0% found this document useful (0 votes)
87 views

MOCK EXAMINATIONS Computer

This document contains a mock exam for a student with questions about computer components, data transmission, and network security. There are 5 multiple choice questions covering topics like: 1) The different buses used in the computer's fetch-execute cycle. 2) Methods for detecting errors in data transmission like parity checks, check digits, and checksums. 3) Converting a decimal number to binary and representing it in two computer registers. 4) Drawing diagrams to illustrate simplex, duplex, and half-duplex data transmission and giving uses for each. 5) Explaining how SSL protocol and firewalls can keep a company's data secure when transmitting between offices over

Uploaded by

Ratchet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views

MOCK EXAMINATIONS Computer

This document contains a mock exam for a student with questions about computer components, data transmission, and network security. There are 5 multiple choice questions covering topics like: 1) The different buses used in the computer's fetch-execute cycle. 2) Methods for detecting errors in data transmission like parity checks, check digits, and checksums. 3) Converting a decimal number to binary and representing it in two computer registers. 4) Drawing diagrams to illustrate simplex, duplex, and half-duplex data transmission and giving uses for each. 5) Explaining how SSL protocol and firewalls can keep a company's data secure when transmitting between offices over

Uploaded by

Ratchet
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

MOCK EXAMINATIONS-1

Name:
Roll:
Grade:
Date:
Time: 1 Hour
Total Marks: / 74
General Instructions:
 Answer All The Questions
 You Wil Not Be Give Extra Time
 Marks Are Allocated in [ ]
 All Calculations Are To Be Done In The Paper
 No Electronic Calculators Are Allowed
Section A: Answer In The Question Paper (Theory). Don’t Spend More Than 30
Minutes On This Section.

1) Name three different buses that are used in the fetch-execute cycle.

Bus 1
...............................................................................................................................................
.

Bus 2
...............................................................................................................................................
.

Bus 3
...............................................................................................................................................
.
[3]
2) There are various methods used to detect errors that can occur during data transmission
and storage.

Describe each of the following error detection methods.

Parity check
......................................................................................................................................

...............................................................................................................................................

..............................................................................................................................................

...............................................................................................................................................

Check digit
.......................................................................................................................................

...............................................................................................................................................

...............................................................................................................................................

...............................................................................................................................................

Checksum .............................................................................................................................
...........

...............................................................................................................................................

...............................................................................................................................................
Automatic Repeat request

(ARQ) ..................................................................................................................................

...........

...............................................................................................................................................

...............................................................................................................................................

...............................................................................................................................................
[8]

3 (a) The denary number 57 is to be stored in two different computer registers.

Convert 57 from denary to binary and show your working.

....................................................................................................................................
.

....................................................................................................................................
.

....................................................................................................................................
.

....................................................................................................................................
[2]

(b) Show the binary number from part (a) as it would be stored in the following
registers.

Register 1

Register 2

[2]

(c) A binary number stored in a register can have many different uses, for example
an address in main memory.
Give two other uses for a binary number stored in a register.

Use 1
....................................................................................................................................
Use 2
.....................................................................................................................................
[2]

(d) A register in a computer contains binary digits.

0 0 1 1 1 0 1 0

The contents of the register represent a

binary integer. Convert the binary integer

to hexadecimal.

....................................................................................................................................
.

....................................................................................................................................
.

[1]
7

4 Computer A is communicating with computer B.

a) Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The
direction of the data transmission must be fully labelled.

Simplex data
transmission

Computer A Computer B

Duplex data
transmission
Computer A Computer B

Half-duplex data
transmission

Computer A Computer B
[6]

(b) State a use for the following data transmission methods. The use must be different for
each data transmission method.

Simplex ..........................................................................................................................
...........

........................................................................................................................................

Duplex ...........................................................................................................................
...........

........................................................................................................................................
[2]

5) A company has a number of offices around the world.

(a) Data is transmitted between the offices over the Internet. In order to keep the data safe
the company is using Secure Socket Layer (SSL) protocol and a firewall at each office.

Explain how SSL protocol and a firewall will keep the company’s data safe.

SSL protocol
.............................................................................................................................

........................................................................................................................................
........................................................................................................................................

Firewall ..........................................................................................................................
...........

........................................................................................................................................

........................................................................................................................................
[4]

(b) A company stores personal details of its customers on a computer system behind a firewall.

Explain, with reasons, what else the company should do to keep this data safe.

........................................................................................................................................

........................................................................................................................................

........................................................................................................................................

........................................................................................................................................

.......................................................................................................................................

........................................................................................................................................

........................................................................................................................................

........................................................................................................................................

........................................................................................................................................

.......................................................................................................................................

.......................................................................................................................................
[6]
6)
7 Hexadecimal codes are used in MAC addresses.

(a) State what is meant by the term MAC.

........................................................................................................................................
[1]

(b) Explain what the hexadecimal code in a MAC address represents.

........................................................................................................................................

........................................................................................................................................

........................................................................................................................................

........................................................................................................................................

........................................................................................................................................

........................................................................................................................................
[3]

8)
9) Secure socket layer (SSL) is used in the security of information on Internet websites.

(a) State how it is possible for a user to know that a website is secure by looking
at the web address.

........................................................................................................................................

........................................................................................................................................
[1]

(b) Describe three of the stages a web browser goes through to detect whether a
website is secure.

1 .....................................................................................................................................
...

........................................................................................................................................
........................................................................................................................................

2 .....................................................................................................................................
...

........................................................................................................................................

........................................................................................................................................

3 .....................................................................................................................................
...

........................................................................................................................................

........................................................................................................................................
[3]

Section B: Programming (Python-Practical) Spend 30 Minutes Only

1. Write a code which gives the user access when one types in the correct
password ‘Hello World’ as input.

Use this Clue:


To define A Text We Use Double Equals To (==)
[3]

2. Write a program which finds the largest number among five numbers.

[3]
3. Write a program that calculates the average between three numbers.
[2]
Section C: Answer In The Question Paper (At The End)
10)

You might also like