CoSCi 2023 Past Paper THEORY

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

An office building has desktop computers connected in a network.

One reason for networking computers is to enable technicians to maintain

them remotely.

State two other reasons for connecting computers in a network

  • Access the Internet

  • Allow data/files/information to be shared

  • Provide communication (email, social media, online meeting, chat)

  • Provide collaboration (editing online docs)

2
New cards

Access to data must be controlled.

Identify one reason that encryption is used.

A To compress the file so it takes up less storage space

B To make sure both sender and receiver use the same key

C To make sure data is only understood by the intended receiver

D To stop malicious hackers getting into a computer network

The correct answer is C

A is not correct because compression does not encrypt a file

B is not correct because encryption does not ensure both sides use the same key

D is not correct because encryption does not stop hackers accessing a network

3
New cards

File servers are in a small room at the back of an office.

The office has a burglar alarm.

Give two other ways that the servers can be secured using physical methods

  • Lock on doors

  • Biometrics/ key cards

  • Security guards

  • Surveillance cameras

4
New cards

Phishing is a type of social engineering.

State what is meant by the term social engineering

manipulation technique that exploits/relies on human behaviour to trick people to reveal sensitive information

5
New cards

5G is a communication standard.

Identify the characteristic that is true for the 5G communication standard.

A It has a high transmission latency

B It has built-in security

C It has a lower bandwidth than 3G and 4G

D It uses wireless communication

The correct answer is D

A is not correct because 5G does not have a high transmission latency

B is not correct because a 5G does not have built-in security

C is not correct because 5G does not have a lower bandwidth than 3G and 4G

6
New cards

Programmers write and test code.

They use modular testing.

State what is meant by the term modular testing

Testing each block of code/subprogram/function independently (as it is written/finished)

7
New cards

Computer scientists are viewed as professionals, in the same way that doctors are

viewed as professionals.

Give two ways that computer scientists can demonstrate professionalism.

  • Behave in ethical/legal/moral ways

  • Attend computer science related conferences/gatherings

  • Stay up to date with changes in the field/read up-to-date publications

  • Avoid bias when making design choices

8
New cards

Complete the table by adding the hexadecimal notation for each of the denary values.

8 = ?

12 = ?

8 = 8

12 = C

9
New cards

Identify the expression to give the number of unique binary patterns that can be stored in six bits.

A

B 6 × 2

C 6² – 1

D 2^6

The correct answer is D

A is not correct because 6² stores 36 patterns, not 64 patterns

B is not correct because 6 × 2 stores 12 patterns, not 64 patterns

C is not correct because 6² – 1 stores 35 patterns, not 64 patterns

10
New cards

Give the result of applying a logical shift right by two to the binary pattern

01011100

00010111

11
New cards

Give the result of applying an arithmetic shift right by three to the binary

pattern 11000101

11111000

12
New cards

Binary patterns can be interpreted as signed or unsigned integers.

Convert the denary unsigned integer 60 to 8-bit binary.

00111100

13
New cards

Here is a binary bit pattern for a signed integer in sign and magnitude format.

10010110

Convert the binary bit pattern to denary.

Be sure to include a sign symbol in your answer.

  • Negative sign

  • 22

-22

14
New cards

Negating a signed integer means changing its sign without changing

its value.

The negation of +16 is –16. The negation of –24 is +24.

Here is the binary bit pattern for a signed integer in two’s complement format.

11100101

Convert the binary pattern to its negation in two’s complement.

00011011

15
New cards

Construct an expression to convert 13 kilobytes to kibibytes.

1. 13 x 1000 // 13000 in the numerator (1)

2. 1024 in the denominator (1)

Examples:

13 × 1000 /1024

13000 / 1024

13 × 500 / 512

13 × 250 / 256

13 × 125 / 128

13 × 10^3 / 2^10

16
New cards

Software programs carry out tasks on computers.

A headteacher uses a computer simulation to model the effect of increasing class sizes.

Explain one problem with using simulations to predict the effects of changes.

  • If the data is incomplete/inaccurate the answers from the model might not be right

  • If the assumptions the model is based on are inaccurate the answers from the model might be incomplete/inaccurate

17
New cards

Images are stored as files before being displayed or printed.

Give one measurement of image resolution.

  • Pixels per inch/ppi

  • Pixels per centimetre/ppc

  • Dots per inch/dpi

18
New cards

Increasing the colour depth of an image leads to an increase in the image file size.

Describe the reason for the increase in file size.

Each pixel/colour in the image will require more bits to store

19
New cards

Software is divided into two categories.

Describe one difference between system software and application software.

System software is used to maintain/run the operation of the system/hardware whereas application software allows the user to carry out a task

20
New cards
term image
knowt flashcard image
21
New cards

Here is part of a file that contains electric meter readings.

04631 04984 05103 05163 05271 05383 05487 05722

Explain the effect on the file of applying a run-length encoding algorithm to this data file.

The file size will not be decreased/will increase because there are very few/no repeating patterns / because a run length of one would be added to each digit

22
New cards

What is the correct programming language translator for

this task:

A guessing game that can be used on

different computing platforms

Interpreter

23
New cards

What is the correct programming language translator for

this task:

A screen driver for a new

smartphone

Assembler

24
New cards

A new version of a spreadsheet

program for sale next year

Compiler

25
New cards

Control software for an embedded system inside a new washing machine

Assembler

26
New cards

Identify the measurement of network speeds.

A Mebibits per second

B Mebibytes per second

C Megabits per second

D Megabytes per second

The correct answer is C

A is not correct because mebibits is a measure of storage capacity

B is not correct because mebibytes is a measure of storage capacity

D is not correct because transmission speeds are measured only in bits per second, not bytes per second

27
New cards

Data packets contain the addresses of the sender and the receiver. Complete the table to give the number of bits that make up each type of network address.

Type Example Number of bits

IPv4 192.169.0.3

IPv6 1050:a500:00c0:0440:0006:0300:700d:436f

(1) IPv4 192.169.0.3 - 32 bits

(2) IPv6 1050:a500:00c0:0440:0006:0300:700d: 436f - 128 bits

28
New cards

Data packets travel over physical media.

Describe one difference between the media used by a wired network and a wireless network.

In a wired network packets travel over (copper/fibre-optic) cables/ electrical or light signals,

whereas in a wireless network packets travel over the air

29
New cards

Some people confuse Ethernet and Wi-Fi.

Describe what is meant by the term Ethernet.

Networking technology which uses a wired method to connect devices in a LAN such as computers, routers and printers

  • Follow specific protocols to ensure data is sent and received correctly

  • Used on a wired network/connection using Ethernet cables

  • Defines how packets are checked for errors

  • Defines speed of transmission

30
New cards

A single physical box connects a desktop computer to the Internet.

The box incorporates three different components.

Complete the diagram to show the names of the components in the correct order.

Desktop computer → ______ → _______→ ______→ Internet

Desktop computer → Switch → Router → Modem → Internet

31
New cards

Users enter passwords when logging onto a network and when creating accounts using a web page.

Describe one difference between validation and authentication.

VALIDATION: used to check that data/password entered by user is fit for processing/meets specified requirements

AUTHENTICATION: used to verify identity of user/prove that users are who they say they are

32
New cards

assembler

type of computer program that translates assembly language code into machine code so the computer's processor can directly execute it

33
New cards

interpreter

program that executes instructions written in a programming language directly, without requiring them to be pre-compiled into machine code

34
New cards

compiler

program that translates a programming language's source code into machine code which a computer can understand and execute

35
New cards

Computers are made up of hardware components.

Complete the diagram by adding directional arrows between the components to show the flow of communication.

Speaker CPU Mouse USB device

Mouse → CPU

CPU → Speaker

CPU ←→ USB Device

36
New cards

Identify what is stored in ROM.

A The software firewall

B The basic input output system

C The operating system

D The user interface code

The correct answer is B

A is not correct because a firewall is an application that is loaded after the device is booted

C is not correct because the operating system is loaded after the device is booted

D is not correct because the user interface is loaded after the device is booted

37
New cards

Cache is used as temporary storage.

One type of cache is located between main memory and the CPU.

Explain one reason cache is used in a computer.

  • Cache makes up for the difference in speed of two devices because it is very high-speed memory

  • Cache is high-speed memory which acts as a buffer between a faster and a slower device

  • It speeds up processing because active/commonly used instructions and data are stored nearer to the CPU / the CPU doesn’t have to wait while instructions/data are fetched from RAM

38
New cards

A washing machine uses several different embedded systems.

One embedded system uses a switch to identify the type of wash cycle selected by the user.

Describe one other example of an embedded system found in a washing machine.

  • Uses a sensor to check the water level in the machine

  • Uses a thermometer to check the water temperature

  • Uses a timer to control the time required for the wash cycle/rinse/drain/spin

  • Uses a motor to rotate the drum

39
New cards