PAPER 2 PAST PAPERS Flashcards
Explain how unsigned binary integers can be converted to hexadecimal [2]
the bit pattern is split into sections of 4 bits, each section is converted to hexadecimal
One advantage of using majority voting over a parity bit and explain how this advantage is achieved [2]
majority voting can correct as majority is taken as correct, can detect multiple errors as each triplet represents one and bit and error is identified per bit
Describe the steps the ADC goes through [3]
takes samples of the signal at regular intervals, samples are quantised, each sample is assigned a binary value
Explain why it is more appropriate for a band to save the song using lossless compression rather than lossy [2]
no data is lost during lossless compression, song can be reproduced identically to original with no loss of quality w lossless
Explain the differences between an interpreter and a compiler [4]
compiler produces object code, interpreter does not, compiler translates whole source code, interpreter translates line by line, compiler will not produce an executable file if there is an error in code, interpreter will run program up until first error, compiler no longer needed to execute compiled program, interpreter is always needed
A company is using a new processor in its latest microwave, why have they chosen to use assembly language rather than a high-level language [3]
may not be an interpreter for the chip as it is new, platform dependence is not relevant since code will only run on one type of device, for an interpreted solution the chip would have to incorporate an interpreter which would increase memory requirements
Describe one difference between the way the Harvard and von Neumann architectures operate [2]
harvard uses separate memory/bus/address space while von neumann uses combined memory/bus/address space, for instructions and data
Which type of computer architecture that is used for digital signal processing [1]
harvard
Describe the steps involved in the Fetch-Execute cycle for the von Neumann [6]
fetch: contents of PC transferred to MAR,
address bus used to transfer to main memory
contents of addressed memory location loaded into MBR,
increment PC,
contents of MBR copied to CIR
decode: decode instruction hold by CIR,
control unit decodes instruction,
split into opcode and operand
execute: data is fetched or stored in memory if needed,
opcode identifies type of operation to be performed,
result stored in register,
operation performed by processor
Explain the difference between direct addressing and immediate addressing [1]
direct addressing means that operand is the memory address/register number, immediate addressing means that the operand is the datum
Describe two reasons why serial transmission might be preferred to parallel transmission [4]
parallel requires more wires so higher cost and more difficult to manage, parallel risk of data skew over long distances so limits transmission speed, parallel risk of crosstalk between wires so more chance of errors and limit transmission speeds
Define bit rate [1]
frequency at which bits can be transmitted/transferred
Define latency [1]
the delay between signal being transmitted and arriving
Explain how disabling SSID broadcasting can increase the security of a wireless network [2]
SSID will not be visible when trying to connect to network so only users who know SSID of network can connect
Explain how the use of a MAC address white list can increase the security of a wireless network [2]
MAC address is unique to every NIC and a whitelist only allows those MAC address that have been authorised to connect to the network
Discuss legal ethical and cultural issues with Street View [9]
material may be of harm to children, requesting permission from any members of public, recording of adverts may lead to product placement, what harmful uses users might use the images for, dealing with copyrighted information, does google need permission to film in private buildings, may not be legal to film people without permission, copyrighted information caught may lead to legislation breach, ability to identify locations for crimes or terrorism, worldwide so need to consider worldwide legislation, offensive to cultures, pictures inside religious buildings may be inappropriate
Describe how a laser printer prints an image to a piece of paper [6]
print drum coated in charge, printer generates bitmap of page from data, laser beams shone on print drum, laser is modulated, laser neutralises charge on drum where image is dark, toner given charge, toner transferred to paper, toner fused to paper
In decimal, what is the most negative number that can be represented using 12-bit two’s complement binary integer? [1]
-2048
Describe the difference between analogue and digital data [2]
analogue is continuous, digital is discrete
State two advantages of representing music using MIDI instead of as sampled sound [2]
more compact representation, easy to modify notes, easy to change instruments
What is encryption? [1]
convert a message into cipher text, requires key to decrypt
Explain why the Vernam is a better choice than the Caesar cipher [2]
vernam is unbreakable as frequency analysis reveals nothing, more possible keys
Which category of software does an operating system belong to?
system software
State one resource that the operating system manages [1]
processors, memory, I/O devices