Paper 1c
Paper 1c
(a) (i) Tick (3) to show which type of data is stored in an MP3 file.
Tick (3)
Video
Sound
Image
[1]
(ii) Tick (3) to show whether the MP3 file is a lossy compressed file or a lossless compressed
file or not a compressed file.
Tick (3)
2 A computer is designed using the Von Neumann model for a computer system.
(a) Data is fetched from primary storage into the CPU to be processed.
(i) State the name of the primary storage from where data is fetched.
..................................................................................................................................... [1]
(ii) The CPU performs a cycle to process data. Fetch is the first stage in this cycle.
State the names of the second and third stages in the cycle.
(iii) Identify two components within the CPU that are used in the fetch stage of the cycle.
Component 1 .....................................................................................................................
Component 2 .....................................................................................................................
[2]
3
3 Three types of storage media are magnetic, optical and solid state.
............................................................................................................................................. [1]
(b) Optical storage uses a laser to store and read data from a disk.
Explain how the laser is used to store and read data from the disk.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) A business is creating a new mobile device that has an SSD as secondary storage.
(i) Give three reasons why an SSD is the most suitable secondary storage for their mobile
device.
Reason 1 ...........................................................................................................................
...........................................................................................................................................
Reason 2 ...........................................................................................................................
...........................................................................................................................................
Reason 3 ...........................................................................................................................
...........................................................................................................................................
[3]
(ii) Identify two examples of software that can be stored on the SSD.
Example 1 .........................................................................................................................
Example 2 .........................................................................................................................
[2]
4
4 All data needs to be converted to binary data so that it can be processed by a computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) The denary values 64, 101 and 242 are converted to 8‑bit binary values.
64 ..............................................................................................................................................
101 ............................................................................................................................................
242 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
42 ..............................................................................................................................................
CE .............................................................................................................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
5
5 An image is stored on a computer. The image is 16‑bit colour and is 100 pixels high and
150 pixels wide.
Calculate the file size of the image in bytes. Show all your working.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
(a) One similarity between a compiler and an interpreter is that they both translate high‑level
language into machine code.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
6
7 Adele chooses to set a biometric password for her mobile device, instead of a
personal identification number (PIN).
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Give two reasons why a biometric password is more secure than a PIN.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
[2]
The firewall gathers data about the traffic coming into and going out of her mobile device.
Explain how the firewall uses the gathered data to keep the mobile device more secure.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) Adele also encrypts the data on her mobile device to keep it more secure.
...................................................................................................................................................
............................................................................................................................................. [1]
8
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[6]
9
(b) Complete the truth table for the given logic statement.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
10
9 Three Internet terms are browser, Internet Protocol (IP) address and
Uniform Resource Locator (URL).
Tick (3) to show which statements apply to each Internet term. Some statements may apply to
more than one Internet term.
it is a type of software
it is a type of address
it stores cookies
[5]
Feature 1 ..........................................................................................................................................
..........................................................................................................................................................
Feature 2 ..........................................................................................................................................
..........................................................................................................................................................
Feature 3 ..........................................................................................................................................
..........................................................................................................................................................
[3]
11
11 (a) The paragraph describes the process of printing a document using an inkjet printer.
Complete the paragraph using the most appropriate terms from the list. Not all of the terms in
the list need to be used.
• binary
• buffer
• drum
• information
• interrupt
• laser
• liquid
• nozzles
• operating system
• powder
• thermal bubble
• toner
Data is sent from the computer to the printer. The data is held in a print
processed to be printed.
technology.
If the paper jams in the printing process, the printing stops and an
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
Example 1 .................................................................................................................................
Example 2 .................................................................................................................................
Example 3 .................................................................................................................................
[3]
12
Identify and describe three ethical issues that could be a concern when using the Internet.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]