9618/11 Paper 1 – May/June 2024

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Identify two characteristics of an embedded system.

  • Only performs specific tasks (motion detection, video recording, ringing).

  • CPU, memory, storage, and software are dedicated to just this task.
    (Also acceptable: Built-in motion sensor and camera; uses a microprocessor for limited tasks.)

2
New cards

Complete the table about solid state memory (flash):

  • Logic gates:

  • Transistors per cell:

  • Gate that retains charge without power:

  • Gate that allows/stops current:

  • Logic gates: NAND, NOR

  • Transistors per cell: 2

  • Gate that retains charge without power: floating

  • Gate that allows/stops current: control

3
New cards

How does the buffer help in the video doorbell?

  • Stores data (e.g., video) before sending to smartphone or saving.

  • Holds motion sensor readings until processor is ready.

  • Used to rewind recent video or manage temporary data flow.

4
New cards

How does increasing the sampling rate affect performance?

  • More data to transmit = slower delivery to smartphone.

  • Storage fills up faster = fewer videos can be stored.

  • Videos may be overwritten more frequently.

5
New cards

What is meant by bit streaming?

Continuous, ordered flow of bits over a communication path.

6
New cards

Give two differences between real-time and on-demand bit streaming.

  • Real-time = live/direct from source; on-demand = pre-recorded.

  • Real-time = cannot pause/replay; on-demand = can pause, rewind, and play later.

7
New cards

Why is an interpreter better for debugging than a compiler?

  • Interpreter stops at each error.

  • Errors can be fixed one at a time, and results seen instantly.

8
New cards

Why is a compiler better for releasing the finished program?

  • Compiled code runs without source, so it cannot be edited/stolen.

  • No need for end users to install a translator.

  • Faster execution without re-translation.

9
New cards

In a client-server model, describe the roles of the client and server devices.

  • Server: Receives and processes client requests.

  • Client: Sends requests to the server, waits for the server to respond, and outputs the response.

10
New cards

Describe how a parity check can be used to verify data transmitted from one computer to another.

  • Both systems agree on odd or even parity.

  • Data is split into 7-bit groups.

  • If using odd parity and a group has an even number of 1s, a parity bit of 1 is added (else 0).

  • A block check counts the number of 1s in each bit column.

  • A parity byte is added to ensure each column matches the agreed parity.

11
New cards

Explain how a firewall can help protect a network.

  • Monitors all incoming and outgoing transmissions.

  • Compares them against set rules, whitelists, or blacklists.

  • Blocks data not meeting the rules, including data from specific ports or unauthorised software.

12
New cards

How is artificial intelligence used in facial recognition for biometric authentication?

  • Captures an image of the user’s face.

  • Uses image recognition trained on many samples.

  • Identifies facial features in the image.

  • Analyses the image and compares with stored patterns using probability of a match

13
New cards

Define the following DBMS features: Data dictionary and Logical schema

Data dictionary: Metadata about the database, e.g., field names, data types, validation rules, keys, relationships.

Logical schema: Conceptual overview of the database structure; database-independent; defines entities and relationships.

14
New cards

Why does a router connecting to the internet need a public IP address?

So that it is visible and accessible by other devices on the internet.

15
New cards

Enter the topology/ies for each network statement:

All devices connect to one central device

All devices connect to a central cable

Multiple paths for the packets to travel

Robust against line failure

Most likely to lose data through collisions

Bus : All devices connect to a central cable

Star: All devices connect to one central device, Robust against line failure

Mesh: Multiple paths for the packets to travel, Robust against line failure

16
New cards

Identify two other differences between IPv4 and IPv6 (besides separators).

IPv4 has 4 groups of digits whilst IPv6 has 8 groups

IPv4 is usually represented in denary whilst IPv6 is usually represented in hexadecimal

IPv4 groups are between 0 and 255 whilst IPv6 is between 0 and FFFF

IPv4 is 32 bits whilst IPv6 is 128 bits

17
New cards

What is lossy compression, and give one method used to achieve it?

  • Lossy compression permanently removes unnecessary or less important data to reduce file size.

  • Original file cannot be fully restored after compression.

  • Commonly used for multimedia files (e.g. images, audio, video).

Method:

  • Perceptual coding: Removes sounds or image details that are unlikely to be noticed by the human ear or eye.
    Example: MP3 audio compression removes frequencies outside human hearing range.

18
New cards

Explain how JPEG compression reduces the file size of an image

  • JPEG uses lossy compression.

  • It removes data that is less important to human perception.

  • Similar colours in neighbouring pixels are stored as a single colour.

  • Fine detail may be lost when colours or edges are simplified.

  • Reduces the number of bits used to store the image.