Cambridge Ordinary Level
Cambridge Ordinary Level
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
DC (KS) 171196
© UCLES 2018 [Turn over
2
B U S
66 85 83
66
85
83
[3]
K E Y
01001011 ...............................................
01000101 ...............................................
01011001 ...............................................
[3]
1 .........................................................................................................................................
2 .........................................................................................................................................
3 .........................................................................................................................................
[3]
(iii) State two benefits of using hexadecimal notation to represent binary values.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
RAM ROM
Statement
(✓) (✓)
(b) Circle the storage category that includes both RAM and ROM.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
3 A greenhouse uses a system to monitor the conditions that plants need to grow.
Binary
Input Condition
value
1 Window is open
W
0 Window is closed
1 Temperature >=26 °C
T
0 Temperature <26 °C
1 Humidity >=50%
H
0 Humidity <50%
The system will sound an alarm when certain conditions are detected.
or
T X
[5]
4 (a) Identify three security issues that can put a computer system at risk.
(b) Explain how a firewall can help to protect a computer system from security issues.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
5 (a) Karina is taking her Computer Science examination. She has three questions to answer
about output devices.
“It is a high powered laser that cuts materials such as thin metals or wood.”
.......................................................................................................................................[1]
“The screen is made up of blocks of red, green and blue pixels. The screen uses layers
of different types of liquid.”
.......................................................................................................................................[1]
“It is responsible for powering and moving a motor in machinery, such as a robot arm in
a factory.”
.......................................................................................................................................[1]
(b) Karina correctly answers another examination question about some more output devices.
Complete the sentences in Karina’s answer, using the list given. Not all terms in the list need
to be used.
• 3D
• digital light projector
• inkjet
• interactive whiteboard
• laser
• rotating
• scanning
• sliding
• speaker
• thermal bubble
surface using a pen, the text and drawings can then be captured and stored for later use.
6 (a) Many programmers write computer programs in high-level languages. The programs need to
be translated into machine code to be read by the computer.
Translator 1 ...............................................................................................................................
Translator 2 ...............................................................................................................................
[2]
(b) Explain two reasons why a computer programmer may choose to write a program in a high-
level language, rather than a low-level language.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Tick (✓) to show whether each example of computer code is High-level language, Assembly
language or Machine code.
Hyper Text Transfer Protocol The website address that is typed into the
(HTTP) address bar
[5]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.
Identify and describe three methods of error detection that could be used to see if an error
has occurred.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[9]
The pH of the water should be between 6 and 8. The system outputs an alert if the pH of the water
is not in this range.
Explain how the system uses the pH sensors and the microprocessor to help monitor the pollution.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[5]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.