0% found this document useful (0 votes)
8 views12 pages

Cambridge Ordinary Level

This document is the Cambridge International Examinations Paper 1 Theory for Computer Science, Ordinary Level, from October/November 2018. It consists of various questions covering topics such as character sets, data storage, security issues, output devices, programming languages, data transmission methods, and pollution monitoring systems. The exam has a total of 75 marks and includes both theoretical questions and practical applications.

Uploaded by

ibraheemtcs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views12 pages

Cambridge Ordinary Level

This document is the Cambridge International Examinations Paper 1 Theory for Computer Science, Ordinary Level, from October/November 2018. It consists of various questions covering topics such as character sets, data storage, security issues, output devices, programming languages, data transmission methods, and pollution monitoring systems. The exam has a total of 75 marks and includes both theoretical questions and practical applications.

Uploaded by

ibraheemtcs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Cambridge International Examinations

Cambridge Ordinary Level


* 7 2 5 2 4 7 4 5 5 8 *

COMPUTER SCIENCE 2210/12


Paper 1 Theory October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.


No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75.

This document consists of 11 printed pages and 1 blank page.

DC (KS) 171196
© UCLES 2018 [Turn over
2

1 Computers use a character set to convert text into binary.

One character set that can be used is ASCII.

Each letter in ASCII can also be represented as a denary value.

(a) The word BUS has the denary values:

B U S

66 85 83

Convert the denary values into 8-bit binary.

66

85

83
[3]

(b) Each letter in ASCII can also be represented as a hexadecimal value.

The word KEY has the 8-bit binary values:

K E Y

01001011 01000101 01011001

(i) Convert the three 8-bit binary values into hexadecimal.

01001011 ...............................................

01000101 ...............................................

01011001 ...............................................
[3]

© UCLES 2018 2210/12/O/N/18


3

(ii) Give three other uses of hexadecimal notation in computer science.

1 .........................................................................................................................................

2 .........................................................................................................................................

3 .........................................................................................................................................
[3]

(iii) State two benefits of using hexadecimal notation to represent binary values.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]

2 A computer uses RAM and ROM to store data.

(a) The table contains three statements about RAM or ROM.

Tick (✓) to show whether each statement describes RAM or ROM.

RAM ROM
Statement
(✓) (✓)

Stores the programs and data that are currently in use

Used to boot up the computer when power is turned on

Contents are retained when power is turned off


[3]

(b) Circle the storage category that includes both RAM and ROM.

Primary Secondary Off-line


[1]

(c) Explain what is meant by off-line storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 2210/12/O/N/18 [Turn over


4

3 A greenhouse uses a system to monitor the conditions that plants need to grow.

The inputs to the system are:

Binary
Input Condition
value
1 Window is open
W
0 Window is closed
1 Temperature >=26 °C
T
0 Temperature <26 °C
1 Humidity >=50%
H
0 Humidity <50%

The system will sound an alarm when certain conditions are detected.

Alarm (X) will sound (=1) when:

window is closed and temperature >=26 °C

or

temperature <26 °C and humidity >=50%

Draw a logic circuit to represent the system.

T X

[5]

© UCLES 2018 2210/12/O/N/18


5

4 (a) Identify three security issues that can put a computer system at risk.

Security issue 1 ........................................................................................................................

Security issue 2 ........................................................................................................................

Security issue 3 ........................................................................................................................


[3]

(b) Explain how a firewall can help to protect a computer system from security issues.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

5 (a) Karina is taking her Computer Science examination. She has three questions to answer
about output devices.

(i) For the first question she writes the answer:

“It is a high powered laser that cuts materials such as thin metals or wood.”

Identify the output device that Karina is describing.

.......................................................................................................................................[1]

(ii) For the second question she writes the answer:

“The screen is made up of blocks of red, green and blue pixels. The screen uses layers
of different types of liquid.”

Identify the output device that Karina is describing.

.......................................................................................................................................[1]

(iii) For the third question she writes the answer:

“It is responsible for powering and moving a motor in machinery, such as a robot arm in
a factory.”

Identify the output device that Karina is describing.

.......................................................................................................................................[1]

© UCLES 2018 2210/12/O/N/18 [Turn over


6

(b) Karina correctly answers another examination question about some more output devices.

Five different terms have been removed from her answer.

Complete the sentences in Karina’s answer, using the list given. Not all terms in the list need
to be used.

• 3D
• digital light projector
• inkjet
• interactive whiteboard
• laser
• rotating
• scanning
• sliding
• speaker
• thermal bubble

An ................................................................................................... allows a user to write on a

surface using a pen, the text and drawings can then be captured and stored for later use.

An ................................................................................................... printer produces a hard

copy of a document using ................................................................................................... and

piezoelectric technology. A ...................................................................................................

printer uses a .............................................................................................. drum, and positive

and negative charges, to produce a hard copy of a document.


[5]

© UCLES 2018 2210/12/O/N/18


7

6 (a) Many programmers write computer programs in high-level languages. The programs need to
be translated into machine code to be read by the computer.

State two types of translator that can be used.

Translator 1 ...............................................................................................................................

Translator 2 ...............................................................................................................................
[2]

(b) Explain two reasons why a computer programmer may choose to write a program in a high-
level language, rather than a low-level language.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

(c) Three examples of computer code are given in the table.

Tick (✓) to show whether each example of computer code is High-level language, Assembly
language or Machine code.

High-level Assembly Machine


Computer code language language code
(✓) (✓) (✓)
10110111
11001100
01011100
FOR X = 1 TO 10
PRINT X
NEXT X
INP X
STA X
LDA Y
[3]

© UCLES 2018 2210/12/O/N/18 [Turn over


8

7 Six internet terms and six definitions are listed.

Draw a line to connect each term to a correct definition.

Internet term Definition

A program that allows a user to view


Browser
webpages

Internet Service Provider The main protocol that governs the


(ISP) transmission of data using the Internet

Hyper Text Transfer Protocol The website address that is typed into the
(HTTP) address bar

Uniform Resource Locator An address given to each device on a network.


(URL) It is provided by the network

A unique address given to a device on a


MAC address
network. It is provided by the manufacturer

A company that provides a connection to


IP address
access the Internet

[5]

8 Describe the purpose of an interrupt in a computer system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 2210/12/O/N/18


9

9 (a) Computers can transmit data using different methods.

Describe the three data transmission methods given.

(i) Serial data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Parallel data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Duplex data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2018 2210/12/O/N/18 [Turn over


10

(b) Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.

Identify and describe three methods of error detection that could be used to see if an error
has occurred.

Error detection method 1 ..........................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Error detection method 2 ..........................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Error detection method 3 ..........................................................................................................

Description .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[9]

© UCLES 2018 2210/12/O/N/18


11

10 A system uses pH sensors and a microprocessor to help monitor pollution in a river.

The pH of the water should be between 6 and 8. The system outputs an alert if the pH of the water
is not in this range.

Explain how the system uses the pH sensors and the microprocessor to help monitor the pollution.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2018 2210/12/O/N/18


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 2210/12/O/N/18

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy