Professional Documents
Culture Documents
Page 1 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
O LEVELS 2210
STUDENTS NAME:
_____________________________________________
_____________________________________________
_____________________________________________
Follow On Facebook :
https://www.facebook.com/shahza
CONTACT NUMBER: dah.ashraf
_____________________________________________
Page 2 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 3 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Chapter 1:
1.1.2 Hexadecimal
• represent positive numbers in hexadecimal notation
• show understanding of the reasons for choosing hexadecimal notation to represent numbers
• convert positive hexadecimal integers to and from denary (a maximum of four hexadecimal digits
will be required)
• convert positive hexadecimal integers to and from binary (a maximum of 16 bit binary numbers
will be required)
• represent numbers stored in registers and main memory as hexadecimal
• identify current uses of hexadecimal numbers in computing, such as defining colors in Hypertext
Markup Language (HTML), Media Access Control (MAC) addresses, assembly languages and
machine code, debugging
Page 4 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
For example, a number system can be used to represent the number of students in a class or
number of viewers watching a certain TV program etc. The digital computer represents all kinds of
data and information in binary numbers. It includes audio, graphics, video, text and numbers. The
total number of digits used in a number system is called its base or radix.
For example binary number system uses two characters 0 and 1 and its base is 2.
Page 5 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Step 4: Record the remainder from Step – 3 as the next digit (to the left) of the new base number.
Step 5: Bottom to top sequence of remainder will be the required converted number. Repeat Step –
3 & Step – 4, recording remainders from right to left, until the quotient becomes less than the digit
of new base so that it cannot be divided.
Method-2(Decimal to Binary)
For example : (35)10
= 1 x 27 + 0 x 26 + 0 x 25 + 1 x 2 4 + 1 x 23 + 0 x 22 + 1
x 21 + 1 x 2 0
= 1 x 128 + 0 x 64 + 1 x 16 + 1 x 8 + 0 x 4 + 1 x 2 + 1
x1
= 128 + 0 + 0 + 16 + 8 + 0 + 4 + 1
= (155)10
Page 6 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Computer programs are sets of instructions. Each instruction is translated into machine code -
simple binary codes that activate the CPU. Programmers write computer code and this is converted
by a translator into binary instructions that the processor can execute. All software, music,
documents, and any other information that is processed by a computer, is also stored using binary.
Use binary in computer registers for a given application (such as in robotics, digital
instruments and counting systems)
A register is a group of bits, often represented in a grid. The following grid shows an 8-bit register.
1 1 0 1 1 0 1 1
Computers (or microprocessors) are used to control devices, such as robots, industrial or household
environments. Registers are used as part of the control system. Each bit in the register will control a
different part of the system. For example, suppose a microprocessor controls a household security
system. The register could be setup as follows:
1 0 1 0 1 0 1 1
In this state, the kitchen light would be triggered ON, the camera would be triggered ON, the alarm
would be triggered ON, the notification would be sent, and the police would be auto called. When
another register is send to the control system, the state of each part can be changed by adjusting
the bits in the register.
Bits can be grouped together to make them easier to work with. A group of 8 bits is called a byte.
Page 7 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Most computers can process millions of bits every second. A hard drive's storage capacity is
measured in gigabytes or terabytes. RAM is often measured in megabytes or gigabytes.
The Hexadecimal Number System consists of 16 digits from 0 to 9 and A to F. The alphabets A to F
represent decimal numbers from 10 to 15. The base of this number system is 16. Each digit position
in hexadecimal system represents a power of 16.
Page 8 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
As we know each hexadecimal number acquire 4 binary bits either its 016 or F16. Either we are
converting from binary to hex or from hex to binary we will make pair of 4 bits for each number, and
each pair bits will be powered from left hand to right hand with multiple of two just like we did in
binary to decimal conversion, but mind that here power will repeat after every 4 bits.
Hexadecimal is 57
Same method can be used to do conversion from hexadecimal to binary in vice versa fashion.
Instead of using two step method, direct method comes handy when you have an access to
calculator or either numbers are not very large.
36 / 16 2 4 (4 decimal)
2 / 16 0 2 (2 decimal)
ANSWER 24E
Page 9 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
color references
assembly language programs
error messages
In Colors:
Hex can be used to represent colors on web pages and image-editing programs using the
format #RRGGBB (RR = reds, GG = greens, BB = blues). The # symbol indicates that the
number has been written in hex format. This system uses two hex digits for each color, e.g.
#FF6600.
As one hex digit represents 4 bits, two hex digits together make 8 bits (1 byte).
If you are making a web page with HTML or CSS you can use hex codes to choose the colors.
Page 10 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
In debugging Error:
Hex is often used in error messages on your computer. The hex number refers to the
memory location (In computing, this is an address in the primary memory where data values
are stored) of the error. This helps programmers to find and then fix problems.
In assembly Language:
In low level Assembly language programming, to address low level components, we are
using addresses with hexadecimal value. To write out
11010101110100110010001100110000 it is easier to write and spell 0xd5d32330, and far
less likely to evoke an error in writing or copying.
Text and numbers can be encoded in a computer as patterns of binary digits. Hexadecimal is
a shortcut for representing binary. ASCII and Unicode are important character sets that are
used as standard.
ASCII:
The ASCII character set is a 7-bit set of codes that allows 128 different characters. That is enough for
every upper-case letter, lower-case letter, digit and punctuation mark on most keyboards. ASCII is
only used for the English language.
MAC Addresses:
All network adapters and network devices have a Media Access Control (MAC) address. This is also
known as the 'physical address' and is a unique address determined during the manufacture of each
device. This address is given as a set of 6 pairs of hexadecimal numbers. An example of a MAC
address would be: A0-1D-48-FE-5E-F5.You can determine the physical address of the network
adapters in a computer running the Windows operating system by typing the following command in
to a command prompt: ipconfig/all
Page 11 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
A number of methods exist which can detect errors and, in some cases, actually correct the error.
The methods covered in this section are:
• Parity checking
• Automatic repeat request (ARQ)
• Checksum
• Echo checking.
Parity Checking
Data is sent byte by byte and in each byte left most bit is the parity byte while rest of the 7 bits are
used for data. Parity checking is of
two types, Even Parity, and Odd
Parity. For Example, if even parity has
decided in between source (sender or
transmitter) and destination
(Receiver). And the 7 bit data that is
about to be sent contains even
numbers of 1’s in it, i.e. data is :
0101101, then 0 will be added in the
parity bit before transmitting the
byte, 0|0101101. And if number of 1’s
are odd in data then 1 will be added
to parity byte before transmission. If
odd parity has been decided among source and destination same process will be repeated but
source make sure that in parity byte number of 1’s must be in odd form.
The destination will going to count number of 1’s in byte after receiving the data, for example, if
even parity has been decided and status of any one bit is changed (number of 1’s received in data
are odd), the destination computer will raise an error signal to let the source computer know.
Naturally, any of the bits in previous examples could have been changed leading to a transmission
error. Therefore, even though an error has been flagged, it is impossible to know exactly which bit is
in error.
One of the ways around this problem is to use PARITY BLOCKS. In this method, a block of data is sent
and the number of 1-bits are totaled horizontally and vertically (in other words, a parity check is
done in both horizontal and vertical directions).
Page 12 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Parity Blocks
In this example, nine bytes of data have been transmitted. Agreement has been made that even
parity will be used. Another byte, known as the PARITY BYTE, has also been sent. This byte consists
entirely of the parity bits produced by the vertical parity check. The parity byte also indicates the
end of the block of data.
The following table shows how the data arrived at the receiving end:
First of all, the table shows that an error has occurred following data transmission. Secondly, at the
intersection of row 7 and column 6, the position of the incorrect bit value (which caused the error)
can be found. After changing the status of the bit here from 0 to 1, this byte could therefore be
corrected automatically as shown above, or an error message could be relayed back to the sender
asking them to retransmit the block of data. Note: If during transmission status of two bits will be
changed source computer will not be able to identify the error because number of 1’s will remain
even.
Checksum
CHECKSUM is another way to check if data has been changed or corrupted following data
transmission. Data is sent in blocks and an additional value, the checksum, is also sent at the end of
the block of data.
When a block of data is about to be transmitted, the checksum for the bytes is first of all calculated.
This value is then transmitted with the block of data. At the receiving end, the checksum is
recalculated from the block of data received. This calculated value is then compared to the
checksum transmitted. If they are the same value, then the data was transmitted without any errors;
if data has been correctly transmitted.
Page 13 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Automatic Repeat Request (ARQ): is another method used to check whether It uses an
ACKNOWLEDGEMENT (a message sent by the receiver indicating that data has been received
correctly) and TIMEOUT (this is the time allowed to elapse before an acknowledgement is received).
If an acknowledgement isn’t sent back to the sender before timeout occurs, then the message is
automatically resent. The values are different, then a request is sent for the data to be
retransmitted.
Check Digit: this is an extra digit added to a number which is calculated from the digits; the
computer re-calculates and validates the check digit following input of the number.
This section shows how check digits are calculated. The ISBN-10 (used on books) has been chosen as
the example; this uses a modulo 11 system which includes the letter X to represent the number 10.
Example 1:
To calculate the check digit for the ISBN 0 - 2 0 1 - 5 3 0 8 2 - ?
10 9 8 7 6 5 4 3 2 1 ← digit position
0 - 2 0 1 - 5 3 0 8 2 - ? ← Number
(ii) Each digit is then multiplied by its digit position and the totals added together
0 x 10 + 2 x 9 + 0 x 8 + 1 x 7 + 5 x 6 + 3 x 5 + 0 x 4 +8 x 3 + 2 x 2
= 0 + 18 + 0 + 7 + 30 + 15 + 0 + 24 + 4
= 98
(iii) The total is then divided by 11 (modulo – 11) and the remainder, if any, is subtracted from 11 to
give the check digit.
98 ÷ 11 = 8 remainder 10
11 – 10 = 1
Page 14 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Example 2:
To check the correctness of a check digit the computer re-calculates it as follows:
10 9 8 7 6 5 4 3 2 1 ← digit position
0 - 1 3 1 - 5 2 4 4 7 - X ← number
(ii) Each digit is then multiplied by its digit position and the totals added together
0 x 10 + 1 x 9 + 3 x 8 + 1 x 7 + 5 x 6 + 2 x 5 + 4 x 4 + 4 x 3 + 7 x 2 + X x 1
= 132
(iii) The total is then divided by 11; if there is no remainder then the check digit is correct:
132 ÷ 11 = 12 remainder 0
The MIDI files are not music and do not contain any 'sounds' hence they are very different to
MP3 files.
It uses 8-bit serial transmission and is asynchronous.
MIDI operates on 16 different channels (numbered 0 to 15) which can all be used at the
same time i.e. 16 devices all playing a different line in a song using a music sequencer.
MIDI files are much smaller than MP3 files and that makes them ideal for storing music files
where storage is an issue i.e. storing ringtones on a mobile phone.
Each MIDI file has a specific sequence of bytes:
1. The first byte is the status byte - informs the MDI device what function to preform -
encoded in this is also the MIDI channel.
2. The pitch byte specifies the note to be played.
3. The velocity byte specifies how loud to play the note
This is all saved in a MIDI file with the file extension .mid
Page 15 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
MPEG-3 (MP-3)
It is a Lossy format.
Uses audio compression software to convert music and other sounds into MP3 file
format.
This greatly reduces file size (about 90%).
This works through Perceptual music shaping which reduce sounds that the human ear
cannot hear properly i.e. removes the quieter sound if a louder sound is played at the
same time. The human sound can only hear the louder sound.
Bit rate is the number of bits used when creating a file. They are usually 80-320 kilobits
per second; anything above 200 gives a sound quality close to the normal CD.
MPEG-4 (MP-4)
It is a Lossy format.
Can store music, videos, photos and animation (multimedia file format).
An uncompressed image is called a raw bitmap. The bitmap image is reduced by a factor of 5 to 15
depending on its original quality when being converted to JPEG.
A 3-megapixel photo is an image that is 2048 pixels wide and 1536 pixels tall i.e.
3145728 pixels (hence it is slightly larger). Since each pixel contains 3 colors (red, green
and blue).
date 12/08/2122
time 19:00:20
currency $15.50
Page 16 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 17 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
8 An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is represented
by an 8-bit register, A, and the number of minutes is represented by another 8-bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.
A B
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1
0 0 0 1 0 0 1 0 : 0 0 1 1 0 1 0 1
[2]
(b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the
hours and minutes of the alarm time.
C D
Hours Minutes
[2]
(c) Describe how the microprocessor can determine when to sound the clock alarm.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
2210/11/M/J/15
Page 18 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Question Answer
[5]
2210/11/M/J/15
Page 19 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
5 Parity checks are often used to check for errors that may occur during data transmission.
Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.
11001000
01111100
01101001
[3]
(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.
The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per
character). A tenth byte, the parity byte, was also transmitted.
The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.
2210/12/M/J/15
Page 20 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
(ii) Explain how you arrived at your answer for part (b)(i).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) Give the denary (base 10) value of the byte: 1 0111110
...................................................................................................................................................
...............................................................................................................................................[1]
(d) A parity check may not identify that a bit has been transmitted incorrectly.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
2210/12/M/J/15
Page 21 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
10 Letters from the alphabet are represented in a computer by the following denary (base 10) values:
A = 97
G = 103
I = 105
L = 108
N = 110
(a) Convert each of the five values to binary. The first one has been done for you.
A (97): 0 1 1 0 0 0 0 1
L (108):
I (105):
G (103):
N (110):
[2]
(b) An encryption system works by shifting the binary value for a letter one place to the left. “A”
then becomes:
1 1 0 0 0 0 1 0
This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:
C 2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these
values into hexadecimal:
hexadecimal
L: .............................................
G: .............................................
[4]
2210/12/M/J/15
Page 22 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
.....................
...................................................................................................................................................
...............................................................................................................................................[3]
.....................
2210/11/M/J/16
Page 23 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
7 Each seat on a flight is uniquely identified on an LCD above the seat. For example, seat 035C is
shown as:
The first three characters are digits that represent the row.
The fourth character is the seat position in that row. This is a single letter, A to F, that is stored as a
hexadecimal value.
Each of the four display characters can be stored in a 4-bit register. For example, 0 and C would
be represented as:
8 4 2 1
0: 0 0 0 0
C: 1 1 0 0
(a) Show how the 4-bit registers would store the remaining two characters, 3 and 5.
[2]
0 0 0 1
1 0 0 1
0 1 0 0
1 1 1 0
[2]
2210/11/M/J/16
Page 24 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
A 7-digit number has an extra digit on the right, called the check digit.
digit position: 1 2 3 4 5 6 7 8
digit: – – – – – – – –
check digit
(a) Calculate the check digit for the following number. Show all your working.
4 2 4 1 5 0 8 …
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 2 4 0 0 4 5 X
Circle below correct if the check digit is correct OR incorrect if the check digit is incorrect.
correct incorrect
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
2210/11/M/J/16
Page 25 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
...............................................................................................................................................[1]
(b) The barcode in part (a) contains the denary value 2640
Convert this value to hexadecimal.
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) An airport uses the type of barcode shown in part (a) to advertise local places of interest.
Describe how a visitor landing at the airport could use these barcodes to help plan their visit.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
2210/11/M/J/16
Page 26 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
4AF
[3]
(b) The 2016 Olympic Games will be held in Rio de Janeiro. A timer that counts down to the
opening of the Games is shown on a microprocessor-controlled display.
The number of hours, minutes and seconds until the Games open are held in three 8-bit
registers.
0 1 1 0 1 0 0 1 105 hours
0 0 1 0 0 0 0 0 32 minutes
0 0 0 1 0 1 0 0 20 seconds
(i) Show the values in each 8-bit register 30 seconds after the time shown above:
hours
minutes
seconds
[3]
(ii) Write the hexadecimal value of the minutes register from part (b)(i).
.......................................................................................................................................[1]
2210/12/M/J/16
Page 27 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
(a) Describe how the size of the text file can be reduced.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
(b) This file will be transmitted to Mashuda as an email attachment. Mashuda then stores it on
her computer.
Explain how checksums can be used to verify that the file has not been corrupted during
transmission or data storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
2210/12/M/J/16
Page 28 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
%LQDU\QXPEHU$ %LQDU\QXPEHU%
Binary number A:
Binary number B:
[2]
Parity bit
Binary number A:
Binary number B:
[2]
2210/12/M/J/16
Page 29 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
0 0 1 0 1 0 0 1 1 1 1 1 1 1 0 0
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................... [2]
(b) Explain why a programmer might prefer to read the instruction in hexadecimal rather than in
binary.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................... [2]
Use 1 ........................................................................................................................................
...................................................................................................................................................
Use 2 ........................................................................................................................................
...................................................................................................................................................
[2]
2210/11/M/J/17
Page 30 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
5 (a) Parity checks are often used to detect errors that may occur during data transmission.
The received bytes in the table below were transmitted using odd parity.
Tick (3) to show whether each byte has been corrupted during transmission or not
corrupted during transmission.
10110100
01101101
10000001
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
2210/11/M/J/17
Page 31 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
13 (a) Gurdeep wants to send a large file to Jennifer over the Internet.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Choose the most suitable type of compression for the following and explain your choice.
Explanation .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
Explanation .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
2210/11/M/J/17
Page 32 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
4 There are various methods used to detect errors that can occur during data transmission and
storage.
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
Checksum ����������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
[8]
2210/12/M/J/17
Page 33 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������[2]
(b)
Show the binary number from part (a) as it would be stored in the following registers.
Register 1
Register 2
[2]
(c)
A binary number stored in a register can have many different uses, for example an address in
main memory.
Use 1 ����������������������������������������������������������������������������������������������������������������������������������������
Use 2 ����������������������������������������������������������������������������������������������������������������������������������������
[2]
(d)
A register in a computer contains binary digits.
0 0 1 1 1 0 1 0
....................................................................................................................................................
................................................................................................................................................[1]
2210/12/M/J/17
Page 34 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Complete the sentences in Jane’s answer, using the list given. Not all items in the list need to be
used.
• 2
• 10
• 16
• analogue
• binary
• denary
• digital
• hexadecimal
process this type of data. For a computer to be able to process data it needs to be
Write the denary number for each of the three hexadecimal numbers:
2A ....................................................................................................
101 ...................................................................................................
21E ..................................................................................................
[3]
Working Space
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
3 The three binary numbers in the registers A, B and C have been transmitted from one computer to
another.
Parity bit
Register A 1 0 0 1 1 0 0 0
Register B 0 1 1 0 0 1 1 1
Register C 1 0 0 1 1 0 0 1
One binary number has been transmitted incorrectly. This is identified through the use of a parity bit.
Identify which register contains the binary number that has been transmitted incorrectly. Explain
the reason for your choice.
The binary number that has been transmitted incorrectly is in Register ..........................................
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
4 Michele wants to email a file to Elsa. The file is too large so it must be compressed.
(b) The file Michele is sending contains the source code for a large computer program.
Identify which type of compression would be most suitable for Michele to use.
Explanation ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
Many of the photos are very large files, so Nancy needs to reduce their file size as much as
possible.
Identify which type of compression would be most suitable for Nancy to use. Explain your
choice.
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
0 2 3 1 5 8
Hours Minutes Seconds
(a) Write the 8-bit binary numbers that are currently stored for the Hours, Minutes and Seconds.
Hours
Minutes
Seconds
[3]
Hours 0 0 0 0 0 1 0 1
Minutes 0 0 0 1 1 0 1 0
Seconds 0 0 1 1 0 1 1 1
Write the denary values that will now be shown on the stopwatch.
Jafar remembers that hexadecimal is often used to represent binary values in error codes.
Convert the hexadecimal number in the error message into 12-bit binary.
[3]
5 The three binary numbers in the registers X, Y and Z have been transmitted from one computer to
another.
Parity bit
Register X 1 0 0 1 0 0 1 0
Register Y 1 1 1 0 0 1 1 1
Register Z 1 1 1 0 1 0 0 1
Only one binary number has been transmitted correctly. This is identified through the use of a
parity bit.
Identify which register contains the binary number that has been transmitted correctly. Explain
the reason for your choice.
The binary number that has been transmitted correctly is in Register ............................................
Explanation ......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[4]
12 (b) Selma wants to make sure that the information received is correct.
Describe another error detection method that can be used to check the information received
is correct.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
Draw a line to link each computer term to its most appropriate description.
2210/12/O/N/15
Page 42 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
4 (a) (i) Convert the following two hexadecimal numbers into binary:
FA7
D3E
FA7
D3E
[4]
(ii) Now perform the AND (logic) operation on each corresponding pair of binary bits in the
two numbers from part (i).
[2]
...........................................................................................................................................
...........................................................................................................................................
[2]
2210/12/O/N/15
Page 43 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
(b) (i) The following code shows HTML ‘tag’ pairs on either side of the text stating the colour
that each creates.
Yellow is a combination of red and green, magenta a combination of red and blue and
cyan a combination of green and blue.
State what 6-digit hexadecimal values should replace X, Y and Z in the above code.
X ........................................................................................................................................
Y ........................................................................................................................................
Z ........................................................................................................................................
[3]
(ii) Describe how other colours, such as a darker shade of blue, are created.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
(i) Identify what the first six and last six hexadecimal digits represent.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
[1]
2210/12/O/N/15
Page 44 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
7 (a) Check digits are used to ensure the accuracy of input data.
A 7-digit code number has an extra digit on the right, called the check digit.
Digit position 1 2 3 4 5 6 7 8
Digit – – – – – – – –
(i) Calculate the check digit for the following code number. Show all your working.
4 2 4 1 5 0 8 …
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
3 2 4 0 0 4 5 X
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
2210/12/O/N/15
Page 45 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
(b) When data are transmitted from one device to another, a parity check is often carried out on
each byte of data. The parity bit is often the leftmost bit in the byte.
(i) If a system uses even parity, give the parity bit for each of the following bytes:
parity bit
1 1 0 0 1 1 0
parity bit
0 0 0 0 0 0 1
[2]
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[1]
2210/12/O/N/15
Page 46 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
2 (i) Identify the fault condition(s) that the following register indicates:
0 0 1 0 0 1 0 1
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
1 1 1 0 0 1 0
0 0 0 1 1 1 0
[2]
(iii) A car has a faulty airbag and the CO level is too high.
[2]
(iv) Give the hexadecimal value of the binary number shown in part (iii).
...........................................................................................................................................
.......................................................................................................................................[1]
2210/13/O/N/15
Page 47 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
...................................................................................................................................................
How many MP3 files of the size calculated above could be stored on an 800 MB CD?
...................................................................................................................................................
[2]
(b) (i) Explain how MP3 files retain most of the original music quality.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]
...................................................................................................................................... [1]
...................................................................................................................................... [1]
2210/13/O/N/15
Page 48 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
4 Nine bytes of data are transmitted from one computer to another. Even parity is used. An additional
parity byte is also sent.
byte 1 1 1 1 0 1 1 1 0
byte 2 0 0 0 0 0 1 0 1
byte 3 0 1 1 1 1 0 0 0
byte 4 1 1 0 0 0 0 0 0
byte 5 1 0 1 1 1 1 1 0
byte 6 0 1 0 1 1 0 0 1
byte 7 0 1 1 1 0 0 1 1
byte 8 0 0 1 1 0 1 1 0
byte 9 1 1 0 0 0 0 1 1
parity byte 0 0 1 0 0 0 1 0
(a) Circle the corrupt bit in the corrupt byte in the table above. [1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
2210/12/O/N/16
Page 49 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
128 64 32 16 8 4 2 1
0 1 1 1 0 0 0 0
...............................................................................................................................................[1]
(b) All the bits in the register are shifted one place to the right as shown below.
0 1 1 1 0 0 0 0
0 0 1 1 1 0 0 0
...............................................................................................................................................[1]
(c) State the effect the shift to the right had on the original denary number from part (a).
...............................................................................................................................................[1]
(d) The original number in part (a) is shifted three places to the right.
[1]
.......................................................................................................................................[1]
2210/12/O/N/16
Page 50 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
8 Identify whether the four statements about file compression are correct by writing TRUE or FALSE
in the following table.
MP3 files are, on average, 90% smaller than the music files
stored on a CD
[4]
2210/12/O/N/16
Page 51 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
[3]
(b) Identify two sensors that the security system could use to detect intruders.
Sensor 1 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
2210/12/O/N/16
Page 52 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Parallel, half-duplex
data transmission
An even or odd number of bits set to 1
in a byte, used to check if the byte has
been transmitted correctly
[5]
2210/13/O/N/16
Page 53 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
5 (b) Complete the truth table for the conditions given at the start of question 5.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) A microprocessor regularly samples the output, X. Each sample value is stored in an 8-bit
register as shown below. One bit of this register is reserved as a parity bit.
1 1 1 1 1 0 0 1 Register Y
0 1 0 1 1 1 1 1 Register Z
Register .............................................[1]
2210/13/O/N/16
Page 54 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
(d) When eight bytes of data have been collected, they are transmitted to a computer 100 km
away. Parity checks are carried out to identify if the data has been transmitted correctly. The
system uses even parity and column 1 is the parity bit.
The eight bytes of data are sent together with a ninth parity byte:
byte ...............................................................................................................................[1]
column ...........................................................................................................................[1]
(iii) The incorrect bit is indicated where the byte number and column cross.
[1]
...........................................................................................................................................
.......................................................................................................................................[1]
(v) Considering the fault condition given in part (c), explain why it is very important that the
incorrect bit is located and corrected.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
2210/13/O/N/16
Page 55 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
10 (a) A manufacturer of aeroplane engines assigns a denary identification number (ID) to each
engine.
[2]
...........................................................................................................................................
...........................................................................................................................................
[3]
(b) The current status of the engine is sent to a computer in the aeroplane.
Each piece of data collected is 8 bytes in size. Data collection occurs every 30 seconds.
Calculate the number of kilobytes that would be needed to store the data collected during a
10-hour flight. Show your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................. kilobytes
[3]
2210/13/O/N/16
Page 56 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
UP 1 1 1 1
DOWN 0 0 0 1
LEFT 1 0 0 1
RIGHT 0 1 1 0
OPEN 1 1 0 0
CLOSE 0 0 1 1
9 1 C 3 F
Convert the values and write down the operation (e.g. RIGHT) carried out by the robot arm.
9 .............................................................................
1 .............................................................................
C .............................................................................
3 .............................................................................
F .............................................................................
[5]
3 (a) Explain the differences between the binary number system and the denary number system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
......
......
....................................
....................................
.........................................................................................................
.........................................................................................................
............................................................................................................................................... [4]
......
.............................................................................................................................................
(b) Explain the process of converting the binary number 1010 into a denary number.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
......
......
....................................
....................................
.........................................................................................................
.........................................................................................................
...................................................................................................................................................
......
......
.............................................................................................................................................
.............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
4 (b) Identify and describe two methods of error checking that can be used to make sure that the
data stored after transmission is accurate.
Method 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Method 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
One use of the display screen is to show an error code when a problem has occurred with a
washing cycle.
E04
This error code means that the water will not empty out of the washing machine.
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
Complete the table by providing a suitable file format for each file type. The first one has been
done for you.
B U S
66 85 83
66
85
83
[3]
K E Y
01001011 ...............................................
01000101 ...............................................
01011001 ...............................................
[3]
1 .........................................................................................................................................
2 .........................................................................................................................................
3 .........................................................................................................................................
[3]
(iii) State two benefits of using hexadecimal notation to represent binary values.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
2210/12/O/N/18
2 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check for errors during data
transmission and storage.
(a) A system uses even parity. Write the appropriate parity bit for each byte.
Parity Bit
1 0 1 0 0 1 1
1 0 1 1 1 1 1
1 0 1 0 0 0 1
[2]
(b) Explain how Automatic Repeat reQuests (ARQ) are used in data transmission and storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................... [2]
(c) State one other method that could be used to check for transmission errors.
............................................................................................................................................... [1]
A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary.
(a) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The
first number has already been converted.
6A FF 08 93
01101010
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
7 (c) David needs to send a large section of the programming code as an email attachment.
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
............................................................................................................................................... [3]
12 Explain the difference between a Musical Instrument Digital Interface (MIDI) file and a MP3 file.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
Page 65 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 8 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 11
8 (a) hours: 18
minutes: 53 [2]
(b)
0 0 0 0 0 1 1 1 : 0 0 0 1 1 1 1 0
[2]
(c) Any three from:
– and checks the values against those stored in registers “A” and “B”
(NOTE: the first two statements can be interchanged, i.e. “A” and “B” read first)
Page 66 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 10 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 11
x
If 1 GByte = 2
value of X?
then what is the
12
Page 67 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 6 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
11001000
01111100
01101001
[3]
column number: 6
[2]
(c) 190
[1]
Page 68 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 11 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
10 (a) 1 mark for two correct lines, 2 marks for four correct lines
L (108): 0 1 1 0 1 1 0 0
I (105): 0 1 1 0 1 0 0 1
G (103): 0 1 1 0 0 1 1 1
N (110): 0 1 1 0 1 1 1 0
[2]
L: 1 1 0 1 1 0 0 0 D8
G: 1 1 0 0 1 1 1 0 CE
[4]
Page 69 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 2 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 11
– hardware/physical address
– unique address/number associated (with network card in) a device/computer
– usually 48/64 bits (12/16 hex digits)
– first 6/8 digits = manufacturer code/ID of device (NIC)
– last 6/8 digits = serial number of device (NIC) [3]
Page 70 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 6 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 11
3 0 0 1 1
0 1 0 1 [2]
5
(b)
0 0 0 1 1
1 0 0 1 9 1 mark
0 1 0
0
4
1 1 1 0 E 1 mark [2]
Page 71 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 7 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 11
9 (a) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
1 mark for any correct
line of working
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
Page 72 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 10 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 11
(b) – A 5 0 (1 mark)
1 0 1 0 0 1 0 1 0 0 0 0
- visitor scans the QR code with (the camera on) the mobile device
- App is used to read/interpret the QR code
- links to a website/opens a document …
- … to access local tourist information
- can store the QR code to refer to again for the information [3]
Page 73 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 2 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 12
(ii) 1F [1]
Page 74 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 10 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 12
9 (a)
Binary number A: 1 1 1 0 0 1 0
Binary number B: 1 0 0 1 1 1 0
[2]
(b)
Parity Bit
Binary number A 1
Binary number B 1
[2]
Page 75 of 105
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.1
2210/11 PUBLISHED May/June 2017
1(a) 1 mark for any two correct values, 2 marks for all 4 correct values. 2
29FC
Page 76 of 105
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.1
2210/11 PUBLISHED May/June 2017
Page 77 of 105
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.1
2210/12 PUBLISHED May/June 2017
Parity Check
• Checks a byte of data
• Check is performed when data is received
• A parity bit is added (to the parity byte)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• Can be even or odd
• If parity is incorrect, error is detected
Check digit
• A digit that is calculated from the data // uses modulo to calculate digit
// valid description of modulo
• It is appended / added to the data
• Digit is recalculated when data is entered
• Digits are compared to check for error
Checksum
• A value is calculated from the data // Valid description of calculation
• It is transmitted with the data
• Value is recalculated after transmission
• Values are compared after transmission to check for error
Page 78 of 105
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.1
2210/12 PUBLISHED May/June 2017
32 + 16 + 8 + 1
(00)111001
5(b) registers must have leading zeros, allow follow through from 5(a) for an 2
incorrect value
1 mark for each correct register.
0 0 1 1 1 0 0 1
0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1
• data
• ASCII value / Unicode value / character
• number
• part of image / small image
• a sound / sound sample / small sound track
• instruction
5(d) 3A 1
Page 79 of 105
2210/11
O LEVELS 2210 Cambridge O Level – Mark Scheme May/June
TOPICAL 2018
BOOK 1.1
PUBLISHED
Question Answer Marks
− analogue
− digital
− denary
− 10
− binary
− 2
− 42
− 257
− 542
− Register C
Lossy (compression)
Lossless (compression)
− Lossless (compression)
– Lossy
Hours 0 0 0 0 0 0 1 0
Minutes 0 0 0 1 1 1 1 1
Seconds 0 0 1 1 1 0 1 0
0 5 2 6 5 5
Hours Minutes Seconds
1 1 0 1 0 0 0 0 0 0 1 1
– Register Y
– ARQ
– uses acknowledgment and timeout
– A request is sent with data to acknowledge all data is received
– Acknowledgement sent back to say all data is received
– If no acknowledgement is received in a time frame an error in transmission detected / data automatically resent.
2
Interface Reduction of file size by permanently
removing certain, redundant information
from the file
Interrupt
File compression format designed to make
photo files smaller in size for storage and
for transmission
JPEG
File compression system for music which
does not noticeably affect the quality of the
sound
Lossless
compression Hardware component that allows the user
to communicate with a computer or
operating system
[6]
Page 85 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 5 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2015 2210 12
4 (a) (i) For each hex number, 2 marks if all correct, 1 mark for 2 correct conversions
F A 7: 1 1 1 1 1 0 1 0 0 1 1 1
D 3 E: 1 1 0 1 0 0 1 1 1 1 1 0
[4]
(ii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through
1 1 0 1 0 0 1 0 0 1 1 0
[2]
(iii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through
D26 [2]
(Y) FF 00 FF
(Z) 00 FF FF [3]
(ii) – hex values between 0 to F are combined together to create a hex code
– different combinations in hex codes will create different shades/tones/colours [2]
Page 86 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 7 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2015 2210 12
7 (a) (i) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
(ii) 1 mark
– No/ incorrect check digit
2 marks
– Total is 78
– 78/11 …
– … gives 7 remainder 1
– check digit should be 1 [3]
parity bit
0 1 1 0 0 1 1 0
parity bit
1 0 0 0 0 0 0 1
[2]
Page 87 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 4 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2015 2210 13
(b) (i) 2 marks for all correct conditions, 1 mark for 2 correct conditions
1 1 1 1 0 0 1 0
0 0 0 0 1 1 1 0
[2]
(iii) 1 mark for correct parity bit + 1 mark for remainder of binary value
1 0 1 0 0 0 1 0
[2]
Page 88 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 9 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2015 2210 13
9 (a) 8 MB
100 [2]
Page 89 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 3 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 12
Page 90 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 4 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 12
(b) 56 [1]
(d) (i)
0 0 0 0 1 1 1 0
[1]
(ii) 14 [1]
Page 91 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 8 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 12
8
Statement TRUE or FALSE
MP3 files are, on average, 90% smaller than the music files
TRUE
stored on a CD
[4]
Page 92 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 9 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 12
(b) 1 mark for identification of each sensor, max 2 for each description
Infrared/motion sensor
Pressure sensor
Page 93 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 3 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 13
[5]
Page 94 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 5 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 13
B X
[5]
A B C Working space X
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
[4]
Page 95 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 6 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 13
Page 96 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 8 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 13
10 (a) (i) 2 marks for 3 correct binary conversions, 1 mark for 2 correct binary conversions [2]
0 0 0 1 1 0 1 0 1 1 1 1
1AF [3]
Working
– 1200 × 8 = 9600 (bytes)
– 9600/1024 or 9600/1000
Answer
– 9.4 or 9.6 kilobytes [3]
MAC address
IP address
Page 97 of 105
2210/12
O LEVELS 2210 Cambridge O Level – Mark Scheme October/November
TOPICAL BOOK 1.1
PUBLISHED 2017
Question Answer Marks
9 – LEFT
1 – DOWN
C – OPEN
3 – CLOSE
F – UP
• A binary number system has units/ placeholders/column headings that increase by the power of 2
• A denary number system has units/ placeholders/column headings that increase by the power of 10
• Binary has more digit for the same value// Denary has less digits for the same value
3(b) Five from: 5
• Correct column headings / place holders by example
• Correctly place a 1 or a 0 for each column
• Identify the columns to be added
• Add together the (denary) values identified «
• « this will give a total which is the denary number/answer
• Answer is 10
Checksum
• A value is calculated from the data // Description of calculation
• Value is transmitted with data
• Value is recalculated after transmission
• If the values match the data is (more likely to be) accurate
Parity check
• A parity bit is transmitted with each byte of data
• Odd or even (parity can be used)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even // counts / checks to see if 1’s are odd
• (Each byte is) checked after transmission to see if it matches the odd/even parity used
Echo (check)
• Copy of data is sent back to sender
• Data is compared to see if it matches
• If it does not match error detected
1(a) Output 1
E 0 4
1 1 1 0 0 0 0 0 0 1 0 0
– Temperature (sensor)
– To monitor the temperature of the water
– Pressure (sensor)
– To monitor the level of water in the washing machine
– Motion (sensor)
– To monitor whether the drum is still in motion
– pH (sensor)
– To monitor the level of water hardness/detergent present in the water
66 0 1 0 0 0 0 1 0
85 0 1 0 1 0 1 0 1
83 0 1 0 1 0 0 1 1
Parity Bit
0 1 0 1 0 0 1 1
0 1 0 1 1 1 1 1
1 1 0 1 0 0 0 1
2(c) Checksum 1
MIDI
• Instructions of how to make sound
• Non-audio recording
• File created using digital musical instruments
• Produced by synthesizer
• Used when composing music
• Individual notes/instruments can be changed