COMPUTER SCIENCE – Component 1

2y ago
23 Views
2 Downloads
732.57 KB
19 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Tia Newell
Transcription

CentreNumberSurnameCandidateNumber0Other NamesGCSE – NEWC500U10-1S18-C500U10-1COMPUTER SCIENCE – Component 1Understanding Computer ScienceMONDAY, 14 MAY 2018 – MORNING1 hour 45 minutesFor Examiner’s use onlyINSTRUCTIONS TO .810.12MarkAwardedC 5 0 0 U10101QuestionTotal100Use black ink or black ball-point pen.Write your name, centre number and candidate number in the spaces at the top of this page.Answer all questions.Write your answers in the spaces provided in this booklet.If you run out of space, use the continuation pages at the back of the booklet, taking care to numberthe question(s) correctly.INFORMATION FOR CANDIDATESThe number of marks is given in brackets at the end of each question or part-question.You are reminded of the necessity for good English and orderly presentation in your answers.The use of calculators is not permitted in this examination.The total number of marks is 100.Questions 1, 2, 3 and 6 will require you to draw on knowledge from multiple areas of your course ofstudy. WJEC CBAC Ltd.CJ*(S18-C500U10-1)

21.ExamineronlySound and graphics can be stored by computer systems.(a)Tick ( ) the boxes below to show whether the statements about sound sampling are[3]TRUE or FALSE.STATEMENTTRUEFALSENatural sound is in digital form. This is sampledand converted into analogue form to be storedby computer systems.A sound sample rate of 16 KHz means thewave is sampled 160,000 times a second.The lower the sampling rate, the better thequality of the sound file.(b)State what is meant by metadata and give an example of metadata stored in graphicsfiles.[2](c)Kevin has compressed a sound file to reduce its size using lossy compression. He thenconverted the resulting file to a lossless file format to improve its quality.Explain the disadvantages of this process. WJEC CBAC Ltd.(C500U10-1)[3]

3(d)ExamineronlyA simple bitmap graphic has the following characteristics: 8-bit colour depth10 300 pixels.[3]C 5 0 0 U10103Calculate the file size of this graphic in kilobytes. Show your workings. WJEC CBAC Ltd.(C500U10-1)Turn over.

42.The computer systems used at a warehouse have a single-core Central Processing Unit (CPU)and a typical Von Neumann architecture.(a)Describe the role of the following components.[2]ControlUnit[1]ArithmeticLogic Unit(b)Describe RISC type processors. WJEC CBAC Ltd.[2](C500U10-1)Examineronly

5Explain how main memory is used during the fetch-decode-execute cycle.(d)The computer systems used at the warehouse are starting to run slowly when searchingfor items in stock.(i)[3]The warehouse is considering replacing the CPUs in their computer systems witheither of the following:CPU 13 GHzQuad-core4MB cacheCPU 24 GHzDual-core8MB cacheCompare the performance of the two CPUs. WJEC CBAC Ltd.(C500U10-1)[6]Turn over.C 5 0 0 U10105(c)Examineronly

6Examineronly(ii)The warehouse staff could use different types of utility software to improve the diskaccess speed.Give examples of utility software that could be used to improve disk accessspeed.[4] WJEC CBAC Ltd.(C500U10-1)

7Many different embedded systems are used in household devices.(a)Describe what is meant by the term embedded systems.(b)A heater is controlled by an embedded system. [2]There is a power button (A) to turn the power going to the heater on or off.A temperature sensor (B) will turn the heater on when the temperature is below20 C, provided the power button has been left on.A manual override switch (C) will turn the heater on, regardless of the temperature,provided the power button has been left on.Construct a logic statement to represent this situation, using the symbols A, B, and C.[3](c) Bit patterns can be used to represent the different states of an embedded system.These bits can be manipulated by several different operations.Perform an arithmetic shift left by 3 places on the 16 bit binary number00001010010011112 and state the effect that this has on the number. WJEC CBAC Ltd.(C500U10-1)[2]Turn over.C 5 0 0 U101073.Examineronly

84.ExamineronlyProtocols provide an agreed set of rules to allow networked devices to communicate.(a)Tick ( ) the box to identify the protocol used to send email messages to an email[1]server.SMTPFTPPOP3IMAP(b)Describe the role of the Ethernet protocol.[2](c)Explain the difference between the HTTP and HTTPS protocols.[2] WJEC CBAC Ltd.(C500U10-1)

9Describe each of the following layers in the TCP/IP 5-layer model for data transmission:[6] Physical layerTransport layerApplication layerC 5 0 0 U10109(d)Examineronly WJEC CBAC Ltd.(C500U10-1)Turn over.

105.Describe and give examples of the following types of programming LinkingRounding6.Different types of programming language are used by programmers.(a)Describe why high-level programming languages are preferred for many programmingtasks.[4] WJEC CBAC Ltd.(C500U10-1)Examineronly

11(b)The following code, which contains errors, is written in a certain high-level programminglanguage:1Declare CountProc2Count is integer3set Count 045for i 1 t 10006Cout Count i7output Countnext i8910End Subroutine(i)Describe the difference in the way in which this code would be interpreted and theway in which this code would be compiled.[2](ii)Discuss the benefits and drawbacks of compilers and interpreters. WJEC CBAC Ltd.(C500U10-1)[4]Turn over.Examineronly

127.ExamineronlyThe table below shows data for a payroll system.FieldExample DataFurther informationSurnameWilliamsNational Insurance (NI) numberJN126523AJob titleSemi-skilledWeek number12Full timeYY or NHours worked (current week)35Maximum 40 hours per weekFull hours onlyHourly pay rate7.50Maximum of 15.00 per hourApprentice, semi-skilled, skilled,supervisor(a)State the most suitable data structure to store this data, justifying your choice.(b)Some of the data can be validated. Design three different types of validation check.[2][2]Validation Check 1Field: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Type of check: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Rule:[2]Validation Check 2Field: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Type of check: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Rule: WJEC CBAC Ltd.(C500U10-1)

13[2]Validation Check 3Field: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Type of check: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Rule:8.(a)Complete the table below, converting between denary, binary and 01010012291658103A1610101111225310AF16111111012(b) Complete the table to calculate the binary addition of 1410 to 6710 using an 8-bit register.[3]67101410Answer WJEC CBAC Ltd.(C500U10-1)Turn over.Examineronly

14(c) Using a suitable example, explain the concept of overflow in relation to binary addition.[3]9.(a)(b)Complete the following truth table.PQ11100100[4]P QP.QDraw a truth table for the expression:X A.B A.B WJEC CBAC Ltd.(C500U10-1)P.QP.Q (P Q)[4]Examineronly

1510. Internet protocols, operating systems and network equipment all present inherent technicalvulnerabilities that must be identified and protected against.(a)(b)Describe the following forms of attack on cybersecurity:(i)SQL injection.[2](ii)IP address spoofing.[2]Describe methods of identifying these vulnerabilities. WJEC CBAC Ltd.(C500U10-1)[8]Turn over.Examineronly

16ExamineronlyEND OF PAPER WJEC CBAC Ltd.(C500U10-1)

17ExamineronlyFor continuation only. WJEC CBAC Ltd.(C500U10-1)Turn over.

18ExamineronlyFor continuation only. WJEC CBAC Ltd.(C500U10-1)

19BLANK PAGE WJEC CBAC Ltd.(C500U10-1)

COMPUTER SCIENCE – Component 1 Understanding Computer Science MONDAY, 14 MAY 2018 – MORNING 1 hour 45 minutes S18-C500U10-1 For Examiner’s use only Question Maximum Mark Mark Awarded 1. 11 2. 18 3. 7 . The computer systems used a

Related Documents:

RR Donnelley Component R.R. Donnelley Printing Companies Component Haddon Component Banta Employees Component Banta Book Group Component Banta Danbury Component Banta Specialty Converting Component Moore Wallace Component (other than Cardinal Brands Benefit and Check Printers Benefit) Cardinal Brands Benefit of the Moore Wallace Component

This handbook supplement applies to students entering the fourth year of their degree in Computer Science, Mathematics & Computer Science or Computer Science . Undergraduate Course Handbook 1.2 Mathematics & Computer Science The Department of Computer Science offers the following joint degrees with the Department of Mathematics: BA .

Since we have a custom component in the model we can open the Custom component editor. Edit custom 1. Select the User_end_plate component symbol. component 2. Right-click and select Edit custom component. The Custom component editor opens along with the Custom component editor toolbar, the Custom component browser and four views of the custom .

Note that when a new component or component update has been released that is part of the TMS Component pack, there might be some delay before the full TMS Component pack update is available that contains this new component or component update. This is due to the far more extensive testing and build procedure for the complete TMS Component Pack.

Trends in the State of Computer Science in U.S. K-12 Schools 2016 Table of Contents Executive Summary 3 Introduction 5 Value of Computer Science in Schools 6 Opportunities to Learn Computer Science 9 Perceptions of Computer Science 14 Challenges and Opportunities for Computer Science in K-12

Introduction to Computer Science I Course Overview Computer Science 111 Boston University Welcome to CS 111! Computer science is not so much the science of computers as it is the science of solving pro

Computer Science Teachers Association, Cyber Innovation Center, and National Math and Science Initiative have answered the call by organizing states, districts, and the computer science education community to develop conceptual guidelines for computer science education. The K-12 Computer Science Framework was developed for -12 Computer Science

Computer Science as a discipline 8.1 The role and sub-disciplines of computer science 8.2 Artificial intelligence, data science and computer science 8.3 Ethical aspects of computer science 8.4 The ACM Code of