P1 Exam2 QP
P1 Exam2 QP
P1 Exam2 QP
* 5 4 1 6 5 1 8 6 8 7 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (PQ) 303744/3
© UCLES 2022 [Turn over
2
1 A shopping mall has an information point. Visitors can use it to find out which shops are in the mall
and where they are located.
(a) Identify one input device that could be built into the information point.
Example ....................................................................................................................................
[2]
(b) Identify one output device that could be built into the information point.
Example ....................................................................................................................................
[2]
(c) Identify one example of primary storage that could be built into the information point.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
3
2 Phil has a computer that is designed using the Von Neumann model. The computer has a
central processing unit (CPU).
Identify two other types of bus and state what each is responsible for transmitting in the CPU.
Bus 1 ........................................................................................................................................
...................................................................................................................................................
Bus 2 ........................................................................................................................................
...................................................................................................................................................
[4]
(b) The CPU performs a cycle that has three stages. One of these stages is execute.
Identify one other stage of the cycle that is performed by the CPU.
............................................................................................................................................. [1]
(c) Identify the component within the CPU that the accumulator is built into and describe the
purpose of the accumulator.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
4
3 Error codes for a computer are often displayed as hexadecimal values. Each error code is stored
in a 12-bit binary register.
Give the 12-bit binary value that would be stored for the hexadecimal error code 404
...................................................................................................................................................
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Give the 12-bit binary value that would be stored for the hexadecimal error code 12B
...................................................................................................................................................
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
The hexadecimal error code 022 means ‘file system error’. The hexadecimal error code 0AC
means ‘insufficient memory’.
Convert the hexadecimal error codes 022 and 0AC to denary values.
022 ...........................................
0AC ...........................................
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
5
Give the hexadecimal error code that would be displayed for the binary value 100111100000
...................................................................................................................................................
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(e) Give two reasons why error codes are represented in hexadecimal, instead of binary.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
6
4 Rebekah discovers that her bank details have been used fraudulently.
She thinks her bank details were stolen electronically, whilst she was using the Internet.
(a) Identify and describe two methods that could have been used to steal Rebekah’s bank details
electronically.
Method 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Method 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
7
(b) Rebekah decides to encrypt the data that she transmits whilst using the Internet. She does
this to keep the data safe.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(iii) Identify three other methods Rebekah could use to help keep her data safe.
Method 1 ...........................................................................................................................
Method 2 ...........................................................................................................................
Method 3 ...........................................................................................................................
[3]
8
5 A computer sends the data for an image to the print buffer, to wait to be processed for printing,
until the buffer is full.
When the buffer is no longer full, it sends a signal back to the computer to state it is ready for more
data.
State the name of this signal and give two other examples of when this type of signal is used.
Examples .........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[3]
9
6 Cameron writes software for coffee machines. He uses assembly language to write his software.
(a) Tick (3) to show whether assembly language is an example of a high-level language,
a low-level language or machine code.
Tick (3)
High-level language
Low-level language
Machine code
[1]
............................................................................................................................................. [1]
(c) Give two reasons why Cameron chooses to write the software for the coffee machines in
assembly language.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
Drawback 1 ...............................................................................................................................
...................................................................................................................................................
Drawback 2 ...............................................................................................................................
...................................................................................................................................................
[2]
10
7 (a) Eleanor uses a secure connection to allow customers to buy the cakes from her website.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [5]
11
Explain what is meant by the term cookies and give two examples of how cookies can be
used.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(c) Eleanor is worried about a denial of service (DoS) attack on her web server.
She wants to help prevent a DoS attack reaching the web server.
Identify a security method that she could use to help prevent a DoS attack.
Explain how the method you identify helps to prevent the attack.
Explanation ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
12
8 (a) Complete the following sentences that describe parts of a processor in a Von Neumann
model for a computer system.
9 A computer has Random Access Memory (RAM) and Read Only Memory (ROM).
Tick (✓) one or more boxes in each row to identify whether each statement refers to RAM, ROM
or both.
It is volatile
Bitmap Logo
R R R R R R R R
R B B B B B W R
R B W W W B W R
R B W W W W W R
R B W W B B W R
R B W W W B W R
R B B B B B W R
R R R R R R R R
(i) State the minimum number of bits needed to represent each pixel in the bitmap logo.
..................................................................................................................................... [1]
14
(ii) Calculate the minimum file size, in bytes, of the bitmap logo. Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
11 (a) Convert the following two’s complement binary integer into denary. Show your working.
11001011
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Answer ......................................................................................................................................
...................................................................................................................................................
[2]
(a) Daniel records the sound using a sampling rate of 44.1 kHz and a sampling resolution of
16 bits.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]