Professional Documents
Culture Documents
Paper 1 - Sample - MS
Paper 1 - Sample - MS
b i) 0 0 0 0 1 1 1 0
ii) 14 iii) 112 ÷ 2 3 = 14 → result from shifting is correct.
c i) 128 64 32 16 8 4 2 1
1 1 1 1 0 0 1 0
ii) −14 iii) F 2
2 a i) Universal serial bus; standard connection used to connect devices to a computer.
ii) Any three from:
– USB-C is a 24-pin symmetrical connection.
– USB-C is much thinner cable than USB-A.
– USB-C offers 100W power connectivity (allowing full-sized devices to be charged).
– USB-C has better connectivity (up to 10Gbps) and can support 4K video.
3 a i) W
hen entering numerical data into a computer, – Memory data register (MDR)
thus ensuring no errors following entry. – Program counter (PC)
ii) Any three from: b Buses:
– incorrect digit entered (for example, 5327 – System buses are parallel transmission channels.
instead of 5307)
– Each channel transmits one bit at a time.
– transposition error where two digits have
– Address bus carries addresses throughout
changed place (for example, 5037 instead
computer system.
of 5307)
– Data bus carries data between CPU, memory
– omitted or extra digits (for example, 537 or
and I/O devices.
53107 instead of 5307)
– Control bus carries signals from control unit to
– phonetic errors (for example 13 (thirteen)
It is illegal to photocopy this page
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 185
318489_Ans_Paper_1A_185-187.indd Page 186 12/07/22 1:48 PM F-0250 /145/HO02580/work/indd
– MDR stores data that has just been read from – The user will be sent to any websites
memory or data that is about to be written to automatically or information will show on
memory. phone/tablet screen.
– PC stores the address where the next c Any one from
instruction to be read can be found. Advantages:
c Cores are made up of ALU, control unit and – Possible to hold large amounts of information.
registers; quad core processors are made up of – Fewer errors since QR codes contain built-in
four cores and each core communicates with the error detection methods.
other three cores using 6 channels: – Easier to read than barcodes (doesn’t need
Core 1 Core 2 expensive laser/led scanners).
– QR code can be encrypted which gives greater
security protection.
(6 channels) Disadvantages:
– More than one QR code format exists.
– Anyone can generate QR codes (software
Core 3 Core 4 readily/freely available).
5 a R codes are a type of barcode which use a matrix
Q – QR code can contain malicious codes and/or
of dark squares on a light background, rather than fake website addresses (called attagging).
dark and light lines of varying thickness. There are 6 a i) P
ixel array is a matrix of tiny sensors which
three large squares at the corners – these are used make up a CCD; colour depth is the number of
to align the QR code when being read by a camera. bits used to represent the colour of each pixel.
b – Passenger points camera on a phone/tablet at ii) No. of pixels = 2048 x 1536 = 3 145 728 bits
the QR code.
x colour depth = 24 x 3 145 728 = 75 497 472 bits
– The image of the QR code is stored on the
÷ 8 to get no. of bytes = 75 497 472/8 = 9 437
phone/tablet.
184 bytes
– A QR app will now process the camera image
÷ (1024 x 1024 x 1024) = 0.00878906 GiBytes
converting dark squares into binary data.
Maximum no. of photos = 64/0.00878906 = 7281
– Browser software on the phone/tablet
photos
automatically reads the data generated by
the app and also decodes any web addresses b Using RLE (lossless compression) the logo
contained within the QR code. code becomes:
The original 10 x 6 logo would need 60 bytes of printing is taking place; once a buffer is empty it
storage; using RLE this reduces to 46 bytes – a needs to be refilled – this process continues until
reduction of about 23%. all data has been printed out.
c Lossy: the original file cannot be reformed once b When the buffer is empty, the printer sends an
the compression algorithm has been performed. interrupt to the CPU requesting more data; the
Lossless: it is possible to get the original file back CPU suspends its present task (and stores the
again after compression has taken place. data) and checks the interrupt priority before
servicing the interrupt; this procedure occurs
7 a uffers are used to hold data temporarily; they
B
each time the buffer is emptied until no more data
allow the CPU to carry on with other tasks while
remains to be printed.
It is illegal to photocopy this page
186 Cambridge IGCSE™ and O Level Computer Science Study and Revision Guide Second Edition
318489_Ans_Paper_1A_185-187.indd Page 187 12/07/22 1:48 PM F-0250 /145/HO02580/work/indd
b i) Embedded systems are a combination of – The mobile phone number or email address
hardware and software designed to carry out have already been registered with the
a specific function; the hardware is electronic, website being used.
electrical or electro-mechanical. – The user now enters the 8-digit code (OTP)
ii) Temperature sensor into the website giving them authorised
iii) Accelerometer/tilt sensor (e.g. mercury access.
switch) ii) They allow for patches that update software
iv) – Temperature sensor and tilt sensor security, patches that improve software
constantly send data to a microprocessor. performance/features.
– Data goes through an ADC to ensure 10 a Automated system
it is digital before being sent to the b Robot
microprocessor; the microprocessor c Controller
checks the temperature.
d Autonomous
– If temperature >= 4, then a signal is sent to
e Artificial intelligence
an actuator to start the air con compressor.
f Expert system
– If temperature < 4, then a signal is sent to
an actuator to stop the air con compressor. g Machine learning
– Microprocessor checks data from 11
Program that supplies static or
accelerometer/tilt sensor. moving images on a monitor
Virtual memory
– If tilt value > 20 then the microprocessor when a computer has been left
sends a signal to operate an alarm. idle for a period of time.
Hodder & Stoughton Limited © David Watson and Helen Williams 2022 187