You are on page 1of 9

Answers

Here you will find the answers to the ‘Check Hardware (page 7)
your understanding’ questions and the ‘Now test
yourself’ exercises in the book. 1 Device Reason
Keyboard Typing in data to a computer
Unit 1 Scanner Copying documents
Foot mouse Useful for someone who cannot
Hardware (page 3) move their arms
1 Any five from Microphone Entering sounds into the
• printer computer
• central processing unit (CPU)
• soundcard 2 Device Input Output
• motherboard
Keyboard ¸
• graphics processing unit (GPU)
• scanner Scanner ¸
• storage units (primary and secondary) Foot mouse ¸
• mouse, roller ball, touch pad
• sip-puff tube, foot mouse, eye-typer Printer ¸
• microphone Roller ball ¸
• monitor
• speaker. Monitor ¸
2 • Von Neumann model 3 a) RAM is volatile
• Harvard model
3 Hardware (page 9)
CIR Current Instruction Register
MAR Memory Address Register 1 1024
ACC Accumulator 2 One character
3 It helps speed up processing when applications
PC Program Counter
are using 3D graphics and video animation.
Hardware (page 5) 4 Any one from
• mobile phones
1 • video game consoles
CU Decode ALU • digital cameras
• DVD players
• GPS
• microwave ovens.
te
cu
Fet

Exe

There are many other answers. If you are not


ch

sure that your answer is correct, check with your


RAM teacher.

Now test yourself (page 9)


2 • RISC processors can process a limited number
of relatively simple instructions. 1 a) The graphics processor unit (GPU) is a
• CISC processors can process a large number specialised chip and circuit board which
of complex instructions. helps processing when applications are
3 Any three from using 3D graphics and video animation. The
• clock speed GPU renders the images, animations and
• using multiple cores video for the computer screen. It helps make
• efficient programming the images appearing on screen faster and
• number of applications running smoother to give the best experience in games
• amount of RAM. and movies.

1 My Revisions Notes: WJEC and Eduqas GCSE Computer Science


b) An embedded system is a combination of 2
Alarm truth table
Answers

software and hardware created for a specific


purpose. A PC is a general-purpose machine A B A AND B C D
designed to carry out multiple tasks. Embedded 0 0 0 0 0
systems are made for a specific use and are
0 0 0 1 1
often mass produced. They consist of a program
on ROM or flash disk running a simple machine. 0 1 0 0 0
2 a) 1 KB is 1024 bytes 0 1 0 1 1
2 KB is 2 × 1024 = 2048 bytes 1 0 0 0 0
If one character is one byte, then 2048 is the 1 0 0 1 1
number of characters.
1 1 1 0 1
b) i) CD ROMs usually have a storage capacity of
1 1 1 1 1
around 700 MB. 8 GB is 8192 MB and so the
CD ROM would not have enough memory.
Logical operations (page 14)
ii) One from
• DVD 1 C = B + (A . B) + A
• Blu-ray 2
• hard drive. True False
Logical operations (page 11) A.1=1 ¸
A+A=A ¸
1 AND 1 =1
(X . Y) + (X . Z) = X . (Y + Z) ¸
NOT 0 =1
1=A+0 ¸
1 XOR 1 =0
0 OR 0 =0 Now test yourself (page 14)
1
Logical operations (page 12) A B Ā Ā + B B . (Ā + B)
1 Step 1 0 0 1 1 0
0 1 1 1 1
Alarm possibilities – alarm is on
1 0 0 0 0
Window open Door open Result
1 1 0 1 1
NO NO No Alarm
NO YES Alarm It can be seen from the table that the last column
YES NO Alarm is the same as the B column.
Therefore B . (A + B) = B
YES YES Alarm
2 A + (B + C)
Step 2 3 A B C
Alarm possibilities – alarm is on 0 0 0
Window open Door open Result 0 1 1
0 0 0 1 0 1
0 1 1 0 1 0
1 0 1
1 1 1 Communication (page 18)
1 Any three from
Step 3 • bus
Alarm table • mesh
• ring
A B C • star.
0 0 0 2 Ask your teacher or the network manager if you
0 1 1 have one in your school.
1 0 1 3 Any three from:
This can be simplified to • Hardware can be shared (e.g. several
1 1 1 A OR B = C computers can use the same printer).

2 My Revisions Notes: WJEC and Eduqas GCSE Computer Science


• Software can be shared (e.g. a number of b) • Bus
Answers

workstations can all load up the same program • Ring


from a file server). 2 a) • Physical layer
• Data can be shared (e.g. a number of • Data link layer
computers can access the same database • Network layer
stored on a file server). • Transport layer
• Computers may communicate between each • Application layer
other with messages or email. b) Any three from:
• Administration is centralised. • If changes are made to one layer, the
• Users can log into any networked device. impact on the other layers is minimised.
• Protocol designers can work on a layer
Communication (page 20) without worrying about how any new
Hardware Purpose implementations may affect other layers.
• It reduces a complex problem into several
Router Forwards packets of data along
smaller parts, making understanding the
a network. Often used where two
actions of each layer easier.
networks are connected. Determines
• It makes troubleshooting easier to carry
best path for the packets.
out as only the layer causing the problem
Hub A connection point between cables in needs working on.
a network. • It helps those developing products to make
Switch Filters and forwards data packets to sure their product works with the other
intended destination. layers.
Bridge Connects one LAN to another. 3 • The address of its destination, so the packet
knows where to go
Gateway Connects a LAN to a WAN such as • Information about how many packets there are
the internet. in the message, so the receiver knows when
the message is complete
Communication (page 22) • Information explaining where the packet fits
1 Another way to revise this is to ask a friend to test you. into the message
2 • Physical layer Organisation and structure of data
• Data link layer
• Network layer
(page 27, top)
• Transport layer
• Application layer Denary Binary Hexadecimal
3 A protocol is a set of rules to help communication 142 10001110 8E
between computers so that different electronic 156 10011100 9C
devices can understand each other.
174 10101110 AE
4 One device asks if they can communicate and the
other device says, ‘go ahead’. 161 10100001 A1
2989 101110101101 BAD
Now test yourself (page 23)
122 1111010 7A
1 a) i) Star
Organisation and structure of data
(page 27, bottom)

128 64 32 16 8 4 2 1 Denary
0 0 1 1 0 1 0 0 52
0 0 0 1 1 0 1 0 26
ii) Mesh 0 0 0 0 1 1 0 1 13

Organisation and structure of data


(page 28)
1 00110010
2 11000110

3 My Revisions Notes: WJEC and Eduqas GCSE Computer Science


Organisation and structure of data Now test yourself (page 38)
Answers

(page 29) 1 Provides


• windows – a rectangular area of the screen in
Try different types of files such as images, sound which an application runs
and text and see the surprising metadata that is • icons – small pictures on the screen to help
available. If you cannot find any then check with your identify the program or shortcut
teacher that you are doing the search correctly. • menus – where lists of options are displayed
Now test yourself (page 33) • pointers – an image moved across the screen
by a mouse.
1 2 Task True False
Data Sample Validation Spellchecking ¸
Field type data check Managing the printer ¸
First name String John Presence
Dealing with errors ¸
check
Sorting records ¸
Last name String Evans Presence
check Setting tabs ¸
Form String 3F Lookup Handling the storage of data ¸
check Managing emails ¸
House String Cardiff Lookup Organising resources ¸
check
Gender Boolean Male Lookup 3 • Compression software reduces the sizes
check of files for storage or transmission and
Number of Integer 2 Range decompresses compressed files to restore
siblings in school check them to ordinary use.
• Defragmentation software rearranges the data
2 Raster graphics are made up of pixels (dots), on a disc to make it more efficient by identifying
where each pixel has a position and a colour. Vector where gaps begin to appear as files are added
graphics consist of equations that describe the and deleted on a disk and by moving the parts
relative distance of a point from the point of origin. of files around so as to make the sections of a
Raster graphics cannot be scaled up without a loss of file contiguous as sometimes there is no space
quality. This is known as pixellation. Vector graphics big enough on the disk to hold it.
can be enlarged to any size without any loss in quality. 4 An operating system will manage
• peripherals, such as keyboards, mice, printers,
System software (page 36) monitors and other input or output devices
1 A command line interface is designed to allow attached to the computer
a user to type in commands at a prompt. • printing and scanning, using spooling
The operating system will then execute that • storage devices, such as disc drives, DVDs and
command. A graphical user interface is an flash memory
intuitive interface. It is a user-friendly system, • immediate access stores, such as RAM and
meaning that most people are able to operate the ROM
system without too much training, whereas with • utility programs, such as disk defragmenters
the CLI they must learn the commands. • all the processes currently taking place in the
computer
2 What did you see? Were you surprised? If you did • security of the computer against virus attacks,
not have success with this task ask the teacher to for instance.
help.
5 • The operating system helps the user by hiding
3 Did you notice the different shapes? If you are not the complexities of hardware from the user.
sure why the shapes change talk about it with • It manages the hardware resources including
your teacher. the processors, memory, data storage and
System software (page 37) input and output devices.
• It shares the input and between many
Always ask the teacher if there is something you programs using the CPU.
see that you do not understand. • With the help of anti-virus programs, it works
to keep the computer safe.

4 My Revisions Notes: WJEC and Eduqas GCSE Computer Science


• With the help of utility programs, it allows you • Linking errors – may occur if a compiled
Answers

to keep the computer running smoothly by, for program is linked to library routines that
instance, defragmenting the hard drive. do not exist.
• Run-time errors – occur when the program
Principles of programming (page 41) is being run. For example, a program is
asked to display the price of an item but
High-level Low-level that item cannot be found.
B A b) i) Lexical analysis – All comments and
spaces are removed, keywords are
E C
replaced by ‘tokens’ and a symbol table
F D is created which holds the addresses of
variables, labels and subroutines.
Now test yourself (page 41) ii) Syntax analysis – Each statement is checked
against the rules of syntax for the assembler,
1 a) Both are low-level languages, but machine
such as spelling or grammar, and that the
code uses pure binary numbers while
sequence of characters, symbols, items or
assembly code uses mnemonics.
tokens obey the rules of syntax.
b) Java is an example of a high-level language.
Programmers prefer to use high-level languages iii) Semantic analysis – Checking that the
because they are generally easier to use and statements, structure and data types obey
understand than low-level languages. They are the rules of the compiler and making sure
problem orientated, which facilitates creating that variables used in the program have
programs for a particular use or problem. been declared.
They tend to have built-in functions and single iv) Code generation – Generating the machine
commands that can carry out complex tasks. code.
They are like natural spoken languages and v) Optimisation – Attempting to reduce the
it is possible to use meaningful and complex execution time of the object program.
variable names.
c) A compiler translates a complete program
Now test yourself (page 43) written in a high-level language, known as
the source code, into machine code in one go
1 a) Three from: without stopping.
• Trace – prints out or displays the order in The advantages of a compiler are that
which the lines of a program are executed, • a compiled program runs faster than an
and possibly the values of variables as the interpreted program
program is being run. • it checks all lines of coding whereas an
• Break point – interrupts a program at a interpreter only checks the one being
specific line allowing the programmer to executed.
check the current value of a variable.
The disadvantages are that
• Variable watch – also displays the current
• you only see the errors at the end, making
value of any variable.
the program harder to debug
• Single stepping – allows the program code
• the process takes a long time as the whole
to be executed one line at a time
program has to be recompiled every time
• Store dump – displays the contents of all
an error is corrected.
the stores used in the program.
• Memory inspector – displays the contents Security and data management (page 49)
of all the stores in a defined section of
memory. 1 A strong password contains a mixture of upper
• Error diagnostics – displays error and lowercase letters, digits and special symbols,
messages to help the programmer is changed regularly, is not related to any
diagnose what has gone wrong. personal details like dates of birth or pet names
b) Your IDE will almost certainly have some or all and is never revealed to anyone.
of the tools mentioned in part (a) above. Well original file size
2 Compression ratio =
done for programming using an IDE! compressed file size

Now test yourself (page 46) The compression ratio is 7:1 which means that
the original file is seven times bigger than the
1 a) Two from: compressed one.
• Syntax errors – occur when the program 50 × 7 = 350
is being compiled, such as by not closing
brackets. The original file was 350 KB.

5 My Revisions Notes: WJEC and Eduqas GCSE Computer Science


Now test yourself (page 51) • Digital devices are making it easier to monitor
Answers

what people are doing using CCTV cameras,


1 a) The original bit depth is reduced to remove monitoring phone calls, emails and text
data and reduce the file size. This means, for messages.
instance, in an MP3 file the number of bits • People use ‘electronic money’ more and real
representing the sounds is reduced but not money less, such as credit and debit cards,
enough to fool the human ear. This will make Apple Pay and online payments. Some banks
the file size smaller. do not even have branches.
original file size • Mobile phone signals and debit and credit card
b) Compression ratio =
compressed file size use can be used to track our movements.
= 640 • We use apps like Facebook, YouTube, Twitter and
other social media to record events in our lives.
   64
We use message services to communicate.
= 10:1 This means we spend more time talking on our
2 a) • Hacking, where data may be deliberately computers than we do face to face.
changed, stolen or deleted by unauthorised • We are becoming less fit because many of the
people. This can be prevented by using games we play are played sitting down.
strong passwords, incorporating a firewall
and making sure that physical security of Ethical, legal and environmental
the system is good. impacts (page 56)
• A computer virus may affect the data
or running of the computer. This can be 1 Four from
prevented by using up-to-date anti-virus • people concerned with national security such
software. as GCHQ
• police for the detection of crime
b) Dangers can arise from the fact that all files are
• scientists or historians carrying out scientific
held on a central fileserver which is vulnerable to
or historical research
hacking. To keep the data safe precautions must
• companies processing wages, pensions or tax
be taken, such as setting access rights to files,
• people at home where data is used privately for
choosing strong passwords that are changed
household or recreational reasons.
regularly and installing anti-virus software that
is kept up to date and used constantly. 2 This Act allows the public to access information
held by public authorities such as government
A network administrator or manager is
departments, local authorities and the NHS. By
employed to make sure these precautions are
making authorities publish certain information
initiated and obeyed.
about their activities, including printed
A firewall, software that will block unexpected documents, computer files, letters, emails,
connections coming in to the network, is used. photographs and sound or video recordings, it
The network manager will make sure that allows members of the public to check that public
rules are in place to make sure that user IDs authorities have nothing to hide.
are legitimate, belong to members of the 3 Sensitive personal data is data that a member of
school and that passwords are strong. the public may not wish to be widely known since
The network manager will also provide secure it is private to them. If this data was widely known
backups of the data held and also produce and it could interfere with things like getting a job or
manage disaster recovery policies getting insurance. Sensitive data includes
• racial or ethnic origin
Ethical, legal and environmental • religious or philosophical beliefs
impacts (page 54) • political opinions
• trade union membership
1 • Programmers are needed to create apps, • health
webpages or other programs. • genetic or biometric data
• Network managers are needed to manage • sex life or sexual orientation.
networks in organisations.
• Computer technicians are needed to keep Now test yourself (page 57)
computers running and updated.
• Designers, CAD workers, publishers and any 1 a) Any two from the list below.
other jobs which involve using computers at work. The Computer Misuse Act (1990) is a law that
2 • More people are working from home, saving on makes it illegal to:
the expenditure of fuel and travel time. • Gain unauthorised access to files stored on
• There is more time for leisure, travel and a computer system, including viewing and
shopping. copying the files.

6 My Revisions Notes: WJEC and Eduqas GCSE Computer Science


• Gain unauthorised access to files and use 2 y=8
Answers

them for criminal activities such as fraud 3


or blackmail. Start
• Change or delete any files unless
authorised to do so – this includes creating
or planting viruses. x=3
b) Three items of personal data that an
organisation cannot disclose without
permission from the list below
y = x − 1.5
• racial or ethnic origin
• religious or philosophical beliefs
• political opinions
• trade union membership y
• health
• genetic or biometric data
• sex life or sexual orientation. Stop
Three instances when exceptions can be made
from the list below
• national security
Algorithms and programming
• detection of crime constructs (page 74)
• scientific or historical research
1 Data Type of test data
• processing wages, pensions or tax
• data used privately at home for household 100 extreme
or recreational reasons. 73 normal
1 extreme
Unit 2 209 abnormal

Problem solving (page 62) 2 a) c t y output


0 0 0
Description Term
1 4 4
Notes written by the decomposition
programmer 2 10 6
Splitting a complex abstraction 3 12 2
problem into 4 19 7
smaller parts
0 4.75
A self-contained module
subroutine b) To find the average of the first four numbers in
A way of passing interface the list of inputs.
data to a subroutine Now test yourself (page 74)
Stripping away documentation
redundant 1 a) i)
information txt is string
welcome is string
welcome = “Hello from Wales”
Algorithms and programming txt = “Have a great holiday”
constructs (pages 67–68) length = len(welcome)
output length
1 AA input
A
A output welcome + txt
x =xx 3
=3
=3
ii)
txt is string
B
BB
B process welcome is string
y =yy x= x+5
=+x 5
+5 welcome = “Hello from Wales”
txt = “Have a great holiday”
CC
C output length = len(welcome)
C
y yy output length
output mid(welcome,7,4)

7 My Revisions Notes: WJEC and Eduqas GCSE Computer Science


b) Answer in pseudo code:
4 3 8 9
Answers

set maximum = 0
set minimum = 0 Compare 8 and 9.
output “Please type in a number: “
No swap necessary. 8 and 9 are now in position
input y
maximum = y Start from the beginning again
minimum = y
4 3 8 9
while y <> 0
if y > maximum 4 is larger than 3 so swap.
maximum = y
end if 3 4 8 9
if y < minimum
minimum =y 4 is less than 8 so no swap
end if
output “Please type in a number: “
3 4 8 9
input y 8 is less than 9 so no swap
end while
All numbers are now in the correct order.
output “Minimum is “,minimum,” and
“,”Maximum is “,maximum b) 8 4 9 3 8 5 7 3
Python answer: Choose the middle number and compare it
maximum = 0 with 4. (Because there are an even number of
minimum = 0 numbers, we take the one nearest the middle.)
y = int(input(“Type in a number: “))
4 is less than 8 so discard the 8 and everything
maximum = y
to the right.
minimum = y
while y != 0: 8 4 9 3
if y > maximum:
maximum = y Choose the middle number and compare it
if y < minimum: with 4.
minimum =y 4 is less than 9 so discard the 9 and everything
y = int(input(“Type in a number: “)) to the right.
if y == 0:
break 8 4
print( “Minimum is “,minimum,” and
“,”Maximum is “,maximum) 4 is the correct number and so we can stop.
2 a) 8 4 9 3 Programming languages (page 78)
Compare 8 and 4.
8 is larger than 4 so they swap places. Mnemonic code Description of action

4 8 9 3 INP Input a number


STA Reg1 Store the number in Reg1
Compare 8 and 9.
INP Input a number
9 is larger than 8 so no swap.
STA Reg2 Store the number in Reg2
4 8 9 3
LDA Reg1 Load the accumulator with Reg1
Compare 9 and 3.
SUB Reg2 Subtract Reg2
9 is larger than 3 so they swap places.
OUT Output the result
4 8 3 9 HLT Stop
The largest number is now in position
Start from the beginning again Now test yourself (page 81)
4 8 3 9 1
<center> </center>
Compare 4 and 8, no swap necessary.
<title> </title>
4 8 3 9 <a href = “mailto:isla@email.co.uk”>
Send mail to Isla</a>
8 is greater than 3 so swap.

8 My Revisions Notes: WJEC and Eduqas GCSE Computer Science


2 • Inheritance allows a class to use the properties
Answers

and methods of an existing class. A class Dog


Mnemonic code Description could have a function named tailwagging().
INP Input the first number If the Dog class has an object called
LabradorDog, it can use the tailwagging()
STA Num1 Store it in store Num1
because it has inherited it.
INP Input the second number
STA Num2 Store it in store Num2 Data structures and data types (page 82)
INP Input the third number 1
STA Num3 Store it in store Num3 integer real Boolean character string
LDA Num1 Load the accumulator with Num1 3 45.3 TRUE + “Well I never”
ADD Num2 Add Num2 to the accumulator −3 −4.0 FALSE T %%^$
ADD Num3 Add Num3 to the accumulator
2 A local variable is only recognised in the
OUT Output the result
subroutine in which it has been declared but
HLT Stop a global variable is recognised throughout the
program. This is known as the lifetime of the
3 • A class is a plan or template for creating variable.
objects within a program. Functions and data
can be grouped and placed in a class container 3
so that they can be easily accessed.
A declaration lownum is real
• An object can get its variables and functions
from a class. So if we have a class of An array numarray[999]
Dog, objects such as type of Dog called A loop while lownum <= highnum
LabradorDog can be created using the
A real variable mid
template of class and using all the functions
available in class Dog. A comparison if X < numarray[mid] then
• A method is used to implement a behaviour. An assignment set highnum to array length − 1
One class can contain many methods such as
running, begging or tailwagging.

9 My Revisions Notes: WJEC and Eduqas GCSE Computer Science

You might also like