You are on page 1of 7

Question Answer Marks

1(a)(i) 1 mark per point to max 2 2

 All of the characters/symbols that the computer can use/represent


 Each character has a unique number/binary number/hexadecimal
number

1(a)(ii) 1 mark for each character set to max 2, 1 mark for difference 3

 ASCII
 Extended ASCII
 UNICODE

 ASCII has 7 bits whereas UNICODE has 16 bits


 Extended ASCII has 8 bits whereas UNICODE has 16 bits
 ASCII has 7 bits whereas extended ASCII has 8 bits
 Unicode can represent more characters than ASCII/Extended// by
example
 Extended ASCII can represent more characters than ASCII

1(a)(iii) 1 mark per point to max 2 2

 Can use run-length encoding


 Identifies groups of repeated characters ...
 ... replaces them with a one copy of the character and the number of
times it occurs

1(a)(iv) 1 mark per point to max 2 2

 None of the original data can be lost / deleted


 The (text) file would be corrupted // the (text) file cannot be opened

1(b) 1 mark for each correct value 5

Statement
tateme

The hexadecimal value 11 represented in denary 17

The smallest denary number that be represented by an 0


unsigned 8-bit binary integer

The denary number 87 represented in Binary Coded 1000 0111


Decimal (BCD)

The denary number 240 represented in hexadecimal F0

The denary number –20 represented in 8-bit two’s 1110 1100


complement binary
Question Answer Marks

2(a)(i) 1 mark from 1

 To stop the data being lost / corrupted / amended


 To make sure it can be recovered
 To prevent unauthorised access

2a)(ii) 1 mark each 2


e.
 Install / run a firewall
 Up to date Anti-virus / anti-malware
 (Username and) (strong) password
 Encryption
 Access rights

2(b)(i) 1 mark each 2


 Visual check
 Manually compare the data entered with the original (document)

 Double entry
 Enter the data twice and the system compares them to see if they are
the same

2(b)(ii) 1 mark each 3


e.
Range check:
 Make sure it is after and before a specific date // e.g. between 1900 and
today's date // check month is between 1 and 12 // check day is
between 1 and month end

Presence check:
 Make sure the date of birth has been entered

Length check:
 Make sure there are at least 1 for day, 1 for month, 2/4 for year // must
be 8 characters

2(b(iii) 1 mark per bullet point to max 2 2

 Validation checks data is reasonable/within bounds it does not check


that accurate data has been entered
 Verification checks if the data matches the data given it does not check
if the original data is accurate
Question Answer Marks

3(a)(i) 1 mark per bullet point to max 3 3

• The microphone has a diaphragm / ribbon (accept equivalent)


• The incoming sound waves cause vibrations (of the diaphragm)
• . causing a coil to move past a magnet (dynamic microphone) //
changing the capacitance (condenser microphone) // deforms the
crystal (crystal microphone) etc.
• An electrical signal is produced

3(a)(ii) 1 mark per bullet to max 3 3

• The revolving drum is initially given an electrical charge


• A laser beam (bounces off moving mirrors) scans back and forth across
the drum
• ...discharging certain points (i.e. ‘drawing’ the letters and images to be
printed as a pattern of electrical charges)
• The drum is coated with oppositely charged toner (which only sticks to
charged areas)
• The drum rolls over electro-statically charged paper // Electro-statically
charged paper is fed (towards the drum)
• The ‘pattern’ on the drum is transferred to the paper
• The paper is passed through the fuser to seal the image
• The electrical charge is removed from the drum // the excess toner is
collected

3(b)(i) 1 mark for correct answer 1

Formal or legal recognition of ownership of the program // Formal or legal


restriction / permissions on use of the program // The intellectual property
rights to the program

3(b)(ii) 1 mark per bullet point 2

• She does not wish to release the source code


• She does not want anyone to be able to edit / modify / share the source
code/program
• She wants to make money from the program
Question Answer Marks

3(b)(iii) 1 mark for a name and a description of each licence to max 2 2

Commercial Software
• The program is purchased for a fee
• It restricts the number of users/possible time period for use // Limited
number of installations allowed // Software key needed to install
• Source code not provided // source code protected / cannot be edited
• Anyone can purchase/download if agree to the terms

Shareware
• The program is free for a trial period // The (free) program may have
limited functionality // Need to purchase / enter details after trial
• Users do not have access to the source code // source code may not be
edited
• Users may re-distribute the software.

Freeware
• There is no charge for the software
• The software could still be copyrighted
• She can set her own restrictions on what a user can do with the
program

4 Any four from:

• User needs high-speed broadband (connection)


• Data is streamed to a buffer (in the computer)
• Buffering stops video pausing as bits streamed
• As buffer is emptied, it fills up again so that viewing is continuous
• Actual playback is (a few seconds) behind the time the data is received by computer [4]
5 (a) (i) One mark for each correct gate.

T X

[4]

(ii) ( R.T ) + (T .W ) // (R AND NOT T) OR (T AND NOT W) [2]

(iii) One mark for each pair of lines as shaded.

INPUT Working space


OUTPUT
X
R T W

0 0 0 0

0 0 1 0

0 1 1

0 1 0

1 0 0 1

1 0 1 1

1 1 1

1 1 0
[4]
6 Four from:

Bitmap is made up of pixels


// Vector graphic store a set of instructions about how to draw the shape

Bitmap files are usually bigger than vector graphics files // Take up more memory space

Enlarging a bitmap can mean the image is pixelated


// vector graphic can be enlarged without the image becoming pixelated

Bitmap images can be compressed (with significant reduction in file size)


// Vector graphic images do not compress well

Bitmaps are suitable for photographs / scanned images


// Vector graphics are suitable for more geometric shapes

Bitmap graphics use less processing power than vector graphics

Individual elements of a bitmap cannot be grouped


// Individual elements of a vector graphic can be grouped

• Vector graphics need to be ‘rasterised’ in order to display or print [4]

Question Answer Marks

7(a)(i) 1 mark for any valid example 1

e.g. 192.168.0.1

7(a)(ii) 1 mark for correct answer 1

The number of IP addresses needed will exceed the number available using
IPv4.

7(a)(iii) 1 mark per bullet point to max 2 2

• Too many digits per group


• Too many groups of digits
• The address is more than 32 bits / 4 bytes
• Colons are used as separators

7(b)(i) 1 mark per bullet point to max 2 2

• The PSTN consists of many different types of communication lines


• Data is transmitted in both directions at the same time // (full) duplex
data transmission
• The communication passes through different switching centres

7b)(ii) 1 mark for benefit, 1 mark for drawback 2

Benefit
• (Probably) faster connection / communication / transmission of data
• (Usually) more consistent transmission speed
• Improved security

Drawback
• Expensive to set-up / maintain
• Disruption to the dedicated line would leave no alternative
Question Answer Marks

7c) 1 mark per bullet point to max 4, max 3 for router, max 3 for gateway 4
Only award the repeated bullet points (1 to 5 in each section) once

Router:
• Connects two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for.
• Receives packets and forwards towards the destination
• using the IP address of the destination
• Assigns private IP addresses
• Operates between similar networks // networks using the same protocol
• Can be used to segment a network

Gateway:
• Connect two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for
• Receives packets and send packets towards the destination
• using the IP address of the destination
• Assigns private IP addresses
• Connects two dissimilar networks // networks that use different
protocols

You might also like