You are on page 1of 106

O LEVELS 2210 TOPICAL BOOK 1.

Page 1 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

O LEVELS 2210

COMPUTER SCIENCE TOPICAL PAST


Compiled By: Engr. Shahzadah Ashraf Bande’Shah PAPERS
Edited By: Muhammad Jawwad BOOK 1.1

[All Variants Included + Marking


Schemes]

STUDENTS NAME:

_____________________________________________

For More Resources:


https://sites.google.com/site/olevel
SCHOOL NAME:
computers/home

_____________________________________________

Join Our Facebook Page:


https://www.facebook.com/groups/
DATE ISSUED: olevelcomputers/

_____________________________________________
Follow On Facebook :
https://www.facebook.com/shahza
CONTACT NUMBER: dah.ashraf

_____________________________________________

shahzadah.ashraf +92333 2076121


@gmail.com

Page 2 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Page 3 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Chapter 1:

In This Booklet you will be able to learn about:

1.1.1 Binary systems


• recognize the use of binary numbers in computer systems
• convert positive denary integers into binary and positive binary integers into denary (a maximum
of 16 bits will be used)
• show understanding of the concept of a byte and how the byte is used to measure memory size
• use binary in computer registers for a given application (such as in robotics, digital instruments
and counting systems)

1.1.2 Hexadecimal
• represent positive numbers in hexadecimal notation
• show understanding of the reasons for choosing hexadecimal notation to represent numbers
• convert positive hexadecimal integers to and from denary (a maximum of four hexadecimal digits
will be required)
• convert positive hexadecimal integers to and from binary (a maximum of 16 bit binary numbers
will be required)
• represent numbers stored in registers and main memory as hexadecimal
• identify current uses of hexadecimal numbers in computing, such as defining colors in Hypertext
Markup Language (HTML), Media Access Control (MAC) addresses, assembly languages and
machine code, debugging

1.1.3 Data storage


• show understanding that sound (music), pictures, video, text and numbers are stored in different
formats
• identify and describe methods of error detection and correction, such as parity checks, check
digits, checksums and Automatic Repeat requests (ARQ)
• show understanding of the concept of Musical Instrument Digital Interface (MIDI) files, JPEG
files, MP3 and MP4 files
• show understanding of the principles of data compression (lossless and lossy) applied to music/
video, photos and text files

Page 4 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

1.1 Data Representation


Number system
A set of values used to represent different quantities is known as Number System.

For example, a number system can be used to represent the number of students in a class or
number of viewers watching a certain TV program etc. The digital computer represents all kinds of
data and information in binary numbers. It includes audio, graphics, video, text and numbers. The
total number of digits used in a number system is called its base or radix.

For example binary number system uses two characters 0 and 1 and its base is 2.

Computer uses following three numbers:

 Denary (Decimal) number system


 Binary number system
 Hexadecimal number system

1.1.1 Binary number system


Digital computer represents all kinds of data and information in the binary system. Binary Number
System consists of two digits 0 and 1. Its base is 2. Each digit or bit in binary number system can be 0
or 1. A combination of binary numbers may be used to represent different quantities like 1001. The
positional value of each digit in binary number is twice the place value or face value of the digit of its
right side. The weight of each position is a power of 2.

Decimal Number System


The Decimal Number System consists of ten digits from 0 to 9. These digits can be used to represent
any numeric value. The base of decimal number system is 10. It is the most widely used number
system. The value represented by individual digit depends on weight and position of the digit.

In denary if we want to use numbers bigger than 9


we have to start using multiple numerals. Each
numeral is worth ten-times the numeral to its right.
The number three-thousand, one-hundred and forty
is shown in denary in figure 1 below.

The number three-thousand, one-hundred and forty shown in denary

Page 5 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Conversion (Decimal to Binary)


Method-1
The following technique, called the (Division –
Remainder Technique) is simple method used to
convert decimal to binary numbers.

Step 1: Divide the decimal number to be converted by


the value of the new base. In this case divide it by 2.

Step 2: Record the remainder from Step – 1 as the


rightmost digit.

Step 3: Divide the quotient of the previous by the new base.

Step 4: Record the remainder from Step – 3 as the next digit (to the left) of the new base number.

Step 5: Bottom to top sequence of remainder will be the required converted number. Repeat Step –
3 & Step – 4, recording remainders from right to left, until the quotient becomes less than the digit
of new base so that it cannot be divided.

Method-2(Decimal to Binary)
For example : (35)10

The answer is (100011)2.

Conversation (Binary to Decimal)


For example: 10011011

= 1 x 27 + 0 x 26 + 0 x 25 + 1 x 2 4 + 1 x 23 + 0 x 22 + 1
x 21 + 1 x 2 0

= 1 x 128 + 0 x 64 + 1 x 16 + 1 x 8 + 0 x 4 + 1 x 2 + 1
x1

= 128 + 0 + 0 + 16 + 8 + 0 + 4 + 1

= (155)10

Page 6 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Use of binary in computing


Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit, is the smallest unit of
data in computing. It is represented
by a 0 or a 1. Binary numbers are
made up of binary digits (bits), e.g.
the binary number 1001.

The circuits in a computer's


processor are made up of billions of
transistors. A transistor is a tiny
switch that is activated by the
electronic signals it receives. The
digits 1 and 0 used in binary reflect
the on and off states of a transistor.

Computer programs are sets of instructions. Each instruction is translated into machine code -
simple binary codes that activate the CPU. Programmers write computer code and this is converted
by a translator into binary instructions that the processor can execute. All software, music,
documents, and any other information that is processed by a computer, is also stored using binary.

 Use binary in computer registers for a given application (such as in robotics, digital
instruments and counting systems)

A register is a group of bits, often represented in a grid. The following grid shows an 8-bit register.

1 1 0 1 1 0 1 1

Computers (or microprocessors) are used to control devices, such as robots, industrial or household
environments. Registers are used as part of the control system. Each bit in the register will control a
different part of the system. For example, suppose a microprocessor controls a household security
system. The register could be setup as follows:

1 0 1 0 1 0 1 1

Kitchen Kitchen Kitchen Kitchen Sound Silence Send Auto call


light on light off camera on camera off alarm alarm notification Police

In this state, the kitchen light would be triggered ON, the camera would be triggered ON, the alarm
would be triggered ON, the notification would be sent, and the police would be auto called. When
another register is send to the control system, the state of each part can be changed by adjusting
the bits in the register.

Bits can be grouped together to make them easier to work with. A group of 8 bits is called a byte.

Other groupings include:

Page 7 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

 Nibble - 4 bits (half a byte)


 Byte - 8 bits
 Kilobyte (KB) - 1024 bytes (or 1024 x 8 bits)
 Megabyte (MB) - 1024 kilobytes (or 1048576 bytes)
 Gigabyte (GB) - 1024 megabytes
 Terabyte (TB) - 1024 gigabytes

Most computers can process millions of bits every second. A hard drive's storage capacity is
measured in gigabytes or terabytes. RAM is often measured in megabytes or gigabytes.

1.1.2 Hexadecimal number system


When working with large digital systems, such as computers, it is common to find binary numbers
consisting of 8, 16 and even 32 digits which makes it
difficult to both read and write without producing errors
especially when working with lots of 16 or 32-bit binary
numbers.

One common way of overcoming this problem is to


arrange the binary numbers into groups or sets of four
bits (4-bits). These groups of 4-bits uses another type of
numbering system also commonly used in computer and
digital systems called Hexadecimal Numbers. The
“Hexadecimal” or simply “Hex” numbering system uses
the Base of 16 system and are a popular choice for
representing long binary values because their format is
quite compact and much easier to understand
compared to the long binary strings of 1’s and 0’s.

The Hexadecimal Number System consists of 16 digits from 0 to 9 and A to F. The alphabets A to F
represent decimal numbers from 10 to 15. The base of this number system is 16. Each digit position
in hexadecimal system represents a power of 16.

Page 8 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Conversion (Binary to hexadecimal)


Binary : 01010111

As we know each hexadecimal number acquire 4 binary bits either its 016 or F16. Either we are
converting from binary to hex or from hex to binary we will make pair of 4 bits for each number, and
each pair bits will be powered from left hand to right hand with multiple of two just like we did in
binary to decimal conversion, but mind that here power will repeat after every 4 bits.

Hexadecimal is 57

Same method can be used to do conversion from hexadecimal to binary in vice versa fashion.

Conversion (Decimal to Hexadecimal)


Converting a Decimal number into its hexadecimal equivalent or vice versa can be done easily by
using two step method. As because we have done with both decimal binary conversions and hexa
binary conversions hence,

Decimal to Hexadecimal: Decimal  Binary  Hexadecimal

Hexadecimal to Decimal: Hexadecimal  Binary  Decimal

Direct-Method (Decimal to Hexadecimal)


Decimal: 590

Instead of using two step method, direct method comes handy when you have an access to
calculator or either numbers are not very large.

DIVISION RESULT REMAINDER (HEX)

590 / 16 36 E (14 decimal)

36 / 16 2 4 (4 decimal)

2 / 16 0 2 (2 decimal)

ANSWER 24E

Page 9 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Direct-Method (Hexadecimal to Decimal)


Hexadecimal: A2F7

Uses of Hexadecimal System


Hex codes are used in many areas of computing to simplify binary codes. It is important to
note that computers do not use hexadecimal - it is used by humans to shorten binary to a
more easily understandable form. Hexadecimal is translated into binary for computer use.
Some examples of where hex is used include:

 color references
 assembly language programs
 error messages

In Colors:
Hex can be used to represent colors on web pages and image-editing programs using the
format #RRGGBB (RR = reds, GG = greens, BB = blues). The # symbol indicates that the
number has been written in hex format. This system uses two hex digits for each color, e.g.
#FF6600.

As one hex digit represents 4 bits, two hex digits together make 8 bits (1 byte).

The values for each color run


between 00 and FF. In
binary, 00 is 0000 0000 and
FF is 1111 1111. That
provides 256 possible values
for each of the three colors.

That gives a total spectrum


of 256 reds x 256 greens x
256 blues - which is over 16
million colors in total.

If you are making a web page with HTML or CSS you can use hex codes to choose the colors.

Page 10 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

In debugging Error:
Hex is often used in error messages on your computer. The hex number refers to the
memory location (In computing, this is an address in the primary memory where data values
are stored) of the error. This helps programmers to find and then fix problems.

In assembly Language:
In low level Assembly language programming, to address low level components, we are
using addresses with hexadecimal value. To write out
11010101110100110010001100110000 it is easier to write and spell 0xd5d32330, and far
less likely to evoke an error in writing or copying.

Character sets (ASCII table):


Every word is made up of symbols or characters. When you press a key on a keyboard, a
number is generated that represents the symbol for that key. This is called a character code.
A complete collection of characters is a character set.

Text and numbers can be encoded in a computer as patterns of binary digits. Hexadecimal is
a shortcut for representing binary. ASCII and Unicode are important character sets that are
used as standard.

ASCII:
The ASCII character set is a 7-bit set of codes that allows 128 different characters. That is enough for
every upper-case letter, lower-case letter, digit and punctuation mark on most keyboards. ASCII is
only used for the English language.

MAC Addresses:
All network adapters and network devices have a Media Access Control (MAC) address. This is also
known as the 'physical address' and is a unique address determined during the manufacture of each
device. This address is given as a set of 6 pairs of hexadecimal numbers. An example of a MAC
address would be: A0-1D-48-FE-5E-F5.You can determine the physical address of the network
adapters in a computer running the Windows operating system by typing the following command in
to a command prompt: ipconfig/all

Page 11 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

1.1.3 Error Checking Methods


While transmitting data, there is always the risk that the data has been corrupted or changed in
some way. This can occur whether data is being transmitted over short distances or over long
distances. Checking for errors is important since computers aren’t able to check that data is correct.

A number of methods exist which can detect errors and, in some cases, actually correct the error.
The methods covered in this section are:

• Parity checking
• Automatic repeat request (ARQ)
• Checksum
• Echo checking.

Parity Checking
Data is sent byte by byte and in each byte left most bit is the parity byte while rest of the 7 bits are
used for data. Parity checking is of
two types, Even Parity, and Odd
Parity. For Example, if even parity has
decided in between source (sender or
transmitter) and destination
(Receiver). And the 7 bit data that is
about to be sent contains even
numbers of 1’s in it, i.e. data is :
0101101, then 0 will be added in the
parity bit before transmitting the
byte, 0|0101101. And if number of 1’s
are odd in data then 1 will be added
to parity byte before transmission. If
odd parity has been decided among source and destination same process will be repeated but
source make sure that in parity byte number of 1’s must be in odd form.

The destination will going to count number of 1’s in byte after receiving the data, for example, if
even parity has been decided and status of any one bit is changed (number of 1’s received in data
are odd), the destination computer will raise an error signal to let the source computer know.

Naturally, any of the bits in previous examples could have been changed leading to a transmission
error. Therefore, even though an error has been flagged, it is impossible to know exactly which bit is
in error.

One of the ways around this problem is to use PARITY BLOCKS. In this method, a block of data is sent
and the number of 1-bits are totaled horizontally and vertically (in other words, a parity check is
done in both horizontal and vertical directions).

Page 12 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Parity Blocks
In this example, nine bytes of data have been transmitted. Agreement has been made that even
parity will be used. Another byte, known as the PARITY BYTE, has also been sent. This byte consists
entirely of the parity bits produced by the vertical parity check. The parity byte also indicates the
end of the block of data.

The following table shows how the data arrived at the receiving end:

column column 2 column 3 column 4 column 5 column 6 column 7 column 8


1
byte 1 1 0 1 0 0 1 1 0
byte 2 1 0 1 0 1 1 0 0
byte 3 1 0 1 0 1 1 1 1
byte 4 1 0 1 1 0 1 1 1
byte 5 1 0 1 0 0 0 1 1
byte 6 0 0 1 0 1 0 0 0
byte 7 0 0 1 0 0 1 0 1
byte 8 1 0 1 1 0 0 1 0
byte 9 1 0 1 1 0 1 0 0
parity byte 1 0 1 1 1 1 1 0

A careful study of Table shows the following:


Change the status of this bit
• Byte 7 (row 7) has incorrect parity (there are three 1-bits).
• Bit 6 (column 6) also has incorrect parity (there are seven 1-bits).

First of all, the table shows that an error has occurred following data transmission. Secondly, at the
intersection of row 7 and column 6, the position of the incorrect bit value (which caused the error)
can be found. After changing the status of the bit here from 0 to 1, this byte could therefore be
corrected automatically as shown above, or an error message could be relayed back to the sender
asking them to retransmit the block of data. Note: If during transmission status of two bits will be
changed source computer will not be able to identify the error because number of 1’s will remain
even.

Checksum
CHECKSUM is another way to check if data has been changed or corrupted following data
transmission. Data is sent in blocks and an additional value, the checksum, is also sent at the end of
the block of data.

When a block of data is about to be transmitted, the checksum for the bytes is first of all calculated.
This value is then transmitted with the block of data. At the receiving end, the checksum is
recalculated from the block of data received. This calculated value is then compared to the
checksum transmitted. If they are the same value, then the data was transmitted without any errors;
if data has been correctly transmitted.

Page 13 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Automatic Repeat Request (ARQ): is another method used to check whether It uses an
ACKNOWLEDGEMENT (a message sent by the receiver indicating that data has been received
correctly) and TIMEOUT (this is the time allowed to elapse before an acknowledgement is received).
If an acknowledgement isn’t sent back to the sender before timeout occurs, then the message is
automatically resent. The values are different, then a request is sent for the data to be
retransmitted.

Check Digit: this is an extra digit added to a number which is calculated from the digits; the
computer re-calculates and validates the check digit following input of the number.

NOTE: check digits can identify 3 types of error:

1. if 2 digits have been inverted e.g. 23459 instead of 23549


2. an incorrect digit entered e.g. 23559 instead of 23549
3. a digit missed out altogether e.g. 2359 instead of 23549

This section shows how check digits are calculated. The ISBN-10 (used on books) has been chosen as
the example; this uses a modulo 11 system which includes the letter X to represent the number 10.

Example 1:
To calculate the check digit for the ISBN 0 - 2 0 1 - 5 3 0 8 2 - ?

(i) The position of each digit is considered:

10 9 8 7 6 5 4 3 2 1 ← digit position

0 - 2 0 1 - 5 3 0 8 2 - ? ← Number

(ii) Each digit is then multiplied by its digit position and the totals added together

0 x 10 + 2 x 9 + 0 x 8 + 1 x 7 + 5 x 6 + 3 x 5 + 0 x 4 +8 x 3 + 2 x 2

= 0 + 18 + 0 + 7 + 30 + 15 + 0 + 24 + 4

= 98

(iii) The total is then divided by 11 (modulo – 11) and the remainder, if any, is subtracted from 11 to
give the check digit.

98 ÷ 11 = 8 remainder 10

11 – 10 = 1

This gives a check digit of 1

Final ISBN becomes 0 -2 0 1 - 5 3 0 8 2 - 1

Page 14 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Example 2:
To check the correctness of a check digit the computer re-calculates it as follows:

The ISBN to check is: 0 - 1 3 1 5 - 2 4 4 7 - X

(i) The position of each digit is considered:

10 9 8 7 6 5 4 3 2 1 ← digit position

0 - 1 3 1 - 5 2 4 4 7 - X ← number

(ii) Each digit is then multiplied by its digit position and the totals added together

0 x 10 + 1 x 9 + 3 x 8 + 1 x 7 + 5 x 6 + 2 x 5 + 4 x 4 + 4 x 3 + 7 x 2 + X x 1

= 0 + 9 + 24 + 7 + 30 + 10 + 16 + 12 + 14 + 10 (recall that X = 10)

= 132

(iii) The total is then divided by 11; if there is no remainder then the check digit is correct:

132 ÷ 11 = 12 remainder 0

Hence the check digit is correct

Concepts of different file types


Musical Instrument Digital Interface (MIDI)
MIDI is a communication protocol that allows electronic musical instruments to communicate with
each other. It consists of a list of commands that instruct a device on how to produce a particular
sound or note.

 The MIDI files are not music and do not contain any 'sounds' hence they are very different to
MP3 files.
 It uses 8-bit serial transmission and is asynchronous.
 MIDI operates on 16 different channels (numbered 0 to 15) which can all be used at the
same time i.e. 16 devices all playing a different line in a song using a music sequencer.
 MIDI files are much smaller than MP3 files and that makes them ideal for storing music files
where storage is an issue i.e. storing ringtones on a mobile phone.
 Each MIDI file has a specific sequence of bytes:
1. The first byte is the status byte - informs the MDI device what function to preform -
encoded in this is also the MIDI channel.
2. The pitch byte specifies the note to be played.
3. The velocity byte specifies how loud to play the note

This is all saved in a MIDI file with the file extension .mid

Page 15 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

MPEG-3 (MP-3)
 It is a Lossy format.
 Uses audio compression software to convert music and other sounds into MP3 file
format.
 This greatly reduces file size (about 90%).
 This works through Perceptual music shaping which reduce sounds that the human ear
cannot hear properly i.e. removes the quieter sound if a louder sound is played at the
same time. The human sound can only hear the louder sound.
 Bit rate is the number of bits used when creating a file. They are usually 80-320 kilobits
per second; anything above 200 gives a sound quality close to the normal CD.

MPEG-4 (MP-4)
 It is a Lossy format.
 Can store music, videos, photos and animation (multimedia file format).

Joint Photographic Experts Group (jpeg)


Picture resolution is the level of detail a picture has - it is often measured in pixels per centimeter.

 JPEG is a lossy file format for images.


 The reduced file size leads to reduced quality. JPEG relies on properties of the human
eye (for example, the human eye cannot discern between colors when they reach a
certain point of similarity) and, up to a point, no real loss of quality is observed.

An uncompressed image is called a raw bitmap. The bitmap image is reduced by a factor of 5 to 15
depending on its original quality when being converted to JPEG.

 A 3-megapixel photo is an image that is 2048 pixels wide and 1536 pixels tall i.e.
3145728 pixels (hence it is slightly larger). Since each pixel contains 3 colors (red, green
and blue).

The total file size is 3 x 3 megabytes = 9megabytes.

Text and number file formats


real example
Text is usually stored as ASCII.

Numbers can be stored as: integer 2.5454545

date 12/08/2122

time 19:00:20

currency $15.50

Page 16 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Page 17 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

8 An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is represented
by an 8-bit register, A, and the number of minutes is represented by another 8-bit register, B.

(a) Identify what time is represented by the following two 8-bit registers.

A B
128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1

0 0 0 1 0 0 1 0 : 0 0 1 1 0 1 0 1

Hours ............................................ Minutes .........................................

[2]

(b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the
hours and minutes of the alarm time.

Show how 07:30 would be represented by these two registers:

C D

Hours Minutes

[2]

(c) Describe how the microprocessor can determine when to sound the clock alarm.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

2210/11/M/J/15
Page 18 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

9 Draw a line to connect each question to the correct answer.

Question Answer

What is the denary (base 10)


equivalent to the hexadecimal 8
digit E?

If 1 GB = 2x then what is the


value of X? 12

How many bits are there in one


byte? 14

If the broadband data download


rate is 40 megabits per second,
how many seconds will it take to 19
download a 60 MB file?

What is the denary (base 10)


value of the binary number
30
00100100?

What hexadecimal value


is obtained when the two
hexadecimal digits C and D 36
are added together?

[5]

2210/11/M/J/15
Page 19 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

5 Parity checks are often used to check for errors that may occur during data transmission.

(a) A system uses even parity.

Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.

Received byte Byte transmitted correctly Byte transmitted incorrectly

11001000

01111100

01101001

[3]

(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.

The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per
character). A tenth byte, the parity byte, was also transmitted.

The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.

letter column column column column column column column column


1 2 3 4 5 6 7 8
byte 1 F 1 0 1 0 0 1 1 0
byte 2 L 1 0 1 0 1 1 0 0
byte 3 O 1 0 1 0 1 1 1 1
byte 4 W 1 0 1 1 0 1 1 1
byte 5 C 1 0 1 0 0 0 1 1
byte 6 H 0 0 1 0 1 0 0 0
byte 7 A 0 0 1 0 0 1 0 1
byte 8 R 1 0 1 1 0 0 1 0
byte 9 T 1 0 1 1 0 1 0 0
parity
1 0 1 1 1 1 1 0
byte

(i) One of the bits has been transmitted incorrectly.

Write the byte number and column number of this bit:

Byte number ......................................................................................................................

Column number .................................................................................................................


[2]

2210/12/M/J/15
Page 20 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

(ii) Explain how you arrived at your answer for part (b)(i).

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(c) Give the denary (base 10) value of the byte: 1 0111110
...................................................................................................................................................

...............................................................................................................................................[1]

(d) A parity check may not identify that a bit has been transmitted incorrectly.

Describe one situation in which this could occur.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

2210/12/M/J/15
Page 21 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

10 Letters from the alphabet are represented in a computer by the following denary (base 10) values:

A = 97
G = 103
I = 105
L = 108
N = 110

The word “A L I G N” is stored as: 97 108 105 103 110

(a) Convert each of the five values to binary. The first one has been done for you.

Letter Denary value

A (97): 0 1 1 0 0 0 0 1
L (108):

I (105):

G (103):

N (110):
[2]

(b) An encryption system works by shifting the binary value for a letter one place to the left. “A”
then becomes:

1 1 0 0 0 0 1 0
This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:

C 2

For the two letters “L” and “G”, shift the binary values one place to the left and convert these
values into hexadecimal:

hexadecimal

L: .............................................

G: .............................................
[4]

2210/12/M/J/15
Page 22 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

2 Hexadecimal codes are used in MAC addresses.

(a) State what is meant by the term MAC.

...............................................................................................................................................[1]

(b) Explain what the hexadecimal code in a MAC address represents.

...................................................................................................................................................
...................................................................................................................................................
.....................

...................................................................................................................................................

...............................................................................................................................................[3]
.....................

2210/11/M/J/16
Page 23 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

7 Each seat on a flight is uniquely identified on an LCD above the seat. For example, seat 035C is
shown as:

The first three characters are digits that represent the row.
The fourth character is the seat position in that row. This is a single letter, A to F, that is stored as a
hexadecimal value.

Each of the four display characters can be stored in a 4-bit register. For example, 0 and C would
be represented as:

8 4 2 1
0: 0 0 0 0
C: 1 1 0 0

(a) Show how the 4-bit registers would store the remaining two characters, 3 and 5.

[2]

(b) Identify which seat is stored in the following 4-bit registers.

0 0 0 1
1 0 0 1
0 1 0 0
1 1 1 0
[2]

2210/11/M/J/16
Page 24 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

9 Check digits are used to ensure the accuracy of entered data.

A 7-digit number has an extra digit on the right, called the check digit.

digit position: 1 2 3 4 5 6 7 8

digit: – – – – – – – –

check digit

The check digit is calculated as follows:

• each digit in the number is multiplied by its digit position


• the seven results are then added together
• this total is divided by 11
• the remainder gives the check digit (if the remainder = 10, the check digit is X)

(a) Calculate the check digit for the following number. Show all your working.

4 2 4 1 5 0 8 …
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Check digit ................................................................................................................................


[2]

(b) An operator has just keyed in the following number:

3 2 4 0 0 4 5 X
Circle below correct if the check digit is correct OR incorrect if the check digit is incorrect.

correct incorrect

Explain your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

2210/11/M/J/16
Page 25 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

12 (a) Name the following type of barcode:

...............................................................................................................................................[1]

(b) The barcode in part (a) contains the denary value 2640
Convert this value to hexadecimal.

...................................................................................................................................................

...................................................................................................................................................

Write the value as a 12-bit binary number.

[4]

(c) An airport uses the type of barcode shown in part (a) to advertise local places of interest.

Describe how a visitor landing at the airport could use these barcodes to help plan their visit.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

2210/11/M/J/16
Page 26 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

3 (a) Convert the following hexadecimal number into 12-bit binary:

4AF

[3]

(b) The 2016 Olympic Games will be held in Rio de Janeiro. A timer that counts down to the
opening of the Games is shown on a microprocessor-controlled display.

The number of hours, minutes and seconds until the Games open are held in three 8-bit
registers.

The present register values are:

0 1 1 0 1 0 0 1 105 hours

0 0 1 0 0 0 0 0 32 minutes

0 0 0 1 0 1 0 0 20 seconds

The timer will count down in seconds.

(i) Show the values in each 8-bit register 30 seconds after the time shown above:

hours

minutes

seconds
[3]

(ii) Write the hexadecimal value of the minutes register from part (b)(i).

.......................................................................................................................................[1]

2210/12/M/J/16
Page 27 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

4 Nigel wants to send a large text file electronically to Mashuda.

(a) Describe how the size of the text file can be reduced.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) This file will be transmitted to Mashuda as an email attachment. Mashuda then stores it on
her computer.

Explain how checksums can be used to verify that the file has not been corrupted during
transmission or data storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

2210/12/M/J/16
Page 28 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

9 In the following barcode, each binary number is made up of seven bars.

Each bar is black or grey.

A black bar is interpreted as a “1” and a grey bar is interpreted as a “0”.


(a) Write the binary numbers that would be produced from this barcode:

%LQDU\QXPEHU$ %LQDU\QXPEHU%

Binary number A:

Binary number B:
[2]

(b) This barcode system uses odd parity.


Write the parity bit for each of the binary numbers in part (a):

Parity bit

Binary number A:

Binary number B:
[2]

2210/12/M/J/16
Page 29 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

1 The memory of a computer contains data and instructions in binary.

The following instruction is stored in a location of the memory.

0 0 1 0 1 0 0 1 1 1 1 1 1 1 0 0

(a) Convert the instruction into hexadecimal.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................... [2]

(b) Explain why a programmer might prefer to read the instruction in hexadecimal rather than in
binary.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................... [2]

(c) Give two other uses of hexadecimal.

Use 1 ........................................................................................................................................

...................................................................................................................................................

Use 2 ........................................................................................................................................

...................................................................................................................................................
[2]

2210/11/M/J/17
Page 30 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

5 (a) Parity checks are often used to detect errors that may occur during data transmission.

The received bytes in the table below were transmitted using odd parity.

Tick (3) to show whether each byte has been corrupted during transmission or not
corrupted during transmission.

corrupted not corrupted


during during
Received byte
transmission transmission
(3) (3)

10110100

01101101

10000001
[3]

(b) Another method of error detection is Automatic Repeat reQuest (ARQ).

Explain how ARQ is used in error detection.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

2210/11/M/J/17
Page 31 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

13 (a) Gurdeep wants to send a large file to Jennifer over the Internet.

State two benefits of compressing the file to send it.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

(b) Two types of compression are lossy and lossless.

Choose the most suitable type of compression for the following and explain your choice.

(i) Downloading the code for a computer program:

Type of compression .........................................................................................................

Explanation .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(ii) Streaming a video file:

Type of compression .........................................................................................................

Explanation .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

2210/11/M/J/17
Page 32 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

4 There are various methods used to detect errors that can occur during data transmission and
storage.

Describe each of the following error detection methods.

Parity check �������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

Check digit ���������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

Checksum ����������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

Automatic Repeat request (ARQ) ����������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������

����������������������������������������������������������������������������������������������������������������������������������������������������������
[8]

2210/12/M/J/17
Page 33 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

5 (a) The denary number 57 is to be stored in two different computer registers.

Convert 57 from denary to binary and show your working.

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

���������������������������������������������������������������������������������������������������������������������������������������������������

�����������������������������������������������������������������������������������������������������������������������������������������������[2]

(b)
Show the binary number from part (a) as it would be stored in the following registers.

Register 1

Register 2
[2]

(c)
A binary number stored in a register can have many different uses, for example an address in
main memory.

Give two other uses for a binary number stored in a register.

Use 1 ����������������������������������������������������������������������������������������������������������������������������������������

Use 2 ����������������������������������������������������������������������������������������������������������������������������������������
[2]

(d)
A register in a computer contains binary digits.

0 0 1 1 1 0 1 0

The contents of the register represent a binary integer.

Convert the binary integer to hexadecimal.

....................................................................................................................................................

................................................................................................................................................[1]

2210/12/M/J/17
Page 34 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

1 Jane answers an examination question about computers and data correctly.


Six different words or numbers have been removed from her answer.

Complete the sentences in Jane’s answer, using the list given. Not all items in the list need to be
used.

• 2
• 10
• 16
• analogue
• binary
• denary
• digital
• hexadecimal

As humans, we process …………………………………… data, but a computer cannot

process this type of data. For a computer to be able to process data it needs to be

converted to …………………………………… data.

As humans, we mostly use a …………………………………… number system;

this is a base …………………………………… number system.

Computers use a …………………………………… number system;

this is a base …………………………………… number system.


[6]

2 Dheeraj identifies three hexadecimal numbers.

Write the denary number for each of the three hexadecimal numbers:

2A ....................................................................................................

101 ...................................................................................................

21E ..................................................................................................

[3]

Working Space

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2018 2210/11/M/J/18


Page 35 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

3 The three binary numbers in the registers A, B and C have been transmitted from one computer to
another.

Parity bit
Register A 1 0 0 1 1 0 0 0

Register B 0 1 1 0 0 1 1 1

Register C 1 0 0 1 1 0 0 1

One binary number has been transmitted incorrectly. This is identified through the use of a parity bit.

Identify which register contains the binary number that has been transmitted incorrectly. Explain
the reason for your choice.

The binary number that has been transmitted incorrectly is in Register ..........................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2018 2210/11/M/J/18 [Turn over


Page 36 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

4 Michele wants to email a file to Elsa. The file is too large so it must be compressed.

(a) Name two types of compression that Michele could use.

Compression type 1 ..................................................................................................................

Compression type 2 ..................................................................................................................


[2]

(b) The file Michele is sending contains the source code for a large computer program.

Identify which type of compression would be most suitable for Michele to use.

Explain your choice.

Compression type ......................................................................................................................

Explanation ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2018 2210/11/M/J/18


Page 37 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

2 (b) Nancy wants to email the photos to Nadia.

Many of the photos are very large files, so Nancy needs to reduce their file size as much as
possible.

Identify which type of compression would be most suitable for Nancy to use. Explain your
choice.

Compression type .....................................................................................................................

Explanation ...............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

3 A stopwatch uses six digits to display hours, minutes and seconds.

The stopwatch is stopped at:

0 2 3 1 5 8
Hours Minutes Seconds

An 8-bit register is used to store each pair of digits.

(a) Write the 8-bit binary numbers that are currently stored for the Hours, Minutes and Seconds.

Hours

Minutes

Seconds

[3]

© UCLES 2018 2210/12/M/J/18 [Turn over


Page 38 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

(b) The stopwatch is started again and then stopped.

When the watch is stopped, the 8-bit binary registers show:

Hours 0 0 0 0 0 1 0 1

Minutes 0 0 0 1 1 0 1 0

Seconds 0 0 1 1 0 1 1 1

Write the denary values that will now be shown on the stopwatch.

Hours Minutes Seconds


[3]

4 Jafar is using the Internet when he gets the message:

“D03, page is not available”

Jafar remembers that hexadecimal is often used to represent binary values in error codes.

Convert the hexadecimal number in the error message into 12-bit binary.

[3]

© UCLES 2018 2210/12/M/J/18


Page 39 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

5 The three binary numbers in the registers X, Y and Z have been transmitted from one computer to
another.

Parity bit

Register X 1 0 0 1 0 0 1 0

Register Y 1 1 1 0 0 1 1 1

Register Z 1 1 1 0 1 0 0 1

Only one binary number has been transmitted correctly. This is identified through the use of a
parity bit.

Identify which register contains the binary number that has been transmitted correctly. Explain
the reason for your choice.

The binary number that has been transmitted correctly is in Register ............................................

Explanation ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[4]

© UCLES 2018 2210/12/M/J/18 [Turn over


Page 40 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

12 (b) Selma wants to make sure that the information received is correct.

A parity check can be used to detect errors.

Describe another error detection method that can be used to check the information received
is correct.

Error detection method .............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
...................................................................................................................................................

[3]

© UCLES 2018 2210/12/M/J/18


Page 41 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

2 Seven computer terms and seven descriptions are shown below.

Draw a line to link each computer term to its most appropriate description.

Computer term Description

Reduction of file size by permanently removing


Interface
some redundant information from the file

File compression format designed to make


Interrupt photo files smaller in size for storage and for
transmission

File compression system for music which does


JPEG
not noticeably affect the quality of the sound

Hardware component that allows the user to


Lossless
communicate with a computer or operating
compression
system

The file is reduced in size for transmission and


Lossy
storage; it is then put back together again later
compression
producing a file identical to the original

Signal sent to a processor which may cause


MIDI a break in execution of the current routine,
according to priorities

Standard adopted by the electronic music


MP3 format industry for controlling devices such as
synthesisers and sound cards
[6]

2210/12/O/N/15
Page 42 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

4 (a) (i) Convert the following two hexadecimal numbers into binary:

FA7
D3E

FA7

D3E
[4]

(ii) Now perform the AND (logic) operation on each corresponding pair of binary bits in the
two numbers from part (i).

[2]

(iii) Convert your answer in part (ii) into hexadecimal.

...........................................................................................................................................

...........................................................................................................................................
[2]

2210/12/O/N/15
Page 43 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

(b) (i) The following code shows HTML ‘tag’ pairs on either side of the text stating the colour
that each creates.

<font color “ # F F 0 0 0 0 “ > RED </font>


<font color “ # 0 0 F F 0 0 “ > GREEN </font>
<font color “ # 0 0 0 0 F F “ > BLUE </font>

<font color “ # X “ > YELLOW </font>


<font color “ # Y “ > MAGENTA </font>
<font color “ # Z “ > CYAN </font>

Yellow is a combination of red and green, magenta a combination of red and blue and
cyan a combination of green and blue.

State what 6-digit hexadecimal values should replace X, Y and Z in the above code.

X ........................................................................................................................................

Y ........................................................................................................................................

Z ........................................................................................................................................
[3]

(ii) Describe how other colours, such as a darker shade of blue, are created.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

(c) 1A – 16 – C5 – 22 – FF – FF is an example of a MAC address.

(i) Identify what the first six and last six hexadecimal digits represent.

First six digits ....................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Last six digits .....................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[2]

(ii) State why MAC addresses are used.

...........................................................................................................................................

...........................................................................................................................................
[1]

2210/12/O/N/15
Page 44 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

7 (a) Check digits are used to ensure the accuracy of input data.

A 7-digit code number has an extra digit on the right, called the check digit.

Digit position 1 2 3 4 5 6 7 8

Digit – – – – – – – –

The check digit is calculated as follows:

• each digit in the number is multiplied by its digit position


• the seven results are then added together
• this total is divided by 11
• the remainder gives the check digit (if the remainder = 10, the check digit is X)

(i) Calculate the check digit for the following code number. Show all your working.

4 2 4 1 5 0 8 …

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Check digit ........................................................................................................................


[2]

(ii) An operator has just keyed in the following code number:

3 2 4 0 0 4 5 X

Has the operator correctly keyed in the code number?

...........................................................................................................................................

Give a reason for your answer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

2210/12/O/N/15
Page 45 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

(b) When data are transmitted from one device to another, a parity check is often carried out on
each byte of data. The parity bit is often the leftmost bit in the byte.

(i) If a system uses even parity, give the parity bit for each of the following bytes:

parity bit

1 1 0 0 1 1 0

parity bit

0 0 0 0 0 0 1
[2]

(ii) A parity check can often detect corruption of a byte.

Describe a situation in which it cannot detect corruption of a byte.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

2210/12/O/N/15
Page 46 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

2 (i) Identify the fault condition(s) that the following register indicates:

0 0 1 0 0 1 0 1

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) The system uses odd parity.

Write the correct parity bit in each register.

1 1 1 0 0 1 0

0 0 0 1 1 1 0
[2]

(iii) A car has a faulty airbag and the CO level is too high.

Write what should be contained in the 8-bit register.

[2]

(iv) Give the hexadecimal value of the binary number shown in part (iii).

...........................................................................................................................................

.......................................................................................................................................[1]

2210/13/O/N/15
Page 47 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

9 MP3 file compression reduces the size of a music file by 90%.

(a) A music track is 80 MB in size.

Calculate the file size after compression.

...................................................................................................................................................

How many MP3 files of the size calculated above could be stored on an 800 MB CD?

...................................................................................................................................................
[2]

(b) (i) Explain how MP3 files retain most of the original music quality.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) State the type of file compression used in MP3 files.

...................................................................................................................................... [1]

(iii) Name another file compression format.

...................................................................................................................................... [1]

2210/13/O/N/15
Page 48 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

4 Nine bytes of data are transmitted from one computer to another. Even parity is used. An additional
parity byte is also sent.

The ten bytes arrive at the destination computer as follows:

parity bit bit 2 bit 3 bit 4 bit 5 bit 6 bit 7 bit 8

byte 1 1 1 1 0 1 1 1 0

byte 2 0 0 0 0 0 1 0 1

byte 3 0 1 1 1 1 0 0 0

byte 4 1 1 0 0 0 0 0 0

byte 5 1 0 1 1 1 1 1 0

byte 6 0 1 0 1 1 0 0 1

byte 7 0 1 1 1 0 0 1 1

byte 8 0 0 1 1 0 1 1 0

byte 9 1 1 0 0 0 0 1 1

parity byte 0 0 1 0 0 0 1 0

One of the bits was corrupted during the data transmission.

(a) Circle the corrupt bit in the corrupt byte in the table above. [1]

(b) Explain how the corrupted bit was found.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

2210/12/O/N/16
Page 49 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

5 A computer uses an 8-bit register.

The 8-bit register contains binary integers.

(a) Write the denary (base 10) value represented by:

128 64 32 16 8 4 2 1

0 1 1 1 0 0 0 0

...............................................................................................................................................[1]

(b) All the bits in the register are shifted one place to the right as shown below.

0 1 1 1 0 0 0 0

0 0 1 1 1 0 0 0

Write the denary number that is represented after this shift.

...............................................................................................................................................[1]

(c) State the effect the shift to the right had on the original denary number from part (a).

...............................................................................................................................................[1]

(d) The original number in part (a) is shifted three places to the right.

(i) Show the new binary number:

[1]

(ii) Write the equivalent denary number.

.......................................................................................................................................[1]

2210/12/O/N/16
Page 50 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

8 Identify whether the four statements about file compression are correct by writing TRUE or FALSE
in the following table.

Statement TRUE or FALSE

MIDI files store the actual music notes in a compressed format

JPEG files are examples of lossless file compression

MP3 files are, on average, 90% smaller than the music files
stored on a CD

MP4 files are examples of lossy file compression

[4]

2210/12/O/N/16
Page 51 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

11 A security system is installed in a house. A hexadecimal number is entered to activate or deactivate


the alarm.

(a) The alarm code is set to hexadecimal number 2 A F

Show how this number would be stored in a 12-bit binary register.

[3]

(b) Identify two sensors that the security system could use to detect intruders.

Describe how each sensor could be used in the security system.

Sensor 1 ...................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Sensor 2 ...................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

2210/12/O/N/16
Page 52 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

3 Five computer terms and seven descriptions are shown below.

Draw a line to connect each computer term to its correct description.

Computer term Description

Several bits of data sent down several


wires, in both directions, but not at the
same time
Serial, simplex data
transmission

Several bits of data sent down several


wires, in both directions, at the same
time

Parallel, half-duplex
data transmission
An even or odd number of bits set to 1
in a byte, used to check if the byte has
been transmitted correctly

One bit sent at a time, over a single wire


Parity check in one direction only

An additional digit placed at the end of a


number to check if the number has been
entered correctly
Automatic repeat
request (ARQ)

A value transmitted at the end of a block


of data; it is calculated using the other
elements in the data stream and is used
to check for transmission errors

Checksum An error detection method that uses


response and time out when transmitting
data; if a response is not sent back to
the sender in an agreed amount of time,
then the data is re-sent

[5]
2210/13/O/N/16
Page 53 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

5 (b) Complete the truth table for the conditions given at the start of question 5.

Working space
A B C X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

(c) A microprocessor regularly samples the output, X. Each sample value is stored in an 8-bit
register as shown below. One bit of this register is reserved as a parity bit.

Five consecutive output values of 1 indicate a fault condition.

Identify which of the following registers shows a fault condition.


Parity bit

1 1 1 1 1 0 0 1 Register Y

0 1 0 1 1 1 1 1 Register Z

Register .............................................[1]

2210/13/O/N/16
Page 54 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

(d) When eight bytes of data have been collected, they are transmitted to a computer 100 km
away. Parity checks are carried out to identify if the data has been transmitted correctly. The
system uses even parity and column 1 is the parity bit.

The eight bytes of data are sent together with a ninth parity byte:

parity column column column column column column column


bit 2 3 4 5 6 7 8
byte 1 1 0 0 0 0 1 0 0
byte 2 1 1 1 1 0 0 1 1
byte 3 0 1 0 0 1 0 0 0
byte 4 0 1 1 1 0 0 0 1
byte 5 1 0 0 0 1 1 1 1
byte 6 0 0 0 0 0 0 0 0
byte 7 1 1 1 0 1 0 0 0
byte 8 1 0 0 0 1 1 1 0
parity
1 0 1 1 0 1 1 1
byte

(i) Identify which of the eight bytes contains an error.

byte ...............................................................................................................................[1]

(ii) Identify which column contains an error.

column ...........................................................................................................................[1]

(iii) The incorrect bit is indicated where the byte number and column cross.

Give the corrected byte.

[1]

(iv) Calculate the denary value of the corrected byte.

...........................................................................................................................................

.......................................................................................................................................[1]

(v) Considering the fault condition given in part (c), explain why it is very important that the
incorrect bit is located and corrected.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]
2210/13/O/N/16
Page 55 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

10 (a) A manufacturer of aeroplane engines assigns a denary identification number (ID) to each
engine.

One engine has the ID: 0431


(i) Convert this denary number to a 12-bit binary format.

[2]

(ii) Show how this number would be represented in hexadecimal.

...........................................................................................................................................

...........................................................................................................................................
[3]

(b) The current status of the engine is sent to a computer in the aeroplane.

Each piece of data collected is 8 bytes in size. Data collection occurs every 30 seconds.

Calculate the number of kilobytes that would be needed to store the data collected during a
10-hour flight. Show your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

................................................. kilobytes
[3]

2210/13/O/N/16
Page 56 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

1 A robot arm in a factory is programmed to move products.

The binary instructions to operate the robot arm are:

Operation Binary Instruction

UP 1 1 1 1

DOWN 0 0 0 1

LEFT 1 0 0 1

RIGHT 0 1 1 0

OPEN 1 1 0 0

CLOSE 0 0 1 1

The instructions are entered as hexadecimal values.

An operator enters the values:

9 1 C 3 F

Convert the values and write down the operation (e.g. RIGHT) carried out by the robot arm.

9 .............................................................................

1 .............................................................................

C .............................................................................

3 .............................................................................

F .............................................................................
[5]

© UCLES 2017 2210/12/O/N/17


Page 57 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

3 (a) Explain the differences between the binary number system and the denary number system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
......
.............................................................................................................................................

...................................................................................................................................................
......
.............................................................................................................................................

...................................................................................................................................................
......

......
....................................

....................................
.........................................................................................................

.........................................................................................................

............................................................................................................................................... [4]
......

.............................................................................................................................................

(b) Explain the process of converting the binary number 1010 into a denary number.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
......
.............................................................................................................................................

...................................................................................................................................................
......
.............................................................................................................................................

...................................................................................................................................................
......

......
....................................

....................................
.........................................................................................................

.........................................................................................................

...................................................................................................................................................
......

......
.............................................................................................................................................

.............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
......

.............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2017 2210/12/O/N/17 [Turn over


Page 58 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

4 (b) Identify and describe two methods of error checking that can be used to make sure that the
data stored after transmission is accurate.

Method 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Method 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2017 2210/12/O/N/17 [Turn over


Page 59 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

1 A washing machine has a small display screen built into it.

One use of the display screen is to show an error code when a problem has occurred with a
washing cycle.

(b) The display screen shows a hexadecimal error code:

E04
This error code means that the water will not empty out of the washing machine.

Convert this error code to binary.

[3]

(c) State why hexadecimal is used to display the error code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

2 Data files are stored in different file formats.

Complete the table by providing a suitable file format for each file type. The first one has been
done for you.

File type File format


Pictures .JPEG
Text
Sound
Video
[3]

© UCLES 2017 2210/13/O/N/17


Page 60 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

1 Computers use a character set to convert text into binary.

One character set that can be used is ASCII.

Each letter in ASCII can also be represented as a denary value.

(a) The word BUS has the denary values:

B U S

66 85 83

Convert the denary values into 8-bit binary.

66

85

83
[3]

(b) Each letter in ASCII can also be represented as a hexadecimal value.

The word KEY has the 8-bit binary values:

K E Y

01001011 01000101 01011001

(i) Convert the three 8-bit binary values into hexadecimal.

01001011 ...............................................

01000101 ...............................................

01011001 ...............................................
[3]

© UCLES 2018 2210/12/O/N/18


Page 61 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

(ii) Give three other uses of hexadecimal notation in computer science.

1 .........................................................................................................................................

2 .........................................................................................................................................

3 .........................................................................................................................................
[3]

(iii) State two benefits of using hexadecimal notation to represent binary values.

Benefit 1 ............................................................................................................................

...........................................................................................................................................

Benefit 2 ............................................................................................................................

...........................................................................................................................................
[2]
2210/12/O/N/18

2 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check for errors during data
transmission and storage.

(a) A system uses even parity. Write the appropriate parity bit for each byte.

Parity Bit
1 0 1 0 0 1 1
1 0 1 1 1 1 1
1 0 1 0 0 0 1
[2]

(b) Explain how Automatic Repeat reQuests (ARQ) are used in data transmission and storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................... [2]

(c) State one other method that could be used to check for transmission errors.

............................................................................................................................................... [1]

© UCLES 2018 [Turn over


2210/13/O/N/18 Page 62 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

4 The MAC address of a device is represented using hexadecimal.

A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary.

(a) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The
first number has already been converted.

6A FF 08 93
01101010
[3]

(b) Explain why data is stored as binary in computers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

7 (c) David needs to send a large section of the programming code as an email attachment.

He uses lossless compression to reduce the file size.

Explain how the file size is reduced.

...................................................................................................................................................
......

.............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
......

.............................................................................................................................................

...................................................................................................................................................
......
.............................................................................................................................................

............................................................................................................................................... [3]

© UCLES 2018 2210/13/O/N/18


Page 63 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

12 Explain the difference between a Musical Instrument Digital Interface (MIDI) file and a MP3 file.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 2210/13/O/N/18


Page 64 of 105
O LEVELS 2210 TOPICAL BOOK 1.1

Page 65 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 8 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

8 (a) hours: 18

minutes: 53 [2]

(b)

hours ( “C”) minutes ( “D”)

0 0 0 0 0 1 1 1 : 0 0 0 1 1 1 1 0

[2]
(c) Any three from:

– reads values in registers “C” and “D”

– and checks the values against those stored in registers “A” and “B”
(NOTE: the first two statements can be interchanged, i.e. “A” and “B” read first)

– If values in corresponding registers are the same

– the microprocessor sends a signal to sound alarm/ring [3]

Page 66 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 10 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 11

What is the denary (base 10)


equivalent to the hexadecimal
digit “E”? 8

x
If 1 GByte = 2
value of X?
then what is the
12

The number of bits in one byte 14

If the broadband data download


rate is 40 megabits/ second; how
long will it take to download a 60 19
MByte file?

What is the denary (base 10)


value of the binary number:
30
0 0 1 0 0 1 0 0?

What hexadecimal value is


obtained when the two
hexadecimal digits, C and D, are 36
added together?

5/6 matches – 5 marks


4 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[5]

Page 67 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 6 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

5 (a) 1 mark per correctly placed tick

Received byte Byte transmitted correctly Byte transmitted incorrectly

11001000 

01111100 

01101001 

[3]

(b) (i) byte number: 7

column number: 6
[2]

(ii) Any two from:

− letter “A”(byte 7) transmitted as odd parity (three 1s)


− column 6 has odd parity (seven 1s)
− intersection of byte 7 and column 6 indicates incorrect bit value
[2]

(c) 190
[1]

(d) Any one from:

− 2 bits interchanged (e.g. 1 → 0 and 0 → 1) that won’t change parity value


− even number of bits/digits are transposed
− If there are multiple errors in the same byte/column, that still produce the same parity bit,
the error will not be detected
[1]

Page 68 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 11 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12

10 (a) 1 mark for two correct lines, 2 marks for four correct lines

L (108): 0 1 1 0 1 1 0 0

I (105): 0 1 1 0 1 0 0 1

G (103): 0 1 1 0 0 1 1 1

N (110): 0 1 1 0 1 1 1 0
[2]

(b) 1 mark for each correct binary value


1 mark for each correct hexadecimal value
hexidecimal

L: 1 1 0 1 1 0 0 0 D8

G: 1 1 0 0 1 1 1 0 CE
[4]

Page 69 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 2 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

2 (a) media access control [1]

(b) Any three from:

– hardware/physical address
– unique address/number associated (with network card in) a device/computer
– usually 48/64 bits (12/16 hex digits)
– first 6/8 digits = manufacturer code/ID of device (NIC)
– last 6/8 digits = serial number of device (NIC) [3]

Page 70 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 6 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

7 (a) 1 mark for each correct binary value

3 0 0 1 1

0 1 0 1 [2]
5
(b)

0 0 0 1 1
1 0 0 1 9 1 mark

0 1 0
0
4
1 1 1 0 E 1 mark [2]

Page 71 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 7 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

9 (a) 1 mark for correct check digit and 1 mark for showing the calculation

(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
1 mark for any correct
line of working
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105

105/11 = 9 remainder 6

check digit is: 6 [2]

(b) incorrect check digit [1]

– check digit should be 1


– (3*1) + (2*2) + (4*3) + (0*4) + (0*5) + (4*6) + (5*7) // 3 + 4 + 12 + 0 + 0 + 24 + 35 //
Total = 78
– 78/11 gives 7 remainder 1 [2]

Page 72 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 10 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 11

12 (a) QR (quick response) Code [1]

(b) – A 5 0 (1 mark)

1 0 1 0 0 1 0 1 0 0 0 0

1 mark 1 mark 1 mark


[4]

(c) Any three from:

- visitor scans the QR code with (the camera on) the mobile device
- App is used to read/interpret the QR code
- links to a website/opens a document …
- … to access local tourist information
- can store the QR code to refer to again for the information [3]

Page 73 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 2 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

3 (a) 1 mark for each nibble

0100 1010 1111 [3]

(b) (i) 0 1 1 0 1 0 0 1 105 hours 1 mark


00011111 31 minutes 1 mark
00110010 50 seconds 1 mark [3]

(ii) 1F [1]

4 (a) Any three from:


– The file can be compressed
– The compression that is used is lossless (not lossy)
– use of a compression algorithm
– repeated words can be indexed
– repeated word sections (e.g. “OU”) can be replaced by a numerical value
– reference to zip files
– save file as a pdf/convert to pdf [3]

(b) Any four from:


– the checksum for the bytes is calculated
– this value is then transmitted with the block of data
– at the receiving end, the checksum is re-calculated from the block of data received
– the calculated value is then compared to the checksum transmitted
– if they are the same value, then the data was transmitted without any error
– if the values are different, then an error has been found
– if the values are different, then a request is sent for the data to be re-transmitted [4]

Page 74 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 10 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 12

9 (a)

Binary number A: 1 1 1 0 0 1 0

Binary number B: 1 0 0 1 1 1 0

[2]

(b)
Parity Bit

Binary number A 1

Binary number B 1
[2]

Page 75 of 105
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.1
2210/11 PUBLISHED May/June 2017

Question Answer Marks

1(a) 1 mark for any two correct values, 2 marks for all 4 correct values. 2
29FC

1(b) Two from: 2


• Easier/quicker to understand/read
• Easier to debug/identify errors
• Fewer digits are used / shorter // takes up less space on screen // more
can be shown on screen / page

1(c) Two from: 2


• Notations for colour in HTML // HTML colour (codes)
• Error messages
• MAC address // IP address
• Locations in memory
• Memory dump

Question Answer Marks

5(a) 1 mark per correct tick 3

corrupted not corrupted


during during
Received byte
transmission transmission
(9) (9)
10110100 9
01101101 9
10000001 9

5(b) Four from: 4


• Uses acknowledgement and time out
• Check performed on received data // error is detected by e.g. parity
check, check sum
• If error detected, request sent to resend data // negative
acknowledgment is used
• If no acknowledgement is sent that data is received // positive
acknowledgement is used
• Data is resent / Resend request repeated, till data is resent correctly «
• « or request times out // limit is reached

Page 76 of 105
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.1
2210/11 PUBLISHED May/June 2017

Question Answer Marks

13(a) Two from: 2


• Smaller file to transmit
• The file is transmitted quicker
• Uses / requires less bandwidth

13(b)(i) • Lossless (compression) « 3


• « It is important the code must be (exactly) the same as the original
file
• « If it does not match the original file it will not work

13(b)(ii) • Lossy (compression) « 3


• « It would make the file smaller than lossless compression / the file
would stream faster than lossless compression
• « The quality of the video can be reduced but it can still be viewed

Page 77 of 105
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.1
2210/12 PUBLISHED May/June 2017

Question Answer Marks

4 Two marks for each correct description 8

Parity Check
• Checks a byte of data
• Check is performed when data is received
• A parity bit is added (to the parity byte)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• Can be even or odd
• If parity is incorrect, error is detected

Check digit
• A digit that is calculated from the data // uses modulo to calculate digit
// valid description of modulo
• It is appended / added to the data
• Digit is recalculated when data is entered
• Digits are compared to check for error

Checksum
• A value is calculated from the data // Valid description of calculation
• It is transmitted with the data
• Value is recalculated after transmission
• Values are compared after transmission to check for error

Automatic Repeat reQuest


• Uses acknowledgement / request and time-out
• Error control protocol
• Check performed on receiving data // error is detected by e.g. parity
check, check sum
• If error detected, request is sent to resend data // negative
acknowledgement is used
• Resend request is repeated till data is sent correctly / requests time
out / limit is reached
• Send acknowledgement that data is received // positive
acknowledgement is used
• If acknowledgement not received in set time data is resent

Page 78 of 105
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.1
2210/12 PUBLISHED May/June 2017

Question Answer Marks

5(a) 1 mark for correct method, 1 mark for correct answer 2

32 + 16 + 8 + 1
(00)111001

5(b) registers must have leading zeros, allow follow through from 5(a) for an 2
incorrect value
1 mark for each correct register.

0 0 1 1 1 0 0 1

0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1

5(c) Two from: 2

• data
• ASCII value / Unicode value / character
• number
• part of image / small image
• a sound / sound sample / small sound track
• instruction

5(d) 3A 1

Page 79 of 105
2210/11
O LEVELS 2210 Cambridge O Level – Mark Scheme May/June
TOPICAL 2018
BOOK 1.1
PUBLISHED
Question Answer Marks

1 1 mark for each correct answer, in the given order: 6

− analogue
− digital
− denary
− 10
− binary
− 2

Question Answer Marks

2 1 mark for each correct conversion: 3

− 42
− 257
− 542

Question Answer Marks

3 1 mark for correct register, 3 marks for reason: 4

− Register C

Any three from:


− Count the number of 1/0 bits (in each byte/register)
− Two bytes/registers have an odd number of 1/0 bits // Two use odd parity
− Odd parity must be the parity used
− One byte/register has an even number of 1/0 bits // One uses even parity
− One with an even number of one bits/even parity is incorrect // Register C should have odd parity

© UCLES 2018 Page 4 of 12


Page 80 of 105
2210/11
O LEVELS 2210 Cambridge O Level – Mark Scheme May/June
TOPICAL 2018
BOOK 1.1
PUBLISHED
Question Answer Marks

4(a) 1 mark for each correct answer: 2

Lossy (compression)
Lossless (compression)

4(b) 1 mark for correct compression, 3 marks for description: 4

− Lossless (compression)

Any three from:


− The file can be restored/decompressed to the exact same state it was before compression/ to original
− (It is a computer program so) no data can be lost // Lossy would remove data
− Will not run correctly (with any other compression)
− (Lossless) will give repeating words/sections of word a value// RLE is used // Other valid examples of methods of
lossless compression
− Value is recorded in an index

© UCLES 2018 Page 5 of 12


Page 81 of 105
2210/12
O LEVELS 2210 Cambridge O Level – Mark Scheme May/June
TOPICAL 2018
BOOK 1.1
PUBLISHED
Question Answer Marks

2(b) 1 mark for correct compression, 3 marks for explanation: 4

– Lossy

Any three from:


– Lossy would reduce the file size more (than lossless)
– The redundant data can be removed from the files // by example (must be about redundant data)
– Images can still be a similar quality
– There is no requirement for the files to be exactly the same as original file
– Photos can be sent quicker // faster to upload // faster to download

© UCLES 2018 Page 4 of 10


Page 82 of 105
2210/12
O LEVELS 2210 Cambridge O Level – Mark Scheme May/June
TOPICAL 2018
BOOK 1.1
PUBLISHED
Question Answer Marks

3(a) 1 mark for each correct register 3

Hours 0 0 0 0 0 0 1 0

Minutes 0 0 0 1 1 1 1 1

Seconds 0 0 1 1 1 0 1 0

3(b) 1 mark for each correct section: 3

0 5 2 6 5 5
Hours Minutes Seconds

Question Answer Marks

4 1 mark for each correct section: 3

1 1 0 1 0 0 0 0 0 0 1 1

1 mark 1 mark 1 mark

© UCLES 2018 Page 5 of 10


Page 83 of 105
2210/12
O LEVELS 2210 Cambridge O Level – Mark Scheme May/June
TOPICAL 2018
BOOK 1.1
PUBLISHED
Question Answer Marks

5 1 mark for correct register, 3 marks for reason: 4

– Register Y

Any three from:


– Count the number of 1/0 bits (in each byte/register)
– Two bytes/registers have an odd number of 1/0 bits // Two have odd parity
– Even parity must be the parity used
– One byte/register has an even number of 1/0 bits // One uses even parity
– The two with an odd number of one bits/odd parity are incorrect // Register X and Z should have even parity

12(b) Any three from a single error method: 3


– Checksum
– Calculation carried out on data
– (checksum/calculated) value sent with data
– recalculated after transmission and compared to original
– If they do not match an error is present

– ARQ
– uses acknowledgment and timeout
– A request is sent with data to acknowledge all data is received
– Acknowledgement sent back to say all data is received
– If no acknowledgement is received in a time frame an error in transmission detected / data automatically resent.

© UCLES 2018 Page 6 of 10


Page 84 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 3 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

2
Interface Reduction of file size by permanently
removing certain, redundant information
from the file

Interrupt
File compression format designed to make
photo files smaller in size for storage and
for transmission

JPEG
File compression system for music which
does not noticeably affect the quality of the
sound

Lossless
compression Hardware component that allows the user
to communicate with a computer or
operating system

Lossy The file is reduced in size for transmission


compression and storage; it is then put back together
again later producing a file identical to the
original

MIDI Signal sent to a processor which may cause


a break in execution of the current routine,
according to priorities

MP3 format Standard adopted by the electronic music


industry for controlling devices such as
synthesisers and sound cards

[6]

Page 85 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 5 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

4 (a) (i) For each hex number, 2 marks if all correct, 1 mark for 2 correct conversions

F A 7: 1 1 1 1 1 0 1 0 0 1 1 1

D 3 E: 1 1 0 1 0 0 1 1 1 1 1 0

[4]

(ii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through

1 1 0 1 0 0 1 0 0 1 1 0

[2]

(iii) 2 marks if all correct, 1 mark for 2 correct conversions – Follow through
D26 [2]

(b) (i) (X) FF FF 00

(Y) FF 00 FF

(Z) 00 FF FF [3]

(ii) – hex values between 0 to F are combined together to create a hex code
– different combinations in hex codes will create different shades/tones/colours [2]

(c) (i) First six digits: manufacturer code/manufacturer ID

Last six digits: serial number/serial ID of device/product [2]

(ii) Allows all devices to be uniquely identified [1]

Page 86 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 7 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2015 2210 12

7 (a) (i) 1 mark for correct check digit and 1 mark for showing the calculation

(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)

= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105

105/11 = 9 remainder 6

check digit is: 6 [2]

(ii) 1 mark
– No/ incorrect check digit

2 marks
– Total is 78
– 78/11 …
– … gives 7 remainder 1
– check digit should be 1 [3]

(b) (i) 1 mark for each correct parity bit

parity bit

0 1 1 0 0 1 1 0

parity bit

1 0 0 0 0 0 0 1
[2]

(ii) Any one from:


– an even number of digits are changed
– a transposition error(s) has occurred [1]

Page 87 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 4 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

2 (a) Any five from:


– sensors send signals / data to microprocessor
– signal / data converted to digital (by an ADC)
– microprocessor compares temperature / carbon monoxide level / value with stored
level / value
– if CO level > stored value, microprocessor sends signal…
– if temperature > stored value, microprocessor sends signal…
– …to light warning bulb on dashboard / sounds alarm [5]

(b) (i) 2 marks for all correct conditions, 1 mark for 2 correct conditions

CO (carbon monoxide) level too high


oil pressure too low
brake pads too thin [2]

(ii) 1 mark for each correct parity bit in position 1

1 1 1 1 0 0 1 0

0 0 0 0 1 1 1 0

[2]

(iii) 1 mark for correct parity bit + 1 mark for remainder of binary value

1 0 1 0 0 0 1 0

[2]

(iv) A 2 (allow follow through from part (iii)) [1]

Page 88 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 9 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2015 2210 13

9 (a) 8 MB
100 [2]

(b) (i) Any two from:


– removes sounds human ear can’t hear very well
– if two sounds played at same time, softer sound removed
– uses perceptual music shaping [2]

(ii) Lossy [1]

(iii) One from, for example:


– jpeg
– MP4
– zip
– gif [1]

Page 89 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 3 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

4 (a) Intersection of Row 7 and column 4 circled [1]

(b) – Row (byte number) 7 has an odd number of 1s (five 1s)


– Column (bit number) 4 has an odd number of 1s (five 1s)
[2]

Page 90 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 4 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

5 (a) 112 [1]

(b) 56 [1]

(c) divided by 2 // value 112 was halved // multiplied by 0.5 [1]

(d) (i)
0 0 0 0 1 1 1 0

[1]

(ii) 14 [1]

(e) Any two from:

– run out of places to the right of register / at the end of register


– right-most 1 would be lost
– number would become 3 instead of 3.5
– loss of precision
[2]

Page 91 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 8 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

8
Statement TRUE or FALSE

MIDI stores the actual music notes in a compressed format FALSE

JPEG files are examples of lossless file compression FALSE

MP3 files are, on average, 90% smaller than the music files
TRUE
stored on a CD

MP4 files are examples of lossy file compression


TRUE

[4]

Page 92 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 9 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 12

11 (a) 1 mark per nibble

0010 1010 1111


[3]

(b) 1 mark for identification of each sensor, max 2 for each description

Infrared/motion sensor

– Receives infrared rays/heat


– Sends data to microprocessor
– Receives microwaves
– Placed in the corner of a room, across a doorway
– Used to detect the heat of an intruder // used to detect if an infrared beam has been
broken by an intruder

Pressure sensor

– Receives current if circuit created // stops receiving current if circuit is broken


– Sends data to microprocessor
– Placed on a window/door, at the entrance
– Used to detect a change in pressure
[6]

Page 93 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 3 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

[5]

Page 94 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 5 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

5 (a) 1 mark per correct section.

B X

[5]

(b) 4 marks for 8 correct values


3 marks for 6 correct values
2 marks for 4 correct values
1 mark for 2 correct values

A B C Working space X

0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 0
[4]

Page 95 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 6 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

(c) Register Z [1]

(d) (i) (byte) 5 [1]

(ii) (column) 4 [1]

(iii) corrected byte is: 1 0 0 1 1 1 1 1 [1]

(iv) that gives the value: 1 5 9


(follow through applies) [1]

(v) Any two from:

– The byte would be transmitted without having 5 consecutive 1’s


– The fault condition would not be recognised [2]

Page 96 of 105
O LEVELS 2210 TOPICAL BOOK 1.1
Page 8 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 13

10 (a) (i) 2 marks for 3 correct binary conversions, 1 mark for 2 correct binary conversions [2]

0 0 0 1 1 0 1 0 1 1 1 1

(ii) 1 mark for each correct hex value converted

1AF [3]

(b) 2 marks for working + 1 mark for correct answer

Working
– 1200 × 8 = 9600 (bytes)
– 9600/1024 or 9600/1000

Answer
– 9.4 or 9.6 kilobytes [3]

(c) Any one from:

MAC address

– Media Access Control (address)


– unique number that identifies a device (connected to the Internet)
– address is made up of manufacturer id + serial number of device
– address is allocated by the manufacturer

Any one from:

IP address

– Internet Protocol (address)


– location/address of a device on the Internet
– address is unique for given Internet session
– address is supplied when a device connects to the Internet
– address is allocated by the network [2]

(d) – record (layer)


– handshake (layer) [2]

Page 97 of 105
2210/12
O LEVELS 2210 Cambridge O Level – Mark Scheme October/November
TOPICAL BOOK 1.1
PUBLISHED 2017
Question Answer Marks

1 1 mark per correct instruction: 5

9 – LEFT
1 – DOWN
C – OPEN
3 – CLOSE
F – UP

3(a) Any four from (Max 2 per number system) : 4

• A binary number system is a base-2 system


• A denary number system is a base-10 system

• A binary number system uses 0 and 1 values


• A denary number system uses 0 to 9 values

• A binary number system has units/ placeholders/column headings that increase by the power of 2
• A denary number system has units/ placeholders/column headings that increase by the power of 10

• Binary has more digit for the same value// Denary has less digits for the same value
3(b) Five from: 5
• Correct column headings / place holders by example
• Correctly place a 1 or a 0 for each column
• Identify the columns to be added
• Add together the (denary) values identified «
• « this will give a total which is the denary number/answer
• Answer is 10

© UCLES 2017 Page 2 of 9


Page 98 of 105
2210/12
O LEVELS 2210 Cambridge O Level – Mark Scheme October/November
TOPICAL BOOK 1.1
PUBLISHED 2017
Question Answer Marks

4(b) 1 mark for error checking method, 2 marks for description: 6

Checksum
• A value is calculated from the data // Description of calculation
• Value is transmitted with data
• Value is recalculated after transmission
• If the values match the data is (more likely to be) accurate

Parity check
• A parity bit is transmitted with each byte of data
• Odd or even (parity can be used)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even // counts / checks to see if 1’s are odd
• (Each byte is) checked after transmission to see if it matches the odd/even parity used

Automatic Repeat Request (ARQ)


• Uses acknowledgement and timeout
• When a device detects an error in data transmission it asks for the packet to be resent / no error detected, positive
acknowledgment sent
• The sending device resends the packet after the request to resend/ timeout received
• This process is continuous until the packet received is correct/until the ARQ limit is reached

Echo (check)
• Copy of data is sent back to sender
• Data is compared to see if it matches
• If it does not match error detected

© UCLES 2017 Page 4 of 9


Page 99 of 105
2210/13
O LEVELS 2210 Cambridge O Level – Mark Scheme October/November
TOPICAL BOOK 1.1
PUBLISHED 2017
Question Answer Marks

1(a) Output 1

1(b) 1 mark for each correct conversion 3

E 0 4

1 1 1 0 0 0 0 0 0 1 0 0

1(c) Any one from: 1


– Hexadecimal codes can fit in a smaller display rather than a full text based message
– Smaller amount of memory needed to store the hex error messages than text based

1(d) 1 mark for correct sensor, 1 mark for corresponding use 6


Possible examples could include:

– Temperature (sensor)
– To monitor the temperature of the water

– Pressure (sensor)
– To monitor the level of water in the washing machine

– Motion (sensor)
– To monitor whether the drum is still in motion

– pH (sensor)
– To monitor the level of water hardness/detergent present in the water

© UCLES 2017 Page 2 of 10


Page 100 of 105
2210/13
O LEVELS 2210 Cambridge O Level – Mark Scheme October/November
TOPICAL BOOK 1.1
PUBLISHED 2017
Question Answer Marks

2 1 mark for each correct file format e.g. 3

File type File format


Pictures .JPEG
.doc, .txt, .rtf,
Text
.docx, .odt .pdf
.mp3, .wav, .aif,
Sound
.flac, .mid
Video .mp4, .flv, .wmv

© UCLES 2017 Page 3 of 10


Page 101 of 105
2210/12
O LEVELS 2210 Cambridge O Level – Mark Scheme October/November 2018
TOPICAL BOOK 1.1
PUBLISHED
Question Answer Marks

1(a) 1 mark for each correct 8-bit binary number 3

66 0 1 0 0 0 0 1 0

85 0 1 0 1 0 1 0 1

83 0 1 0 1 0 0 1 1

1(b)(i) 1 mark for each correct hexadecimal number 3


4B
45
59

1(b)(ii) Three from: 3


• (HTML) colour codes
• Error messages
• MAC addresses
• IP addresses
• Assembly language
• Memory dump
• Locations in memory

1(b)(iii) Two from: 2


• Easier to read/write/understand (for humans)
• Easier to remember (for humans)
• Short way to represent binary // Uses less screen/display space
• Fewer errors made (in data transcription)
• Easier to debug (for humans)

© UCLES 2018 Page 4 of 12


Page 102 of 105
2210/13
O LEVELS 2210 Cambridge O Level – Mark Scheme October/November 2018
TOPICAL BOOK 1.1
PUBLISHED
Question Answer Marks

2(a) 2 marks for 3 correct bits, 1 mark for 2 correct bits 2

Parity Bit

0 1 0 1 0 0 1 1

0 1 0 1 1 1 1 1

1 1 0 1 0 0 0 1

2(b) Two from: 2


• Set of rules for controlling error checking/detection // it’s an error detection method // used to detect errors
• Uses acknowledgement and timeout
• Request is sent (with data) requiring acknowledgement
• If no response/acknowledgment within certain time frame data package is resent
• When data received contains an error a request is sent (automatically) to resend the data
• The resend request is repeatedly sent until packet is received error free/limit is reached/acknowledgement received

2(c) Checksum 1

© UCLES 2018 Page 5 of 13


Page 103 of 105
2210/13
O LEVELS 2210 Cambridge O Level – Mark Scheme October/November 2018
TOPICAL BOOK 1.1
PUBLISHED
Question Answer Marks

4(a) 1 mark for each correct conversion 3


01101010 11111111 00001000 10010011

4(b) • Computers use switches / logic gates 2


• Only uses 2 states / On or Off / 1 or 0

7(c) Three from: 3


• Uses compression algorithm / by example e.g. RLE
• Repeating words / phrases / patterns identified
• replaced with value
• File / dictionary / index of phrases created
• Index will store word/phrase with value
PUBLISHED
Question Answer Marks

12 Four from (Max three from each): 4


MP3
• Digital recording of sound
• Produced by recording software / microphone
• Used when distributing sound files
• Compressed file format

MIDI
• Instructions of how to make sound
• Non-audio recording
• File created using digital musical instruments
• Produced by synthesizer
• Used when composing music
• Individual notes/instruments can be changed

© UCLES 2018 Page 6 of 13


Page 104 of 105

You might also like