Past Paper Example Questions Flashcards

1
Q

State the problem that will occur if a computer is to store the result 01101100 as a byte? (1)

A

-There is an overflow/a carry left over after the addition/does not fit into
one byte.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the use of a HTML file? (1)

A

-html: define content/layout of web pages/links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the use of a JPG file? (1)

A

-jpg: images/photos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the use of a MP3 file? (1)

A

-mp3: sound/audio/music files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the use of a PDF file? (1)

A

-pdf: documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain one reason why a secondary storage devise is needed in most computer systems? (2)

A
  • To store the files/eg operating system.

- Even when the system is switched off/which must be non-volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some secondary storage devices are magnetic and others are solid state. Describe the characteristics of magnetic and solid state secondary storage? (6)

A

Points may include:
–Magnetic:
-Tend to be large capacity, relatively cheap
-Sensitive to movement of system due to moving parts
-Used as main storage for
computers, eg to store OS.
–Solid state
-Relatively expensive so tend to be of smaller capacity
-No moving parts so not sensitive to movement
-Used when portability is
important… transferring files, USB keys… or as main storage for PDAs, mobile computers
- … as a result, portable magnetic formats (eg floppy disks) are no longer used in favour of solid state
storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State two benefits of a LAN? (2)

A
  • Can share files/can work collaboratively on same files.
  • Can share hardware resources/suitable example.
  • Can access their files from any computer/classroom.
  • Can work together from different computers using instant messaging.
  • Centralized deployment of software to all computers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain two measures which the school will need to take to ensure the security of the network? (4)

A
  • Passwords protected user accounts
  • … to ensure that only authorised people can access the network.

–Network policy restrictions eg students only allowed to log in during
school hours, from certain computers
–… ensures that attempts to enter in the system are likely to be genuine.

  • –Different levels of access/each user can only access the files they need
  • – … prevents accidental damage to files.
  • — Firewall…
  • — … to prevent unauthorised access /hacking into the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe how sampling is used when storing sound? (2)

A

-The height/amplitude of the sound wave is measured
… at regular intervals
… and converted to binary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the effect of the sampling interval on the size and quality of the sound file recorded? (3)

A

-If the interval is smaller/if you sample more often you have more data
to store…
… so larger file
- But the sound reproduced is closer to the original…
…so better quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The accident and emergency department of a hospital uses a computer system to decide the order in which patients are treated. Describe advantages of using a computer system instead of a person to decide the order, and the need for this system to be reliable. (6)

A

=Advantages
- Computer system is more systematic than human… will not forget some patients/give
consistent results
- Software can be deployed in several departments
- Easier to analyse records and measure the performance of the hospital.

=Reliability
- Critical application, lives may be at stake if there are errors in the program
- Loss of data/loss of power or any
system down time can have adverse effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain why data is stored in computers in binary format? (2)

A

=Circuit only needs to check for two states/uses switches…
… electricity flowing or not flowing/on or off/1 and 0
… resulting in more reliable circuits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

State how the ASCII character set is used to represent text in a computer? (1)

A
  • Each character is assigned a unique character code

- Each letter is converted to its character code (which is a binary number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain why the ASCII character set is not suitable for representing text in all the languages of the world? (2)

A
  • ASCII uses 8 bits…
    … and so can only represent 255/256 distinct characters…
    ..many more characters are needed for coping with all languages
    (eg Unicode 16bits).
  • ASCII does contain characters used in some languages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Charley is writing a program for music students. To make sure that there are no logical errors in the program, Charley uses a test plan. Describe what is meant by a logical error? (2)

A
  • The error does not prevent program running…
  • But it does not produce the expected output/it does not do what the
    programmer intended.
  • A reasonable example.
17
Q

State two functions of the operating system? (2)

A
  • Provides interfaces between user and computer/Determines look and feel of the computer
  • Provides a platform for software to run
  • Manages peripherals used by the system
  • Manages memory.
18
Q

Describe what is meant by open source software? (2)

A
  • The source code is distributed with the software
  • The customer can modify the source code
  • The customer can redistribute the source code (with the same
    licence/restrictions)
19
Q

Describe what is meant by a database? (2)

A
  • A persistent…
  • … and structured/organised store of data.
  • Allows data to be queried/interrogated.
20
Q

When a person joins the website, they need to enter some personal data which is validated using rules. For example, the data of birth must be in the past. State one rule for the following.

=Email Address? (1)

A

=Email address

  • Must contain an @ sign
  • Must contain a full stop (after the @ sign).
21
Q

When a person joins the website, they need to enter some personal data which is validated using rules. For example, the data of birth must be in the past. State one rule for the following.

=Gender? (1)

A

=Gender

- Must be one of Male, Female, (Other).

22
Q

When a person joins the website, they need to enter some personal data which is validated using rules. For example, the data of birth must be in the past. State one rule for the following.

=Password? (1)

A

=Password

  • Must have a given minimum length
  • Must contain a non-letter.
23
Q

Each user can upload several pictures. Each picture has a date and a comment. The personal data of users is stored in a table called USER. The data about the pictures is stored in a separate table called PICTURE. Explain why the data about the pictures should be in a separate table, and how the tables can be linked. (4)

A

-Avoids data repetition/redundancy/inconsistency…
… with the personal details of the user
… a user can have more than one picture/one to many
- The primary key of the USER is stored in the PICTURE table
- Where it is a foreign key.

24
Q

Describe two tools in an IDE (integrated development environment) that can help Jim when creating the program. (4)

A

=Editor

  • Allows Jim to enter the program code
  • Colour coding keywords
  • Auto-completes code as you type.

= Compiler
- Transforms the written source code into machine code.

= Debugging tools

  • Highlights errors in the code
  • Suggests possible solutions.
25
Q

The wages earned by a worker is either £2 for every teddy bear they have made or £5 for every hour they have worked, which ever is larger.

Write an algorithm that:

  • Allows the user to input the number of teddy bears made and the number of hours worked.
  • Calculates the wages for the number of teddy bears made.
  • Calculates the wages for the number of hours worked.
  • Outputs the larger of the two results. (6)
A
INPUT TeddyBears 
INPUT Hours 
PerTeddyBear = 2 * TeddyBears 
PerHour = 5 * Hours 
IF PerTeddyBear > PerHour THEN 
 OUTPUT PerTeddyBear 
ELSE 
 OUTPUT PerHour 
END IF 

=Award marks for:

  • Inputting teddybears and hours.
  • 2 * number of teddy bears.
  • 5 * hours.
  • Comparing the two answers.
  • Outputting the piece rate if it is greater.
  • Outputting the hour rate if it is greater.