You are on page 1of 11

IGCSE MOCK EXAMINATIONS

YEAR 11

JANUARY 2020

Subject: Computer Science Syllabus Code: 0478/12

Date of :
Time : 1 hr 45 min
Exam _______________________________________

Student : :
Class
Name _______________________________________ _______________

MATERIALS REQUIRED FOR EXAM: Blue or black pen, pencil, eraser and ruler.

READ THESE INSTRUCTIONS FIRST:

If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet.
Write in dark blue or black pen.
You may use a soft pencil for any drawings, diagrams and graphs.
Do not use staples, paper clips, highlighters, glue or correction fluid.

Answer all questions.

The number of marks is given in brackets ( ) at the end of each question.


The total number of marks for this paper is 75.

This document consists of _11__ printed pages including the front cover.

[Turn over]

MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA Page 1


1 Three switches, K, L and M, each send values of 0 or 1 to a logic circuit. Value X is output from the
logic circuit.
Switch K
Switch L Logic circuit Output X
Switch M

Output X has a value of 1 depending on the following conditions:

Switch K sends value 1 AND Switch L sends value 0

OR

Switch L sends value 1 AND Switch M sends value 0

(a) Draw a logic circuit to represent the conditions above.

L X

[5]

(b) Complete the truth table for the conditions given at the start of question 1.

MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA Page 2


Working space
K L M X

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
[4]

2 The High-level or low-level languages used when writing a computer program.

(a) State two advantages of using a high-level language and two advantages of using a low-level
language.

High-level language advantage 1 ....................................................................................................

..........................................................................................................................................................

High-level language advantage 2 ....................................................................................................

..........................................................................................................................................................

Low-level language advantage 1 .....................................................................................................

..........................................................................................................................................................

Low-level language advantage 2 .....................................................................................................

..........................................................................................................................................................
[4]

(b) High-level languages require either an interpreter or a compiler to translate the program.
The table below lists a number of statements about language translators.

MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA Page 3


Tick (/) to show which statements refer to interpreters and which refer to compilers.

Statements Interpreter (/) Compiler (/)


Translates the source code into machine code all at
once

Produces an executable file in machine code

Executes a high-level language program one


instruction at a time
Once translated, the translator does not need to be
present for the program to run

An executable file is produced


[5]

3 Name each of the potential security issues described in the five statements below:
Statement Security issue

i Program code that can replicate itself with the intention of deleting or corrupting files stored in a
computer ..................................................................................

ii A small file sent by a web server to a web browser; every time the user visits the website, data
about user preferences is collected ..................................................................................

iii The act of illegally changing the source code of a program so that it can be exploited for another
use ..................................................................................

iv Malicious code installed on a user’s hard drive or a web server which redirects the user to a fake
website without their knowledge ..................................................................................

v The act of gaining unauthorised access to a computer system …………………………………………………….

[5]

4 A computer uses an 8-bit register.


The 8-bit register contains binary integers.

MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA Page 4


a. Write the denary (base 10) value represented by:
128 64 32 16 8 4 2 1

0 1 1 1 0 0 0 0

............................................................................................................................................... [1]

b. All the bits in the register are shifted one place to the right as shown below.

0 1 1 1 0 0 0 0

0 0 1 1 1 0 0 0

Write the denary number that is represented after this shift.

............................................................................................................................................... [1]

c. State the effect the shift to the right had on the original denary number from part (a).

............................................................................................................................................... [1]

The original number in part (a) is shifted three places to the right.

i. Show the new binary number:

[1]

ii. Write the equivalent denary number.

...................................................................................................................................... [1]

d. Describe the problems that could be caused if the original binary number in part (a) is shifted
five places to the right.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

[2]

MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA Page 5


5 A geography teacher wants to use a computer to monitor the weather conditions using

the school weather station. Name three sensors in the weather station.

i. ……………………………………………………….

ii. ……………………………………………………….

iii. ………………………………………………………. [3]

6 a Explain why computers are unable to read the data directly from the sensors.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

[1]

b A school uses a computer controlled greenhouse to grow plants. Name two sensors that would be

used in the greenhouse

i. ……………………………………………………….

ii. ………………………………………………………. [2]

c Many homes now have microprocessor controlled burglar alarm systems. Name two Sensors in such

a system and explain the process.

Sensor 1 : ……………………………………………

Process : ……………………………………………

Sensor 2 : ……………………………………………

Process : …………………………………………… [2]

7 Give four benefits of using LED Four computer terms and eight descriptions are shown below. Draw
lines to connect each computer term to the correct description(s).

MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA Page 6


Computer term Description

Data can be read but not altered

Arithmetic and logic unit (ALU)


Stores bootstrap loader and BIOS

Control unit Fetches each instruction in turn

Random access memory (RAM) Carries out operations such as AND,


OR, NOT

Read only memory (ROM)


Stores part of the operating system
currently in use

Stores data currently in use

Manages execution of each


instruction

[4]

8 Identify whether the four statements about file compression are correct by writing TRUE or FALSE in
the following table.
Statement TRUE or FALSE

MIDI files store the actual music notes in a compressed format

JPEG files are examples of lossless file compression

MP3 files are, on average, 90% smaller than the music files stored on a CD

MP4 files are examples of lossy file compression

[4]

9 A car has a speedometer with a digital read out. Each digit can be represented by a 4 – bit
register.
can be represented 8 4 2 1

1 2 8
MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA
0 0 0
Page 7
1
as :
0 0 1 0

1st digit 2nd digit 3rd digit 1 0 0 0

a. What values must be in the 4-bit registers to represent the following speed shown on the
speedometer? [3]

can be represented 1st digit

1 4 4
1st digit 2nd digit 3rd digit
as :

2nd digit

b. What is shown on the digital speedometer if the 4-bit registers contain the following
values:

0 0 1 0 1st digit

0 1 0 1 1st digit 2nd digit 3rd digit


2 digit
nd

[3]

10 A car has a speedometer with a digital read out. Each digit can be represented by a 4 –
bit register.
can be represented 8 4 2 1

1 7 9
1st digit 2nd digit 3rd digit
as :
0
0
1
0
1
0
0
1
0
1
1
1

c. What values must be in the 4-bit registers to represent the following speed shown on the
speedometer?
[3]

can be represented 1st digit

2 8 2
1st digit 2nd digit 3rd digit
as :

2nd digit

d. What is shown on the digital speedometer if the 4-bit registers contain the following
values: 1st digit
0 0 1 0

0 0 COMPUTER
MOCK EXAMINATION 0 1 SCIENCE
2 digitYEAR 11 JANUARY 2020 MS USHA
nd
Page 8
1st digit 2nd digit 3rd digit

[3]

11 a Explain what is meant by a denial of service attack.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

[2]

b Name and describe two other potential security threats when using the Internet.

Security threat 1 .......................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security threat 2 .......................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

................................................................................................................................................... [2]

12 Describe what is meant by HTML.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

[1]

13 To process an instruction, a central processing unit (CPU) goes through a cycle that has three
main stages. Name each stage in this cycle.

Stage 1 ................................................................................

MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA Page 9


Stage 2 ................................................................................

Stage 3 ................................................................................

[3]

14 The current status of the engine is sent to a computer in the aeroplane. Each piece of data collected is
8 bytes in size. Data collection occurs every 30 seconds. Calculate the number of kilobytes that would
be needed to store the data collected during a 10-hour flight. Show your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

..................................................................................................................................................

................................................. kilobytes

[2]

15 The function of a computer is to input data, process it and output the resulting information. Write the
advantages and disadvantages of :

Output devices Advantage Disadvantage

Actuators

Flat –panel displays

Liquid crystal display –LCD

MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA Page 10


Inkjet printer

Computer – aided manufacturing


(CAM)

[5]

END OF QUESTION PAPER

MOCK EXAMINATION COMPUTER SCIENCE YEAR 11 JANUARY 2020 MS USHA Page 11

You might also like