the sutton academy - home · web viewa cpu can be risc or cisc. describe the difference between a...

26
Computer Science Component 1 Understanding Computer Science November 2017 release In the style of Eduqas Time 1 hour 45 mins Marks Available 100 INSTRUCTIONS TO CANDIDATES Use black ink or black ball-point pen. Do not use pencil or gel pen. Do not use correction fluid. Write your name, centre number and candidate number in the spaces at the top of this page. Answer all questions. Write your answers in the spaces provided in this booklet. If you run out of space, use the continuation pages at the back of the booklet, taking care to number the question(s) correctly. INFORMATION FOR CANDIDATES The number of marks is given in brackets at the end of each question or part-question. You are reminded of the need for good English and orderly, clear presentation in your answers. The use of calculators is not permitted in this examination. The total number of marks is 100. Name: Commissioned by The PiXL Club Ltd © Copyright The PiXL Club Ltd, 2017

Upload: others

Post on 16-Nov-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

Computer Science Component 1Understanding Computer ScienceNovember 2017 releaseIn the style of EduqasTime 1 hour 45 mins

Marks Available 100

INSTRUCTIONS TO CANDIDATES

Use black ink or black ball-point pen. Do not use pencil or gel pen. Do not use correction fluid.

Write your name, centre number and candidate number in the spaces at the top of this page.

Answer all questions.

Write your answers in the spaces provided in this booklet.

If you run out of space, use the continuation pages at the back of the booklet, taking care to number the question(s) correctly.

INFORMATION FOR CANDIDATES

The number of marks is given in brackets at the end of each question or part-question.

You are reminded of the need for good English and orderly, clear presentation in your answers.

The use of calculators is not permitted in this examination.

The total number of marks is 100.

Name:

Commissioned by The PiXL Club Ltd

© Copyright The PiXL Club Ltd, 2017

This resource is strictly for the use of member schools for as long as they remain members of The PiXL Club. It may not be copied, sold, or transferred to a third party or used by the school after membership ceases. Until such time it may be freely used within the member school.

All opinions and contributions are those of the authors. The contents of this resource are not connected with, or endorsed by, any other company, organisation or institution. These papers were made by teachers in good faith based upon our understanding to date.

PiXL Club Ltd endeavour to trace and contact copyright owners. If there are any inadvertent omissions or errors in the acknowledgements or usage, this is unintended and PiXL will remedy these on written notification.

www.pixl.org.uk The PiXL Club Ltd, Company number 07321607

Page 2: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

1. Memory is an important component in a computer.

Tick () the correct boxes below to show whether the statements apply to RAM or ROM. [3]

STATEMENT RAM ROM

Contains instructions and data for the programs

that are running.

Non -volatile

Stores programs and data to boot up the computer

Page 3: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

2. The Central Processing Unit or CPU is an important computer part.

(a) Describe the role of the CPU in a computer. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

(b) CPU’s have registers such as the Current Instruction Register and the Memory Address

register. Describe what a register is. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

(c) A CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC

processor and explain where might they be used. [5]

…………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………….

………………………………………………………………………………………………………………………………………………………

….

……………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………………….

Page 4: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

(d) A CPU has 6MB of cache memory. Describe the function of cache memory. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

(e) Sometimes a computer might need to use virtual memory. Describe how virtual memory

works. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

Page 5: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

3. A 6th form student is going to buy a laptop to help with her studies. She has the choice of buying

one with a Solid-State Drive or a Hard Disk Drive. Discuss the suitability of both types of storage

technology for a laptop. [6]

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

…………………………………………………………

……………………………………………………………………………………………………………………………..........................

…………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………….

Page 6: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

4. The TCP/IP protocol, on which the Internet is built, is modelled using the TCP/IP 5-layer model.

Complete the table which summarises the 5-layer model. [6]

Order in

the Model

(5 - top of

the model)

LayerProtocol /

connectionDescription

1 EthernetAllows data to be transmitted and

received.

Network Layer IP

Application LayerThe group of applications requiring

network communications.

2 Data Link Layer MAC Where the network hardware operates.

4 TCP/UDPEstablishes connection with remote host.

Divides data into packets.

Page 7: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

5. A common way for database security to be breached is through SQL injection.

(a)

(i) Explain how SQL injection works. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

(ii) How can an organisation protect itself from SQL injection? [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

(b) Describe one way an organisation could identify security vulnerabilities in its systems. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

Page 8: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

6.

(a) Showing your workings complete the table below, converting between denary, binary and

hexadecimal numbers as necessary. [6]

Hexadecimal Denary Binary

D416 21210 110101002

19510 110000112

1316 000100112

9E16 15810

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………..

(b)

(i) Showing your workings, add 001110112 010101012 [2]

……………………………………………………………………………………………………………………………………………….

………………………………………………………………………………………………………………………………………………….

………………………………………………………………………………………………………………………………………………….

……………………………………………………………………………………………………………………………………………….

………………………………………………………………………………………………………………………………………………….

……

Page 9: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

(ii) Using an example of binary addition, explain the concept of overflow. [4]

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………....................................................................................................................

(c) Using an example demonstrate and state what effect an arithmetic shift of one place to the

right has on a byte. Then demonstrate and state what effect an arithmetic shift of two

places to the right will have on the same byte. [4]

…………………………………………………………………………………………………………………………….

………………………………………………………………………………………………………………………………………………….

………………………………………………………………………………………………………………………………………………….

………………………………………………………………………………………………………………………………………………….

…………………………………………………………………………………………………………………………………………………

….

…………………………………………………….................................................................................................

........................................................................................................................................................

........................................................................................................................................................

........................................................................................................................................................

...................

7. Many computers make use of utility software. Using an example of a type of utility software,

describe what utility software is and the particular function of your example. [3]

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

Page 10: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

…………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………

8. The diagram below shows a representation of a bitmap image.

LBL DB G G B LBL

B G G DG G LBL

DG G DG DG G DG

B B BR LB B B

B B DB BR B B

DG G LB DB DG G

The colours are as follows

G Green

SB Sky Blue

LBL Light Blue

DG Dark Green

BR Brown

DB Dark Brown

B Blue

LB Light Brown

(a) Explain using the example how this image would be stored on a computer. [3]

……………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………

Page 11: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

……………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………

(b) State two pieces of metadata stored in image files. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………...

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………...................................................................

................................

(c) The image can be compressed. Discuss the difference between lossy compression and

lossless compression. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

State how reducing the amount of colours in the image would have an effect on the quality and

file size of the image. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

(d) An image is compressed from 360 kb to 120kb. Calculate the compression ratio. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

9.

Page 12: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

The diagram shows a computer network.

(a) What are the following components? [3]

A ……………………………………………………………………………………………….

B………………………………………………………………………………………………..

C………………………………………………………………………………………………..

(b) A small business is thinking of changing its network from a client-server network to a peer-

to-peer network. What are the benefits and drawbacks of a peer-to-peer network

compared with a client server network? [6]

…………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

A B

C

Page 13: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

……………………………………………………………………………………………………………………………………………………..

…………………

10. Boolean logic reflects the way the logic gates work in a computer’s CPU.

(a)

(i) Complete the following truth table. [3]

(ii) Use this truth table to simplify the expression [1]

A+A . B

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

A B A A .B A+A . B

1 1

1 0

0 1

0 0

Page 14: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

(b) Using the following identities:

simplify the Boolean expression: [3]

X=(A+B ) . A

……………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………………………………….

P .P=0

(P+Q ) .R=(P .R )+(Q .R)

P+0=P

Page 15: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

(c) The following diagram shows a logic system.

Write down the Boolean expressions for each of the outputs Q1, Q2 and Q3 in terms of the

inputs A, B and C

Q1 = ...................................................... [1]

Q2 = ...................................................... [2]

Q3 = ...................................................... [1]

Page 16: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

11. Programs can be written in High Level Language or Low-Level Language.

(a) Discuss the difference between a High-Level Language and a Low-Level language. [4]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

(b) Describe the situations where a Low-Level Language might be used. [2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………………………………..

12.

(a) Smartphones are often only used for two years. Identify two reasons for this. [2]

1 …………………………………………………………………………………………………………………………………………………..

……………………………………………………………………………………………………………………………………………………..

2 …………………………………………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………………………………………………

Page 17: The Sutton Academy - Home · Web viewA CPU can be RISC or CISC. Describe the difference between a RISC processor and a CISC processor and explain where might they be used. [5] A 6th

(b) A student is thinking of replacing his computer monitor with a more energy efficient version.

Discuss the environmental impact of this. [6]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

(c) Identify how expansion of the internet access has a negative effect on the environment.

[2]

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………………………………