Professional Documents
Culture Documents
CANDIDATE NAME
_____________________________________________________________________________________
1
Paper-01 (50 marks)
018
2B7
77C
Working Space
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
…………………………............................................................................................................................................
(b) Each ticket also has a QR code. The QR code is scanned at the entrance to the venue.
A person can only enter the venue with a valid QR code that allows entry.
When a person enters, a count is incremented to show how many people have entered the venue.
Explain how the system scans the QR code, checks if a person can enter and counts how many people
have entered. [3]
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
…………………………............................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
…………………………............................................................................................................................................
2
3. The following paragraph explains how data is sent securely using the TLS protocol.
Use the terms to complete the paragraph. Not all terms may need to be used. [5]
• authentic
• binary
• browser
• certificate
• internet service provider
• signal
• web page
• web server
• website
4. Victoria is entering data into a computer system. The data will be transmitted to cloud storage.
(a) An even parity check is used to check for errors in the binary values after transmission.
For each of the 7-bit binary values, write the Parity bit that makes sure even parity is met. [3]
(b) Identify two other error checking methods that could be used to check the binary values are correct
after transmission. [2]
Method 1 ...................................................................................................................................
Method 2 ...................................................................................................................................
1 ........................................................................................................................................
2 ........................................................................................................................................
(ii) State what Alessandro could do to make sure that he can retrieve his data if it is accidentally
damaged. [1]
.......................................................................................................................................................................
3
(b) Alessandro also uses off-line storage to store his data.
Three examples of off-line storage are Blu-ray, CD and DVD.
Six statements are given about off-line storage.
Tick (✓) to show if each statement applies to Blu-ray, CD, or DVD.
Some statements apply to more than one example of off-line storage. [5]
(b) Complete the truth table for given logic circuit. [4]
A B C WORKSPACE X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
4
7. Paige has a computer that has a central processing unit (CPU) based on the Von Neumann model for
a computer system.
(a) Identify the component within the CPU that controls the flow of data. [1]
......................................................................................................................................................................
(b) Identify the component within the CPU where calculations are carried out. [1]
......................................................................................................................................................................
(c) Identify the component within the CPU that stores the address of the next instruction to be
processed. [1]
......................................................................................................................................................................
(d) Identify the register within the CPU that holds an instruction that has been fetched from memory.[1]
......................................................................................................................................................................
(e) Identify the register within the CPU that holds data that has been fetched from memory. [1]
......................................................................................................................................................................
8. Elsa writes a paragraph in an examination about encryption.
There are several terms missing from the paragraph.
Complete the paragraph using the list of given terms. Not all terms may need to be used.
Some terms may be used more than once. [5]
• algorithm
• alphanumeric
• cookie
• cypher
• key
• padlock
• plain
• word processed
5
PAPER 2(30 MARKS)
Pre-Release Material:
Your preparation for the examination should include attempting the following practical tasks by writing
and testing a program or programs.
A system is required to record and count votes for candidates in school council elections. The voting
system will allow for one representative to be elected from a tutor group. The school has between 28
and 35 students in each tutor group, five-year groups named Year 7 to Year 11, and there are six tutor
groups in each year group. Tutor group names are their year group followed by a single letter e.g. 7A,
7B, etc.
All students are allowed to vote in the system. Each student may only vote once for a representative
from their tutor group in the election.
You will need to complete these three tasks. Each task must be fully tested.
Task 1 – Setting up the voting system to allow a tutor group to elect a representative.
Write a program to:
• allow the tutor to enter the name of the tutor group
• allow the tutor to enter the number of students in the tutor group
• allow the tutor to enter the number of candidates in the election; maximum of four candidates
• allow the tutor to enter the names of the candidates and store them in a suitable data structure
• allow each student to input their vote or to abstain
• count the votes for each candidate and student abstentions.
When all students have voted, display the name of the tutor group, the votes for each candidate and
the name of the candidate who has won the election. If there is a tie for first place, display all
candidates with the equal highest number of votes.
1 (a) All variables, constants and other identifiers must have meaningful names.
Identify one array you could have used for Task 1 and state its purpose. [2]
Array .............................................................................................................................................................
Purpose .........................................................................................................................................................
......................................................................................................................................................................
(ii) Identify one variable you could have used for Task 1 and state its purpose. [2]
Variable ........................................................................................................................................................
Purpose .........................................................................................................................................................
6
......................................................................................................................................................................
(b) Write the validation rule to specify the length of Tutor Group Name as only two characters as 7A. [2]
......................................................................................................................................................................
......................................................................................................................................................................
......................................................................................................................................................................
......................................................................................................................................................................
2. Most programming languages include basic data types. Ahmad is describing the basic data types he
has used.
3 Tick (✓) one box in each row to identify if the statement about subroutines is true or false. [4]
4. The pseudocode algorithm shown should allow numbers to be entered and should allow 50 numbers
to be stored in an array.
Count ← 0
REPEAT
INPUT Values[Count]
Count ← Count + 1
UNTIL Count = 0
7
(a) Explain why the algorithm will never end. [2]
......................................................................................................................................................................
......................................................................................................................................................................
......................................................................................................................................................................
......................................................................................................................................................................
5. This flowchart inputs the points won and the points lost when playing a game. The difference
between the points won and lost is calculated and depending on the result the player can: move up to
the next level, stay at the same level, or move down to the previous level. The flowchart finishes when
the input for points won is –1.
8
Complete a trace table for this set of input data: [3]
5000, 4474, 6055, 2000, 7900, 9800, 3000, 2150, –1, 6700, 7615
PointsWon PointsLost Difference OUTPUT
(a) Show the output that would be given by this query-by-example. [2]
9
.............................................................................................................................................................
..............................................................................................................................................................
..............................................................................................................................................................
(b) Complete the query-by-example grid to find every airline with a head office in Asia or Africa, and
number of countries greater than 4. Only show the airline name and number of countries. [4]
***********************************************
10