PAPER 2 PAST PAPERS Flashcards
Explain how unsigned binary integers can be converted to hexadecimal [2]
the bit pattern is split into sections of 4 bits, each section is converted to hexadecimal
One advantage of using majority voting over a parity bit and explain how this advantage is achieved [2]
majority voting can correct as majority is taken as correct, can detect multiple errors as each triplet represents one and bit and error is identified per bit
Describe the steps the ADC goes through [3]
takes samples of the signal at regular intervals, samples are quantised, each sample is assigned a binary value
Explain why it is more appropriate for a band to save the song using lossless compression rather than lossy [2]
no data is lost during lossless compression, song can be reproduced identically to original with no loss of quality w lossless
Explain the differences between an interpreter and a compiler [4]
compiler produces object code, interpreter does not, compiler translates whole source code, interpreter translates line by line, compiler will not produce an executable file if there is an error in code, interpreter will run program up until first error, compiler no longer needed to execute compiled program, interpreter is always needed
A company is using a new processor in its latest microwave, why have they chosen to use assembly language rather than a high-level language [3]
may not be an interpreter for the chip as it is new, platform dependence is not relevant since code will only run on one type of device, for an interpreted solution the chip would have to incorporate an interpreter which would increase memory requirements
Describe one difference between the way the Harvard and von Neumann architectures operate [2]
harvard uses separate memory/bus/address space while von neumann uses combined memory/bus/address space, for instructions and data
Which type of computer architecture that is used for digital signal processing [1]
harvard
Describe the steps involved in the Fetch-Execute cycle for the von Neumann [6]
fetch: contents of PC transferred to MAR,
address bus used to transfer to main memory
contents of addressed memory location loaded into MBR,
increment PC,
contents of MBR copied to CIR
decode: decode instruction hold by CIR,
control unit decodes instruction,
split into opcode and operand
execute: data is fetched or stored in memory if needed,
opcode identifies type of operation to be performed,
result stored in register,
operation performed by processor
Explain the difference between direct addressing and immediate addressing [1]
direct addressing means that operand is the memory address/register number, immediate addressing means that the operand is the datum
Describe two reasons why serial transmission might be preferred to parallel transmission [4]
parallel requires more wires so higher cost and more difficult to manage, parallel risk of data skew over long distances so limits transmission speed, parallel risk of crosstalk between wires so more chance of errors and limit transmission speeds
Define bit rate [1]
frequency at which bits can be transmitted/transferred
Define latency [1]
the delay between signal being transmitted and arriving
Explain how disabling SSID broadcasting can increase the security of a wireless network [2]
SSID will not be visible when trying to connect to network so only users who know SSID of network can connect
Explain how the use of a MAC address white list can increase the security of a wireless network [2]
MAC address is unique to every NIC and a whitelist only allows those MAC address that have been authorised to connect to the network
Discuss legal ethical and cultural issues with Street View [9]
material may be of harm to children, requesting permission from any members of public, recording of adverts may lead to product placement, what harmful uses users might use the images for, dealing with copyrighted information, does google need permission to film in private buildings, may not be legal to film people without permission, copyrighted information caught may lead to legislation breach, ability to identify locations for crimes or terrorism, worldwide so need to consider worldwide legislation, offensive to cultures, pictures inside religious buildings may be inappropriate
Describe how a laser printer prints an image to a piece of paper [6]
print drum coated in charge, printer generates bitmap of page from data, laser beams shone on print drum, laser is modulated, laser neutralises charge on drum where image is dark, toner given charge, toner transferred to paper, toner fused to paper
In decimal, what is the most negative number that can be represented using 12-bit two’s complement binary integer? [1]
-2048
Describe the difference between analogue and digital data [2]
analogue is continuous, digital is discrete
State two advantages of representing music using MIDI instead of as sampled sound [2]
more compact representation, easy to modify notes, easy to change instruments
What is encryption? [1]
convert a message into cipher text, requires key to decrypt
Explain why the Vernam is a better choice than the Caesar cipher [2]
vernam is unbreakable as frequency analysis reveals nothing, more possible keys
Which category of software does an operating system belong to?
system software
State one resource that the operating system manages [1]
processors, memory, I/O devices
State one role of the operating system, other than resource management [1]
hide the complexities of the hardware from the user
What is the stored program concept? [2]
instructions are stored in main memory and fetched and executed serially by processor, programs can be moved in and out of main memory
Ella’s program is compiled into an executable file but will not run on Josephine’s because they have different processors. Explain why different processors may have caused this issue [2]
different processors will have different instruction sets, program is in machine code and is platform dependent
Why might a computer with one running at 3.2GHz complete tasks faster than one with fore cores running at 2.8 GHz [2]
a processor with clock speed of 3.2GHz may be able to execute instructions more quickly, where sequential processing is needed
Discuss the ethical legal and cultural issues that may arise from creating driverless cars to provide a taxi service [9]
developers have to take responsibility for accidents, program needs to make moral decisions, need to be protected from hackers, putting taxi drivers out of business, other businesses may follow suit putting people out of business, if a customer is ill the taxi will not be able to handle that, legal responsibility for accidents, if videos/images taken during driving, driverless cars would need to be advertised as safer and reducing congestion
Describe a digital image could be captured by a digital camera and compressed using run-length encoding [6]
light enters through lens on to sensor chip, each sensor produces an electrical signal, representing a pixel, ADC converts light intensity into binary data, colour filter applied, image is analysed to identify runs of same colour, colours and counts of pixel are stored
Describe the difference between a physical and logical topology [2]
physical: the physical layout/architecture of the cabling, logical: how data flows around a network
Explain the operation of a physical star topology [2]
every device is connected to central hub, every device sends data via central hub, hub sends packets of data to intended recipient only
A new bank is setting up an internal network, explain why it should implement a client-server rather than peer-to-peer [6]
servers would need to be accessible at all times, p2p may be turned off, needs to have centralised backups reducing cost and time taken to ensure data is secure, centralised security ensuring anti-virus are up to date ensuring maximum security
Explain why some compilers produce bytecode as the final output instead of executable code [1]
code may need to be run on multiple platforms so may need to be platform independent
Describe how bytecode programs are executed after the bytecode has been produced [2]
a virtual machine interprets bytecode an instruction at a time and runs necessary code to carry out command
Explain what is meant by the term imperative high-level language [2]
instructions are execute in programmer-defined order, describes how to solve a problem
Explain the difference between the set of natural numbers and the set of integer numbers [1]
integers include negative numbers, natural numbers do not
Explain the difference between rational and irrational numbers [1]
rational can be expressed as a fraction, irrational can not
Explain why programmers often use hexadecimal to represent bit patterns instead of binary [1]
more compact when displayed, easier for people to understand, lower likelihood of an error when typing in data
Explain why Unicode was introduced as an alternative to ASCII [2]
introduced to support a larger range of characters due to increased international communication
What is meant by the term hardware? [1]
the physical components of computer system
What is meant by the term software? [1]
instructions
Explain the key difference between system software and application software [2]
system software controls the operation of computer system, application software is for carrying out tasks that are user-oriented
When a processor writes data to the main memory it will make use of the address, control and data buses. Explain how each of these buses will be used during the write process [4]
address of memory to be written to is placed on address bus, data to be written is placed on data bus, signal to write is placed on control bus, control bus carries a clock signal to synchronise memory and processor
Explain why computers have both hard disks and SSD rather than just one [2]
magnetic disk drives are useful where large capacity needed, ssd have faster access speeds
Explain why it is faster to access data from solid state storage than from an optical disk [2]
no movable parts so no need for read/write heads to move to correct position, purely electronic so minimal latency
Explain why a peer-to-peer network may be better for three students sharing a house who have set up p2p for sharing files and playing multi-user games [2]
does not need central server, easer to maintain, probably wont need extra security or extra services provided by client-server
Define the term protocol [1]
a set of rules
Define the term baud rate [1]
number of signal changes in a second
Define the term bandwidth [1]
the range of frequencies that can be transmitted across a network connection
Discuss how encrypting data with WPA/WPA2, disabling SSID broadcasting and MAC address whitelisting could enhance the security of a WiFi network [3]
WPA/WPA2 encrypted data reduces chance of unauthorised devices reading transmitted data, SSID broadcast disabled means that SSID wont show up in a search, MAC address whitelisting means only approved devices can join network
Explain the process a transmitting device will go through to transmit data using CSMA/CA, RTS/CTS and majority voting [8]
transmitting device checks for traffic, if another transmission in progress transmitter waits, once channel is idle transmitter sends RTS, receiver responds with CTS, if CTS not received, transmitter waits random amount of time before resending RTS, when CTS received transmitter begins transmitting data, receiver sends ACK, if no ACK received then data is resent, majority voting: transmitter would send each bit an odd number of times, receiver checks bits received and if they are not all the same it assumes the one received most is correct
Explain an advantage that majority voting has over using parity bits when transmitting data [1]
majority voting can correct errors, can detect multiple errors
Describe two differences between machine code and assembly language [2]
machine code is binary but assembly language is written using mnemonics, machine code can be executed without needing to be translated but assembly code needs translating before it is run