Login or Create an Account to view question mark schemes, comment, and download a PDF of this test
Question 1[6 Marks]
Consider the following boolean expression:
(A AND NOT B) OR (B AND NOT A)
(a).
Construct a truth table for the boolean expression above.
[4]
(b).
Hence or otherwise, state the simple boolean expression composed of only one logical operator which is logically equivalent to the boolean expression above.
[2]
Question 2[1 Mark]
Select the acronym which does NOT represent a type of computer network.
(a).
WAN
(b).
PAN
(c).
IAN
(d).
LAN
Question 3[4 Marks]
Explain how the OSI model helps with abstraction.
Question 4[4 Marks]
Construct both a logic diagram and truth table for the following expression:
NOT A OR A AND B
Question 5[1 Mark]
Choose the one option which best describes the World Wide Web (WWW).
(a).
A globally interconnected network of networks
(b).
A way of sharing resources via hypertext and hyperlinks
(c).
A way for data to travel via network protocols
(d).
The internet
Question 6[1 Mark]
Determine the hexadecimal value of the following binary expression 10 1011 1010 1101
Question 7[10 Marks]
(a).
Determine the decimal value of the binary ‘1001’
[1]
(b).
Determine the binary value of the denary ‘67’
[1]
(c).
Outline why the binary number system is used in computing
[2]
To convert decimal to binary, we use a simple handwritten algorithm, this same logic can be applied in pseudocode.
(d).
In pseudocode, using a stack, write an algorithm that finds the binary value of a decimal input by outputting the digits one by one
[6]
Question 8[13 Marks]
A bookshop is planning on implementing a new computer system to manage sales. The shop has 2 managers, 10 shop assistants and a security guard.
(a).
Identify two stakeholders in the new system
[2]
(b).
Outline two different forms of data collection that could be used to gain information from stakeholders to create the new system
[4]
(c).
Outline the importance of prototypes when developing new computer systems.
[2]
(d).
The company is proposing to use a direct changeover method to implement the new system, outline one reason why this could be a poor decision.
[3]
(e).
Suggest one alternative changeover process.
[2]
Question 9[2 Marks]
Identify two reasons for releasing a software update.
Question 10[1 Mark]
Outline the functions of the ALU.
Question 11[2 Marks]
Outline two characteristics of spreadsheets.
Question 12[1 Mark]
Outline the primary function of an ALU in a CPU or GPU.
Question 13[3 Marks]
Explain the characteristics of cache memory.
Question 14[3 Marks]
Describe the key characteristics and types of primary memory
Question 15[11 Marks]
A new ‘high-tech’ boot camp is being launched aimed at helping its attendees get fit and lose weight. The camp will use control systems to monitor and provide feedback across various boot camp activities. Each attendee will wear an electronic wristband which comprises a small speaker as well as embedded heart rate monitor to measure exercise intensity. In order to maintain exercise at an effective level of intensity, attendees will be alerted via recorded voice messages from the wristband speaker when they need to speed up or slow down.
(a).
With respect to control systems and the scenario described, outline the role of the microprocessor in the wristband.
[2]
(b).
(ii).
Contrast input and output transducers.
[2]
(i).
Define the term Transducer.
[1]
Beyond the wristband monitor, various pressure sensitive running tracks and embedded motion sensors will gather attendee exercise data. Attendee data will be continuously streamed to and collected on a web server in order to inform analytics around exercise behaviors and bio-mechanics.
(c).
Discuss the social impacts and ethical considerations associated with the use of embedded systems to monitor attendees during the camp.
[6]
Question 16[1 Mark]
Which of the following hardware is not required to create and connect to a WLAN?
(a).
NIC
(b).
Modem
(c).
Network Switch
(d).
Router
Question 17[13 Marks]
A bank has designed a new online banking service for both their local and international customers. Data will be sent around the world using secure protocols to ensure client banking details are kept safe.
(a).
Define the term 'data packet'.
[3]
(b).
Outline how protocols enable successful network communication.
[3]
The bank advises that customers do not use the online banking service on public Wi-Fi due to security risks.
(c).
With respect to online banking on public Wi-Fi, outline one security risk.
[3]
(d).
Describe two critical devices required for a public wireless network to function.
[4]
Question 18[2 Marks]
Explain why cache memory can speed up the processing within a computer.
Question 19[4 Marks]
Outline the steps of the Machine Instruction Cycle
Question 20[4 Marks]
Identify four causes of data loss
Question 21[2 Marks]
One of the functions of an operating system is memory management. Describe how this function prevents the system from crashing when more than one program is run at the same time.
Question 22[1 Mark]
State why the hexadecimal number system is frequently used in computing.
Question 23[1 Mark]
Which of the following is not a feature of peer to peer networking
(a).
No central server
(b).
Improved security
(c).
Redundancy/recovery
(d).
Supports file sharing for collaborative work
Question 24[11 Marks]
A local green grocer is finally planning on installing a computer system to manage their sales and stock data after having used pen and paper for the same tasks for many years. The store owner has no understanding of digital technology.
(a).
Define a peripheral device
[1]
(b).
Identify three examples of roles that a computer can take within a network
[3]
In order to sell more produce, the store owner's granddaughter has suggested they open an online store.
(c).
Outline what the client-server model is and how it applies to opening an online store
[3]
(d).
Discuss any safety / security issues that may arise from individuals who lack technology literacy accessing the world wide web
[4]
Question 25[2 Marks]
Define the term data migration.

25 Questions104 MarksShared + Premium
2 Uses16 Views0 Likes