only from the list below, complete the flowchart.
Item
Statement
number
4 Has the re-order flag already been added to the product record?
5 A security system uses sensors, a camera and a microprocessor to capture images of each person
entering a large shopping mall.
(a) Describe how the sensors, camera and microprocessor interact to identify certain people
entering the mall.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[5]
(b) Each image taken requires 1 MB of storage. If the camera captures an image every 5 seconds
over a 24 hour period, how much storage is required?
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) The shopping mall has over 100 cameras. At the end of each day all these cameras send
their images, captured over the last 24 hours, to a central computer.
Explain why the mall uses dedicated fibre optic cable rather than transmitting the data over
the local broadband network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(b) When data are transmitted from one device to another, a parity check is often carried out on
each byte of data. The parity bit is often the leftmost bit in the byte.
(i) If a system uses even parity, give the parity bit for each of the following bytes:
parity bit
1 1 0 0 1 1 0
parity bit
0 0 0 0 0 0 1
[2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
8 The steps to print a document using a laser printer are shown in the table below.
Put each step in the correct order. The first step has been done for you.
Step Order
As the printing drum rotates, a laser scans across it; this removes the
positive charge in certain areas
The printing drum is coated in positively-charged toner; this then sticks to the
negatively-charged parts of the printing drum
The paper goes through a fuser which melts the toner so it fixes permanently
to the paper
The printer driver ensures that the data is in a format that the laser printer
can understand 1
Data is then sent to the laser printer and stored temporarily in the printer
buffer
The toner on the printing drum is now transferred to the paper to reproduce
the required text and images
[8]
© UCLES 2015 2210/12/O/N/15 [Turn over
12
9 A remote-controlled model car contains RAM, ROM and a solid state drive. The car receives
radio signals from its remote control. It can only receive radio signals of a certain frequency. The
manufacturer sets this frequency and the owner cannot change it. The owner of the model car can
input their own sequence of movements from an interface underneath the car.
(a) Describe the purpose of each of the three types of memory supplied with the car.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(b) The owner needs to be able to enter their own sequence of movements for the model car.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(c) Explain why the model car uses a solid state drive rather than another type of secondary
storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
2 Sensors and a microprocessor monitor a car exhaust for high temperature and high carbon
monoxide (CO) levels.
(a) Describe how the sensors and microprocessor are used to monitor the temperature and CO
levels and warn the driver if either is out of range.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) The information from seven sensors is sent to an engine management system in the car. The
status of each sensor is stored in an 8-bit register; a value of 1 indicates a fault condition:
Address Contents
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100
1000 1100
1000 1101
1000 1110
1000 1111
(a) (i) The contents of memory location 1000 0001 are to be read.
Show the contents of the Memory Address Register (MAR) and the Memory Data
Register (MDR) during this read operation:
MAR
MDR
[2]
(ii) The value 0111 1001 is to be written into memory location 1000 1110.
Show the contents of the MAR and MDR during this write operation:
MAR
MDR
[2]
(iii) Show any changes to the computer memory following the read and write operations in
part (a)(i) and part (a)(ii).
Address Contents
1000 0000 0110 1110
1000 0001 0101 0001
1000 0010 1000 1101
1000 0011 1000 1100
1000 1100
1000 1101
1000 1110
1000 1111
[1]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
5 A security system records video footage. One minute of video requires 180 MB of storage. The
recording system can store several hours of video footage.
(a) Name and describe a suitable storage device for this recording system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(b) Calculate how much storage would be needed for 2 hours of video footage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
7 Name a suitable output device for each of the following applications. A different device should be
used for each application.
[5]
Give an application which makes use of each device and state a reason why the device is
appropriate for that application.
Application .............................................................................................
Reason ..................................................................................................
Light sensor
................................................................................................................
................................................................................................................
Application .............................................................................................
Reason ..................................................................................................
Keyboard
................................................................................................................
................................................................................................................
Application .............................................................................................
Reason ..................................................................................................
Barcode reader
................................................................................................................
................................................................................................................
Application .............................................................................................
Reason ..................................................................................................
Touch screen
................................................................................................................
................................................................................................................
[8]
(e) Describe the problems that could be caused if the original binary number in part (a) is shifted
five places to the right.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Control unit
Fetches each instruction in turn
[4]
[3]
(b) Identify two sensors that the security system could use to detect intruders.
Sensor 1 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
1 To process an instruction, a central processing unit (CPU) goes through a cycle that has three
main stages.
Stage 1 ................................................................................
Stage 2 ................................................................................
Stage 3 ................................................................................
[3]
2 Name each of the potential security issues described in the five statements below:
[5]
State two advantages of using a high-level language and two advantages of using a low-level
language.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
7 Modern Liquid Crystal Display (LCD) monitors use Light-Emitting Diode (LED) backlit technology.
1 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
4 .......................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
Describe how the sensors and microprocessor interact to switch on the security light when an
intruder is detected.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
(c) At the end of the flight, all of the data are sent to the aeroplane engine manufacturer using the
Internet.
...................................................................................................................................................
...................................................................................................................................................
IP address .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(d) When sending this data, security is very important. Data are sent over the Internet using
Transport Layer Security (TLS) protocol.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
2 Storage devices and storage media can be categorised as primary, secondary or off-line.
Write primary, secondary or off-line next to each storage device or medium to indicate its most
suitable category.
HDD ....................................................................................................................................
RAM ....................................................................................................................................
ROM ....................................................................................................................................
CD-ROM ....................................................................................................................................
SSD ....................................................................................................................................
DVD-RAM ....................................................................................................................................
[6]
3 (a) Explain the differences between the binary number system and the denary number system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Explain the process of converting the binary number 1010 into a denary number.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
© UCLES 2017 2210/12/O/N/17 [Turn over
9
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
..............................GB [2]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
She has a system that monitors the conditions for growing the fruit.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) State two sensors that could be used in this system and describe how they could be used.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
One use of the display screen is to show an error code when a problem has occurred with a
washing cycle.
(a) State whether the display screen is an input, output or storage device.
...............................................................................................................................................[1]
E04
This error code means that the water will not empty out of the washing machine.
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(d) Identify three sensors that could be used in the washing machine.
Sensor 1 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
Sensor 3 ...................................................................................................................................
Use ...........................................................................................................................................
...................................................................................................................................................
[6]
© UCLES 2017 2210/13/O/N/17
4
Draw a line to match each component with the most suitable description.
Component Description
[5]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Kamil wants to store a 16-bit colour image file. The image size is 1000 pixels.
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
1 .........................................................................................................................................
2 .........................................................................................................................................
3 .........................................................................................................................................
[3]
(iii) State two benefits of using hexadecimal notation to represent binary values.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
RAM ROM
Statement
(✓) (✓)
(b) Circle the storage category that includes both RAM and ROM.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Karina correctly answers another examination question about some more output devices.
Complete the sentences in Karina’s answer, using the list given. Not all terms in the list need
to be used.
• 3D
• digital light projector
• inkjet
• interactive whiteboard
• laser
• rotating
• scanning
• sliding
• speaker
• thermal bubble
surface using a pen, the text and drawings can then be captured and stored for later use.
The pH of the water should be between 6 and 8. The system outputs an alert if the pH of the water
is not in this range.
Explain how the system uses the pH sensors and the microprocessor to help monitor the pollution.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
Draw a line to connect each output device to the most appropriate description.
Device Description
3D Printer
Uses liquid ink to generate
a physical output
2D Cutter
Uses a high-power laser to
generate a physical output
[5]
(b) Explain how the web browser uses the URL to access the webpage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
9 Describe two differences between Read Only Memory (ROM) and Random Access Memory
(RAM).
Difference 1 .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Difference 2 ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
B X
[6]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
Four statements about computer memory sizes are given in the table.
True False
Statement
(✓) (✓)
25 kB is larger than 100 MB
999 MB is larger than 50 GB
3500 kB is smaller than 2 GB
2350 bytes is smaller than 2 kB
[4]
2 The Von Neumann model for a computer system uses several components in the fetch-execute
cycle. One component that is used is the Control Unit (CU).
Identify four other components that are used in the Von Neumann model for a computer system.
1 .......................................................................................................................................................
2 .......................................................................................................................................................
3 .......................................................................................................................................................
4 .......................................................................................................................................................
[4]
3 The data from a sensor must be converted from analogue to digital to be processed by a computer.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
Resistive Capacitive
Statement
(✓) (✓)
This touch screen has multi-touch capabilities
This touch screen cannot be used whilst wearing gloves
This touch screen is made up of two layers with a small
space in between
This touch screen uses the electrical properties of the
human body
This touch screen is normally cheaper to manufacture
This touch screen has a quicker response time
[6]
7 Gerald uses a keyboard to enter a website address into the address bar of his browser.
(a) Describe how Gerald’s key presses on his keyboard are processed by the computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
9 Maisey purchases a new router and attaches it to her computer. The connection she sets up uses
duplex data transmission.
True False
Statement
(✓) (✓)
Duplex data transmission can be either serial or
parallel
Duplex data transmission is when data is transmitted
both ways, but only one way at a time
Duplex data transmission is always used to connect
a device to a computer
Duplex data transmission is when data is transmitted
both ways at the same time
Duplex data transmission automatically detects any
errors in data
[5]
(b) Maisey’s computer uses an integrated circuit (IC) for data transmission that sends multiple
bits at the same time.
............................................................................................................................................. [1]
(c) Maisey purchases a new printer and connects it to her computer using the USB port.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
11 Robert has a mobile device that uses RAM, ROM and an SSD.
(a) State what the RAM, ROM and SSD are used for.
RAM ..........................................................................................................................................
...................................................................................................................................................
ROM .........................................................................................................................................
...................................................................................................................................................
SSD ..........................................................................................................................................
...................................................................................................................................................
[3]
(b) Give two reasons why an SSD, rather than a HDD, is used in the mobile device.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
1 A library has a system that allows customers to check out the books that they want to borrow.
Each book has a barcode that can be used to identify the book.
(a) (i) Identify two input devices that may be used in the library’s system.
(ii) Identify two storage devices that may be used in the library’s system.
(iii) Identify two output devices that may be used in the library’s system.
(b) The data stored by the library is archived at the end of each day. The archive is held on a
server in the library office.
The data is encrypted with an 8-bit key. As some of the data is confidential, the library wants
to make the encryption more secure.
(i) State how the library could make the encryption more secure.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) The term used to describe data before it is encrypted is plain text.
..................................................................................................................................... [1]
(ii) Videos on the library website show customers which books the library will soon have
in stock.
Identify and describe a method the library could use to reduce the file size of a video as
much as possible.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(d) The library often holds events that introduce new authors.
At the events, the library has a Liquid Crystal Display (LCD) screen that displays data,
including an image and information about the author.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
“This is when a person copies another person’s computer program and tries to claim it as his
own.”
............................................................................................................................................. [1]
“This is the legal protection that a person can obtain, to provide protection against his work
being stolen.”
............................................................................................................................................. [1]
7 The Von Neumann model for a computer system has several components that are used in the
fetch-execute cycle.
(i) Describe what is meant by main memory and how it is used in the Von Neumann model
for a computer system.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) State two other components in the Von Neumann model for a computer system.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
Blu-ray CD DVD
Statement
(✓) (✓) (✓)
True False
Statement
(✓) (✓)
It is a front-lit display
[5]
Headphones
2D cutter
LCD projector
Microphone
[5]
2 Paige has a computer that has a central processing unit (CPU) based on the Von Neumann model
for a computer system.
(a) Identify the component within the CPU that controls the flow of data.
............................................................................................................................................. [1]
(b) Identify the component within the CPU where calculations are carried out.
............................................................................................................................................. [1]
(c) Identify the component within the CPU that stores the address of the next instruction to be
processed.
............................................................................................................................................. [1]
(d) Identify the register within the CPU that holds an instruction that has been fetched from
memory.
............................................................................................................................................. [1]
(e) Identify the register within the CPU that holds data that has been fetched from memory.
............................................................................................................................................. [1]
(a) Tick (3) to show if the USB connection uses Parallel or Serial data transmission.
Parallel
Serial
Description
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(c) Arjun uses the Internet to send the digital documents to his friend. He wants to make sure the
documents are sent securely.
Protocol 1 .................................................................................................................................
Protocol 2 .................................................................................................................................
[2]
8 Edith is buying a new computer monitor that displays images using LCD technology.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
9 Elle uses both CDs and DVDs to store her school projects.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
............................................................................................................................................. [1]
11 A theme park has a game where a player tries to run from the start to the finish without getting wet.
The system for the game uses sensors and a microprocessor to spray water at a player as they
run past each sensor.
Describe how the sensors and the microprocessor are used in this system.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
12 Warner says that he has a very good Internet Service Provider (ISP) that provides several services.
True False
Statement
(3) (3)
Provides access to the Internet for customers
Stores the content for all web pages available on the Internet
[5]
Tick (✓) to show if each statement applies to serial simplex, parallel simplex, parallel
half-duplex or serial duplex data transmission. Some statements may apply to more than one
data transmission method.
(b) A Universal Serial Bus (USB) connection can be used to transmit data from a mobile device
to a computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• capacitive
• change
• circuit
• conductive
• coordinates
• grid
• heat
• infra-red
• insulating
• light
• manufacture
• pressure
• resistive
top layer of the screen and makes it connect with the bottom layer to complete a
............................................................................ .
Tick (✓) to show if each statement applies to a 3D scanner, barcode reader or a Quick Response
(QR) code reader. Some statements may apply to more than one type of device.
3D Barcode QR code
Statement scanner reader reader
(✓) (✓) (✓)
uses position and alignment markers for orientation
when scanning
8 An electronic game has three square mats that are coloured red, green and blue.
The player will see a colour displayed on a screen and has 1 second to hit the mat that matches
the colour. If the player hits the correct mat, within 1 second, a counter is incremented. When a
player hits an incorrect mat, the game ends.
The game uses sensors and a microprocessor to determine if the player hits the correct mat within
1 second.
Explain how the game uses sensors and a microprocessor to count the number of times a player
hits a correct mat within 1 second.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [7]
An interrupt is generated to inform the Central Processing Unit (CPU) that the application has
been opened.
(a) Give three other examples of when an interrupt signal could be generated.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) State what would happen if interrupt signals were not used in a computer.
...................................................................................................................................................
............................................................................................................................................. [1]
10 Jermain uses the Secure Socket Layer (SSL) protocol for secure transmission when sending data
using the internet.
(a) Explain how the SSL protocol secures the data for transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Identify an alternative protocol that could be used for secure transmission of data using the
internet.
............................................................................................................................................. [1]
(c) Give two ways that a user can identify if a website uses secure data transmission.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2021 2210/12/O/N/21 [Turn over
2
A customer can use the ticket machine to select and pay for their ticket.
One input device built into the ticket machine is a touch screen.
(a) Identify two other input devices that could be built into the ticket machine.
(b) The ticket machine has a help icon that a user can touch to contact customer support.
The ticket machine has an output device that allows the user to hear the customer support
person.
............................................................................................................................................. [1]
(c) The touch screen for the ticket machine uses resistive technology.
(i) Describe how resistive touch screen technology operates to recognise a user’s touch.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give two benefits of using resistive touch screen technology for the ticket machine.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
(iii) Give two drawbacks of using resistive touch screen technology for the ticket machine.
Drawback 1 .......................................................................................................................
...........................................................................................................................................
Drawback 2 .......................................................................................................................
...........................................................................................................................................
[2]
(iv) Identify one other touch screen technology that could have been used.
..................................................................................................................................... [1]
(d) The computer in the ticket machine uses the stored program concept.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
2 An automated water tap system uses a sensor and a microprocessor to operate. Water flows
from the tap when a person’s hands are placed underneath the tap. Water stops flowing when the
person’s hands are removed from underneath the tap.
(a) Explain how the water tap system uses a sensor and a microprocessor to operate.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
Identify the most suitable sensor that could be used in each system.
it checks the air is dry enough in a garage that spray paints cars
it checks that the soil in a greenhouse has the correct level of acidity
[3]
(a) The company needs to decide which touch screen technology to use.
State one type of touch screen technology that you recommend the company use.
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) The mobile phone uses Random Access Memory (RAM) and Read Only Memory (ROM).
RAM and ROM are both examples of the same type of storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) The mobile phone has a USB port to allow a USB connection to a computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) One benefit of a USB connection is that the cable can only be inserted into the port one
way, so an incorrect connection cannot be made.
Give three other benefits of using a USB connection to connect a mobile phone to a
computer.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
Benefit 3 ............................................................................................................................
...........................................................................................................................................
[3]
(d) When a user is reading a text on the mobile phone, they may also get a telephone call on the
mobile phone. An interrupt signal is generated that results in an output to inform the user that
a person is calling them.
Describe how the interrupt signal is processed to inform the user that a person is calling
them.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
6 A museum has Quick Response (QR) codes that allow visitors to view videos for extra information
about items in the museum.
The visitor is given a portable device with a display screen, that they can use to read each QR
code.
(a) Describe how the QR code is read and processed to display the video for the visitor.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Tick (✓) to show whether the videos are MP3 files, MP4 files or MIDI files.
Tick (✓)
MP3 files
MP4 files
MIDI files
[1]
Give two benefits of using lossy compression to compress the video files.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
[2]
(d) The portable device has a Light‑Emitting Diode (LED) display screen to allow the visitor to
watch a video.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
7 The paragraph explains how an instruction is processed by the Central Processing Unit (CPU).
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• address bus
• Arithmetic Logic Unit (ALU)
• calculations
• data bus
• decoded
• execute
• fetched
• interrupt
• Memory Address Register (MAR)
• Memory Data Register (MDR)
• Program Counter (PC)
• protocol
• ROM
• stored
will then perform any .................................................................... and logic operations that are
8 A computer can have both a Media Access Control (MAC) address and an Internet Protocol (IP)
address.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
[2]
Difference 1 ..............................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
[2]
9 A system uses parity checks and Automatic Repeat reQuests (ARQ) to detect and correct errors
in the transmission of data.
Describe how parity checks and ARQ operate together to detect and correct errors.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]