Higher Computing Science - HCOMPPEP - Alford, David - 2017 - London - Hodder Education Group - 9781510413788 - Anna's Archive
Higher Computing Science - HCOMPPEP - Alford, David - 2017 - London - Hodder Education Group - 9781510413788 - Anna's Archive
- Papers
COMPUTING
SCIENCE
ONILNdWOD
IONAIDSDavid Alford
Give yourself even more
chance of exam success
How to Pass | i How to Pass | I| cn to Pass SON |
Anne Bradley and Adam Stephenson | | Elaine Boylan and Stephanie Lightbown | Douglas Angus
Computing
Science
Practice Papers for SQA Exams
David Alford
Contents
Introduction ill
Key Area index grids vi
Practice PaperA 1
Practice Paper B 19
Practice Paper C oF
Answers to Practice Papers 53
HODDER
4 GIBSON
AN HACHETTE UK COMPANY
The Publishers would like to thank the following for permission to reproduce copyright material:
Acknowledgements
Exam rubrics in Section 1 and Section 2 of each practice paper Copyright © Scottish Qualifications Authority.
Every effort has been made to trace all copyright holders, but if any have been inadvertently overlooked, the
Publishers will be pleased to make the necessary arrangements at the first opportunity.
Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder
Gibson cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible
to find a relocated web page by typing in the address of the home page for a website in the URL window of your
browser.
Hachette UK's policy is to use papers that are natural, renewable and recyclable products and made from
wood grown in sustainable forests. The logging and manufacturing processes are expected to conform to the
environmental regulations of the country of origin.
Orders: please contact Bookpoint Ltd, 130 Park Drive, Milton Park, Abingdon, Oxon OX14 4SE.
Telephone: (44) 01235 827720. Fax: (44) 01235 400401. Email [email protected]. Lines are open
from 9 a.m. to 5 p.m., Monday to Saturday, with a 24-hour message answering service. Visit our website at
www.hoddereducation.co.uk. Hodder Gibson can also be contacted directly at hoddergibson(@hodder.co.uk
© David Alford 2017
First published in 2017 by
Hodder Gibson, an imprint of Hodder Education
An Hachette UK Company
211 St Vincent Street
Glasgow, G2 5QY
Impression number Se Eeme |
Year 221 2020) 2019 2018-2017
All rights reserved. Apart from any use permitted under UK copyright law, no part of this publication may be
reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and
recording, or held within any information storage and retrieval system, without permission in writing from the
publisher or under licence from the Copyright Licensing Agency Limited. Further details of such licences (for
reprographic reproduction] may be obtained from the Copyright Licensing Agency Limited, www.cla.co.uk
Cover photo © crstrbrt/123RF.com
Illustrations by Aptara Inc.
Typeset in Din Regular 12/14.4 pt. by Aptara Inc.
Printed in the UK
A catalogue record for this title is available from the British Library.
ISBN: 978 15104 1353 5
||| h & t S
‘nator
A A A NA
ATTN NOM TIA GA A STD TD ILLS IOI
The course
Prerequisite knowledge
Before sitting this course, it is expected that you will have passed National 5 Computing Science.
The content of Higher Computing Science will build upon the skills and knowledge gained at
National 5 level.
The Assignment
In session 2017-18, the Assignment will be worth 60 marks. This is 40 per cent of the overall
available marks. This will be combined with a 90-mark question paper to give a total of 150
available marks.
From session 2018-19 onwards, there will be changes to the number of marks available
within the Assignment and the Question Paper. The exact nature of these changes has yet to
be decided by SQA. However, if SQA chooses to follow the pattern of the changes made to the
National 5 Computing Science course, then the Assignment will be worth 50 marks (31 per cent
of the overall available marks) combined with a 110-mark question paper, to give a total of 160
available marks.
The Assignment will require you to show your understanding and skills in the following areas:
analysis of a problem
program design
information system design
writing program code
creation of an information system
scripting within an information system
evaluation of your solution.
Introduction iii
The question paper brief can also be accessed for free from the Higher Computing Science
section of the SQA website, under Specimen Question Papers and Marking Instructions. This
document indicates how many marks within the question paper will be assigned to each area.
Where questions involve a candidate interpreting program code, the code will be in SQA
Reference Language. Candidates are not required to answer in SQA Reference Language; only to
read and understand it. The full specification for SQA Reference Language can be accessed for
free from the Higher Computing Science section of the SQA website, under Reference Language.
The current format of the question paper consists of 90 marks.
Section 1 will consist of individual problem-solving questions and is worth a total of 20 marks.
Section 2 will consist of longer, scenario-based problem-solving questions and is worth a total
of 70 marks.
2 You can complete a practice paper using your notes and books. Try a question first, and then
refer to the answers section to ensure you have sufficient detail to gain all the available
marks. If you are unable to answer a question, or discover your answer was not to the
required standard, you should refer to your notes and books.
The revision grid provided allows you to target a specific area of content should you require
practice on a specific topic.
Introduction
Key Area index grids
Key area Paper A Date to
complete
Section? |Section2 |Section1 |Section2 |Section1 | Section 2
Software Design and Development
Languagesand |4 17b} 8 4 15a)
environments |
Computational 17d), 17e] isalaisdl 2 12b)
constructs 13e]} |
Data types and Tal; 11ib},| Gal, 9b) 12a), 126) |
structures 16} |
Testing and 14d) Maley laren: 15b), 16d)
documenting 13c]
solutions [
Algorithm 8 14e) 11a], 13b) 12b), 13a,
specification 15¢) |
Low-level ezaee olen tiSyed ice A) Aa en-X) Fa 14g) (ii),
operations elles) 15b) (ii) 15d], 16a]
and computer 18c)
architecture |
Software and Information System Design and Development
Design notations 12a), 12b) 12a) 14b], 16b)
Development 5 (ha) Vache 2 16c}, 16f]
methodologies 17a]
Contemporary 13d] 11e} 14g) (i)
developments
User interface 16d) i 9
formation System Design and Development
Structures and | 9a], 9b) | 12c), 12d] 12b] 14a), 14¢),
links (database) | | 14d)
Structures igal wish) 12d}, 12e}, |8, 10 iecieied)
and links 15e)
(web-based)
Media types 7a), 7b) 15a) 11 13g) (i),
15b) (i) 13h]
Coding 16a}, 16b) 12¢)) 45) 13c¢}
14c)
Testing 11e), 18d) 14a} 14f), 16e),
| 16g]
Purpose, 12) 13d], 13e])
functionality,
users
| I
Security 16e} 6a), 6b)
precautions
Legal 13c}
implications
Environmental 13d], 18b)
implications
Economic and 11d), 13d} Ou
social impact
https://archive.org/details/hignhercomputingsOO000alfo
Practi
Paper
A
Higher
Computing
Science
Ly HODDER
GIBSON
LEARN MORE
A
Duration: 2 hours
Total marks: 90
Section 1 - 20 marks
Attempt ALL questions.
Section 2 - 70 marks
Attempt ALL questions.
Show all workings.
In the exam you must write your answers in the answer booklet provided and clearly identify
the question number you are attempting.
Use blue or black ink.
MARKS
1 Convert the decimal number -92 into binary using 8-bit two’s complement. 1
2 Kevin has written a program that involves storing text files. Give one reason why
the use of Unicode might be preferable to ASCII for storage of text. 1
3 Reece wishes to store a video clip that has a frame rate of 30 frames per second,
a duration of 11 seconds and a resolution of 1920 x 1080 with a colour depth of 8
bits. Calculate the storage requirement for the uncompressed video clip. Show
all working and express your answer in appropriate units. Z
Practice Paper A
MARKS
Anne manages a local area network that was set up for a small business. The
network currently makes use of hub.
As the business expands and more devices are being added to the network, Anne
is considering removing the hub and instead installing a switch.
Briony works for a delivery company. She has written an algorithm that will
search for a target ID code from a list of 18 parcels. Each parcel has a unique
parcel ID code, stored in the array named parcel code( ). Part of the
algorithm is shown below.
Line 1 SEIT found TO false
Line4
Line 6 END IF
ae
Landon works in the office at Longlees Primary School. He issues passes to staff
at the school using the form below:
STAFF
Forename Alan
Surname Prentice
Designation Teacher _
,
A staff member's designation can be one of ‘Teacher’, Office’, Janitor’, Kitchen’
‘Classroom Assistant’ or Cleaner’.
a) Landon uses a compound key for this database. Explain what a compound
key is and why this might lead to problems in this situation.
Practice PaperA
MARKS
A colleague recommends that Vera use a public cloud instead for the storage of
patients personal, medical and payment data.
b) Describe one advantage and one disadvantage of using a public cloud in this
situation. 2
MARKS
11. An app that contains a game has been created, and includes a high-score
table stored in a separate sequential text file called scores.txt. Every time
the game Is played, the high-score table is shown and is updated and saved if
appropriate at the end of every game.
a} Using pseudocode, or a programming language with which you are familiar,
complete the code below to read in ten names and high scores from the file
into the arrays name and score:
Line1
Line3
Line 4
Line 6
The game allows users to play with a group of three adventurers, each with
a different name and a different rating for their strength, magic, speed and
intelligence.
The game code features the record structure shown to allow this:
RECORD adventurer IS {STRING name, INTEGER strength,
INTEGER magic, INTEGER speed, INTEGER intelligence}
b) The programmer wants to store the three adventurers’ data using the record
structure shown above. The array is to be named party.
Using pseudocode, or a programming language of your choice, declare the
array that can store the data for the three adventurers.
Practice PaperA
MARKS
The first character's details are shown below
a
i
——
——
Intelli ¢ ence
The app allows users to interact over a chat feature. However, the creators have
made use of censorship to block certain words or phrases from the chat.
d) Describe one possible concern that users may have over the censorship of
the chat feature. 1
The app was tested on a mobile phone handset released two weeks ago, and
performed as expected.
e) Describe two problems that may be encountered when testing the app ona
handset released three years ago. Z
[Band [Band ID[PK] [Member [Member |PK] Album JAlbum [PK] [Song [SongiD [PK
| Name | ID ID Name ee
| = ee
Text [12]
Text (10)
b) Write what you would expect to be contained in the missing entries 1, 2 and 3. 2
/ Practice PaperA
MARKS
Kyle has designed a form that opens when the database is loaded. The form
includes buttons that allow a new record to be added to any of the tables.
c) Explain which type of user would benefit from the use of such a form and
why they would find it useful.
d) Kyle would like a sound to be played each time the form loads. Explain how
this could be achieved.
13 Gillian has set up a website for a charity that employs staff to provide support
to young carers. Young carers are young people who care for members of their
family.
A friend has told Gillian that she should use meta tags to help with search engine
optimisation. Gillian had been more concerned with optimising the load time of
her web pages.
(ii) Where in the HTML code of a web page would you expect to find meta
tags?
(iii) Complete the following meta tag to include the terms ‘young’ and
‘carers’ as keywords for a web page:
<meta name = content = =
Gillian includes a rute in the external stylesheet to make all the large headings
appear in Garamond font wherever they appear on each page:
Hl {font-family:Garamond}
% siti Se
\
\
\
\
\ Higher Computing Science Ny
\
The charity is concerned that they may not bet fully complying with the Requlatior
of Investigatory Powers Act and asks Gillian for advice. The cherity eng loys
nine staff members who regularly communicate with one another and the youns
people via official charity email addresses.
c) Explain two responsibilities that the charity has under the Requistion of
Investigatory Powers Act.
The charity is concerned at high utility bills caused by the heating system be ng
switched on from early morning until late evening. This is because the various
staff members and young people come and go from the offices at different times
They are considering installing an intelligent heating system that will recognise
trends in timings of office use, learn how quickly the office loses +eat and access
an online weather report to help adjust temperatures.
d) Explain two benefits of having such an intelligent neatir
b) When CalumCorp completes the program for the client, the client can decide
whether to release it as open source or proprietary software
Give one advantage of open source for?
ed y
o 4.
a]
c ita)» u)
an) f ‘ ‘y ta) = \\) ‘ Wy
y
te
>
MARKS
c) CalumCorp will produce some documentation along with the software.
Describe two items of documentation they might produce to issue to users.
d) Part of the program must include a section to find the total of any valid
number in a list of three numbers. Valid numbers are 0 and above. An
incomplete part of the test plan for this section is shown below:
____| Firstnumber |Second number |Third number _|Expected total_| Actual total_
2 i
Seieg 2
Tes creatine lunteosha wal) os seesan Ah arma ed
eee eee ed
Write two different suitable values to be entered in place of the X and Y
indicated in the table and explain your choice for each.
\4
=~
Line 6 END IF
e) Andy now wants to store the highest valid number in 2 variable called ~2z
He has to add four new lines in the spaces indicated in order to do tnis
Line 3
Line 7 :
Line 8 —
Line 9 :
Line 10 END IF
b) The photographs are stored as bitmap file types rather than using vector
storage. Explain why vector storage is not suitable for photographs. 1
eSeareP e Siaenrraeaca|
SSRN SRR
Sea aera seae5
aaa CI
acer eae paar ereeRears|
Describe two advantages of vector storage over bitmap storage for an image
like the one shown.
Z
\ a
N \
16 Roberta regularly gets clothing and badges from an online shop called Style
Printing .
GOW
<7 Ca www.styleprinting.com
Hello Roberta,
how can we help you?
SEARCH Q
a) Identify one area of the web page that requires a client-side script to be
executed.
b) Identify one area of the web page that requires a server-side script to be
executed.
c) When Roberta uses the same browser on the same device to access other
websites, she sees adverts for the Style Printing site appearing on those web
pages. Explain why those websites have specifically shown adverts for Style
Printing to Roberta.
d) Roberta's friend Graham is using his laptop to access the Style Printing site.
However, Graham has problems with his vision, and is finding the text on the
site difficult to read. How could Style Printing ensure that vision impairment
does not prevent users from being able to read text on the site?
rf Practice Paper A
A
MARKS
e) The Style Print website uses asymmetric encryption to ensure that payment
data is secure through the use of a public key and a private key. Explain the
steps involved in Style Print securely receiving data from a user using this.
17 Malala is using a desktop computer to develop a new app for mobile devices. She
is using the rapid application development design methodology.
Malala could code the app in either a high level language or a low level language.
Malala is concerned that a low level language is not very similar to English.
b) Explain one other reason why a low level language would not be suitable in
this scenario.
ee eee
ee
———
a
ee
Malala wishes to use her desktop computer to see how the app would perform
on a smartphone.
a ee eee
eeee ee ee eee ee
d) {i) Describe two risks that Rehman takes in always using global variables
in his code. 2
(ii) Malala has passed some arrays as parameters into the procedures. Explain
the benefits of passing arrays by reference instead of by value. 2
e) Malala has used some procedures and some functions. Explain how
procedures are different from functions. 2
a) Explain how Bernard could ensure the new system has the hardware
required to carry out the multiprogramming required in this situation. 2
Practice PaperA
MARKS
b) Describe two possible environmental implications of Bernard's embedded
computer system,
ad) The car manufacturer decides to carry out usability testing on the whole
system, Explain how the manufacturers can try to ensure the whole system
is tested during this.
Higher
Computing
Science
(5 HODDER
Duration - 2 hours
Total marks - 90
- SECTION 1 - 20 marks
| Attempt ALL questions.
SECTION 2 - 70 marks
Attempt ALL questions.
Show all workings.
In the exam you must write your answers in the answer booklet provided and clearly identify
the question number you are attempting.
Use blue or black ink.
MARKS
2 Gerry's program has just reached the testing stage of the software
development process. Explain why the software development process
could be said to be an iterative process. Z
3 Astereo sound file lasting one minute with a sample rate of 4¢khz and 2
file size of 11250 Kb is stored on a computer.
Calculate the sample depth of the audio file. Show all working and express your
answer in appropriate units. 3
MARKS
4 One method for improving system performance Is the use of cache memory.
Explain how the use of cache would speed up the execution of the following code,
which calculates the volume of a room:
b) Explain why having access to a company's public key does not help criminals
to access encrypted communications from customers to the company.
1
22 x Higher Computing a
MARKS
Describe the features of a declarative language used in the creation of software. 2
A radio station is creating a program to store details about songs. The details
stored are: track name, artist name and highest chart position.
a) Show how a record structure would be created to store the necessary song
details. 2
b) Create a data structure using your record structure from part [a] that can
store the data for 5000 songs. 2
10 Tiana has written a program that involves storing text files. Give one reason why
the use of ASCII might be preferable to Unicode for storage of text. |
Practice Paper B 23
Section 2
SECTION 2 - 70 marks
Attempt ALL questions.
MARKS
11 Fleur is a company that makes and sells packs of tea bags for various flavours of
tea. They have a desktop application that allows them to keep track of their sales.
For each type of tea, the number of packs sold that week is stored in an array
called sold, and the name of the type of tea is stored in an array called name:
af
Line 3
Line 4
Line 5
Line 6 END FOR
Line 7 SEND total « “types of tea sold 30 or more
packs Ghis month” VO DISPLAY 2
b) To access the sales-statistics feature, the user must click the appropriate
icon within the desktop application’s window.
(i) Explain what the Memory Management function of the operating system
will do when the user clicks the icon to load the sales-statistics feature. 1
(ii) Explain what the file management function of the operating system will
do when the file ‘result.txt’ is to be saved to the hard drive. 1
c) The following code is used with the sold array as shown above to calculate
the overall power used per day:
DECLARE total AS INTEGER INITIALLY 0
FOR. product FROM 0 TO 7 DO
GET total TO total + soldiproquct)
SEND total TO DISPLAY
NEXT peoducey
Part of a trace table is shown below. Entries [i) and [ii) are missing. What
Z
should be entered in those spaces?
Product 0 1 2 3 |
18 [34 i ii |
(i)
(ii)
/ Practice Paper B
MARKS
d) Fleur has decided to stop selling the detox’ type of tea due to poor sales,
and the array now contains this data for the following month:
name jasmine cinnamon }camomile|dusk ]pink |autumn | green
sold L9 26 14 L9 60 4") 3
39
However, this change results in an error when the programmer runs the
code from part [c].
Explain why the error occurs and what change could be made to the code
from part (c] to correct the error.
e) Fleur also has an app that is installed on the manager's smartphone, which
works together with energy-monitoring software on the desktop computer
in the office. The company has designed an intelligent system that can make
use of the data collected from both the smartphone and the desktop to
reduce the power usage of the desktop.
Suggest one way in which such an intelligent system could reduce power
usage by a desktop computer.
Product 1D
.
(eee
Manufacturer
Exporter 1D Manufacturer ID
| Name ee Nee ee
|]
Pfaddress («dress i
Piet.| CL etn.
|
[
fenporter
a) Show the correct entity-relationship diagram to indicate the relationship
between the four tables above. 3
Practice Paper B
MARKS
Dani's customers can browse her database from a kiosk within the shop. After a
customer submits a query, the screen below is shown:
e009
€>7 CfA www.daniinternational.com
Dani International
Soor Plooms Product: 0042
A delicious sour plum sweet.
Long-lasting sweet to suck on
that does not lose its flavour.
| | Made by Harrid’s Confectionary.
Current discount for you is 10%.
b) (i) State the tables and fields used to show the screen pictured above.
c) Dani wishes to make the text ‘Dani International’ stand out in blue whenever
the user moves the pointer onto those words.
In the body section, Dani has placed the following:
“ltd dani “Onmeusecover —= “mouseover
()™ Dani
International</hl1>
Write the text needed below this in the body section to cause the heading
‘Dani International’ to stand out in blue whenever the user moves the
pointer over those words. 4
d) Dani wishes to use a meta tag so that if users use a search engine to search
for Scottish’ or ‘Canada’, her website is more likely to appear further up the
list of search results.
Complete the following: 2
ne ea aet— COImeSink = >
e) Dani makes use of cloud-based services for data storage. Describe another
cloud-based service and how it could benefit Dani. Z
/ie a
/ Practice Paper B /
f
29
MARKS
13 Bereket’s program is used to calculate charges for hiring bicycles. The departure
and return times are converted to and stored as real numbers, for example 08:30
hours will be converted to and stored as 8.5.
The function below is used to calculate the cost of hire for each bike.
Line 1 FUNCTION calcCost (REAL departure, REAL return)
RETURNS REAL
a) Name an actual parameter from the code above, and describe what is meant
by an actual parameter.
a a
ee ee
eeee eee
————
SS ee ee eee
b] Elena notices errors when testing Bereket's program. If the bike has been
hired for more than one hour but less than or equal to two, the cost wrongly
shows as zero.
(i) What cost will show if the bike was hired at 10:00 and returne
d at 10:30?
ee ee eee
(ii) State how to change the code above to remove the errors.
a es ee ee
d) Identify how the parameter ‘left’ would be passed into the function, and
explain the reason for your answer.
Alford Kits sell sporting equipment through a database-driven website. One page
generated by the website and displayed on a client's browser is shown below:
2
OOO
€%C¢C Af www.alfordkits.com
LLL NLL
above.
a) Describe the benefits of using usability testing on the website
Practice Paper B
MARKS
b) Identify one part of the web page that has made use of client-side scripting.
c) Explain how the use of a database-driven website would allow the Alford Kits
website to display the search results shown above.
oo
eee
d) Alford Kits performs a full backup of all their data once a week.
a ae ee eee ee
(ii) Describe another backup schedule that should also be used in this case.
ee
es a ot ee eee
a ee ee ee eee eee
e) Alford Kits makes use of a hybrid cloud to store a backup of all their web
pages and the designs for new kits to be released next year.
Explain how a hybrid cloud is different from a public cloud.
eeee eee
5ee ee eee
i
The two designs are identical apart from the position of the black oval.
(i) Explain how the first design would be changed to the second design
using a bit-mapped graphics package. 1
(ii) Explain how the first design would be changed to the second design
using a vector graphics package. 1
g) rs
The original cricket bat design currently on sale looks like this:
(i) Explain the difference, if any, in file size from this design to the new designs
shown above in part (f] if the files were all saved as vector graphics. 2
eee
eSSS ee ——oEo—EoooOoOooo
(ii) Explain the difference, if any, in file size from this design to the new designs
shown above in part (f] if the files were all saved as bitmapped graphics. 2
Practice Paper B 33
MARKS
15 Boris runs his own business recording footage of weddings and uses a computer
system to edit the videos.
a) Boris has created a poster to advertise his business. The poster is saved as
a bitmapped image file and is compressed using DCT compression and then
RLE compression.
(i) Explain how RLE compresses bitmapped graphics.
(ii) Explain how the use of DCT increases the effectiveness of RLE compression.
Ce
e ese eee e
ee e
b) Boris has recorded part of a wedding video where the groom Is standing in
one place giving a speech. He has also recorded another part of the wedding
where there are a number of couples dancing.
He has compressed the videos using both interframe and intraframe
compression.
(i) Boris notices that before compression the two videos took up
approximately the same amount of storage space. However, following
compression, the compressed version of the second video featuring
dancing takes up a lot more storage space than the compressed version
of the first video featuring the speech. Explain why this is the case.
Eee
eee
eee
Eee
(ii) The hardware Boris is using for playback has sufficient capabilities that
he has been able to view many high-quality videos with no problems.
Despite this, when he plays both the compressed and uncompressed
versions of the videos described he notices that the movement looks
jerky and unrealistic. Explain why this might be the case.
34 Higher Computing mm
\
MARKS
c) Boris has set up a website for his business. The code from part of one page
for the site is shown below:
<1 DOCTIPE, himl>
ak eal:
<head>
<style>
p{color:green; text-align: center}
<jstyle>
</head>
<body>
<p> Welcome’
To </p>
“seve = “Gelert blue, fLonti=seize
s+20057" Boris
Romanov</p>
<p> Videography </p>
</body>
a/ Heme
Describe the output from this code.
d) Boris has chosen to use proprietary software to edit his videos. Explain what
is meant by proprietary software and give one advantage to Boris of using
this type of software.
Practice PaperB 35
7
: s0ACINGL
Foil <eenterod a™ .
=. eae fie 0 VI
72 '
7 =
i . 7
j : =)
: i a
es
a pigs oT
yee ven te Picea
a Labs =
—— == - = a — a = i =
a
' x
‘a _ =
7
ee a - — oa = =
= Fs ab Geiiycntay os ow a? (<3
ESD out? Wainer eee = OY We
ee ee a __ re
Oe
P= =a= ee
= S hellan
2g Ga
epee tn
cisa
a = = 7-*~ F ~eees a Se
eet
. - > >a ad
CPaper
Pract
Higher
Computing
Science
Ly HODDER
GIBSON
LEARN MORE
C
Duration - 2 hours
Total marks - 90
SECTION 1 - 20 marks
Attempt ALL questions.
SECTION 2 - 70 marks
Attempt ALL questions.
Show all workings.
In the exam you must write your answers in the answer booklet provided and clearly identify
the question number you are attempting.
Use blue or black ink.
ie ese
1 Convert the 8-bit two's complement number 1000 1100 into denary.
2 Part of a program that calculates total annual rainfall is shown below. The code
makes use of a function to add up a total of four numbers:
Identify one argument from the code above and explain what is meant by an
argument.
3. Areal number is stored using 32-bit floating point representation. The mantissa
is allocated 8 bits, and 24 bits are allocated to the exponent. Describe the effect if
the allocation is changed to a 16-bit mantissa and a 16-bit exponent.
Practice PaperC
MARKS
Lesley’s Toy Shop has recently created a new computer game and ensured that
this program is portable. Give one economic benefit to Lesley of the game being
portable.
Below Is part of a program that checks that the correct password has been
entered before showing an account balance.
Line 1 REPEAT
ee ee ee
ee ————CriCO
Ruth is developing a new social media platform for fans of animated film and
television. Describe the safeguards required to ensure users’ privacy on social
media sites.
eeeee ee 2 a eee)
eeee 2 2 ee
Se eee
———
ee ee ee
10 The home page on Montford Zoo’s website has some dynamic content that
automatically links to a weather website and shows the weather forecast for the
day. The zoo management Is concerned that users who notice bad weather on a
particular day may decide not to visit. Give two other disadvantages of having this
dynamic feature on the web page. 2
11 Hector has been editing some graphics, and has now compressed the graphics
using LZW encoding.
Explain how LZW encoding compresses data. 2
Practice Paper C 41
C
Section 2
SECTION 2 - 70 marks
Attempt ALL questions,
MARKS
12 Jiong is creating a program to process weather statistics for each of Scotland’s
32 local authorities.
4s
as Gecided that using a record structure is the best way to do this. He has
FYD
al Jiong wishes to read in the data for the 32 entries from a text file called
stats. txt. Show, using pseudocode or a programming language that you
are familar with, how he would do this.
—— = w)|
ae
\
\\\ Higher Computing Science
MARKS
b) Renewable energy can be produced by wind turbines. Jiong wishes to use
the data he has within the program to determine the name of the local
authority that has the highest windspeed. His friend Rebekah has written the
following function, which she suggests he use within his program:
FUNCTION findHighest (ARRAY OF INTEGER list) RETURNS INTEGER
DECLARE highest AS INTEGER INITIALLY list (0)
FOR -tndex FROM 1» TO: Sle DO
if last (andex)>highest THEN
Skt (highest. TO, list (index)
BND iy
END FOR
RETURN shighest
END FUNCTION
Suggest two reasons why Jiong cannot use the function as it is shown above
to find the name of the local authority with the highest average windspeed. fs
13 Clarissa works for Dunton Juniors football club. She is writing a program to
analyse data held on season-ticket holders at the club.
The program includes an array of integers called age to hold the age that each
season-ticket holder was when they bought their current season ticket. Clarissa
wants a program to use this array to show on screen how many season-ticket holders
are under the age of 18. There are 300 season-ticket holders this season.
Practice Paper C
MARKS
b) Customers pay for their tickets on the Dunton Juniors website. However,
because this is a small local business, some customers are concerned
when they log on to the site that they are not on the genuine Dunton Juniors
website. Explain how Dunton Juniors could reassure those customers.
eee
eee
eee
ee a ee eee
ee ee ee
eee
e) The club stores a lot of data on its network, including players’ medical
information; season-ticket holders’ contact and payment details: notes from
the coaches and manager about players; and tactics and sales data.
The club wishes only medical personnel to access the medical information,
only office staff to access the customer information and only coaching staff
to access the tactical information.
Explain how the club's network could be set up to ensure that only
appropriate groups of staff can access the data relevant to their role.
aee ee ee,
g) Some matchday photos have been taken on a digital camera. When the photos
are taken, they are automatically compressed using DCT. Back at the club
office, the camera is connected to a computer in order to transfer the photos.
(i) Describe one disadvantage of compressing the photos using DCT.
SS
ee e
SS SS
(iii) State two functions of the operating system involved and describe their
role when transferring these photographs to the computer.
the
h) Some interviews with club personnel have been made available on
website as audio files.
Explain
They have first been compressed using Free Lossless Audio Codec.
how Free Lossless Audio Codec would compress this data.
Practice Paper C 45
MARKS
14 Paterson Dirt Moto is a business that allows customers to take motorised
Girt-bike lessons at various locations around the UK. Each location features a
mhumber
ans \ of MQTE
dirt UR bike tracks and trails, varying in difficulty.
Resort | Name
Description
— Address
| Resort Postcode PK
Tel No.
Booking , | Booking ID | PK
- Resort Postcode FK
a : | Date
: : _{ Time es rar are
ae
ee eee Te)
“Wheiaste mer Name
Instructor
REONS rene |linsttructor ID RE
e PK
Ss i e ee
Name
} SS ee ee ee
Address
re = > Te he
| jtTel No.
Ee ae ee en
| 7 Resort Postcode FK
b) Draw the entity relationship diagram for the database shown above.
=
c) Paterson Dirt Moto wishes to store whether each booking has been paid or
not. Describe what change would be made to the database to allow this.
———— eee
a
I ————
(ii) Suggest one concern that office workers may have over this method of
database storage.
I ———
(iii) Suggest a transmission medium that would be used for access to the
distributed storage.
Practice Paper C
MARKS
f) Paterson Dirt Moto plans to release an app that allows people to use a
simulation of some real tracks and control a virtual bike around the tracks,
in the hope that this will draw in some more business.
Describe how Paterson Dirt Moto could ensure that all customers could use
the software regardless of the operating system on their.device.
Each bike contains a GPS transponder that continually updates the office on
the position of the bike as it travels around the track.
(i) Explain two ways in which an intelligent system could use this data to
ensure the safety of customers.
eee
eee
eee
ee eee eee
ee
eee
ee
eee ee eee ee
(ii) Explain how the use of a multicore processor could aid in processing the
GPS data.
ae
SS ee se
a ee ee eee
ee ee eee
eeee eee
=
\
c} A separate part of the program is going to be tested with the following two
arrays, one array containing eight names and one array containing eight
scores:
Practice Paper C 49
C
MARKS
16 Candice is developing a new mobile smartphone for lodyne Technologies. The
smartphone includes a camera for capturing still images and video.
a) Characteristics of stored video include resolution, bit depth and frame rate.
Explain the term frame rate’ with respect to video. 1
b) The video capture and editing app has a screen that shows a large preview of the
video with an area at the bottom to add a comment and three graphical buttons
that allow a user to share the clip to social media, exit the app or view a menu.
Clicking the video preview square will play the video full screen with sound.
Draw a fully labelled wireframe of the user interface for this screen. 3
:
c}) One fairly large program for use on the smartphone is going to be developed
using the step-wise refinement methodology.
(i) Explain the approach taken to designing a solution using step-wise
refinement.
(ii) Give one advantage of how the step-wise refinement methodology could
reduce development time in this situation. 1
e) Some of the apps are tested using beta testing. Give two advantages of
making use of beta testing in this situation.
f) After the phone and a few apps have been released, one of the apps requires
an update to be downloaded. Give two reasons why the app may have had an
update released.
Practice Paper C
| sen inlee tS etd
Oa? CIN ©6
Lorn 2?
a ee
we i me fase up) a)
ae
ees
a Vs Ww? 66 C9en
- oe ce
;
(fens ‘a a0 jhe 41
_ ow ae Logile
_ ‘ aM
Gretg mip odep Vad Temes} ae
GGsiGauilnre t aisha
o@ a ie Wee
|
- 7 ed , = 2 @ af enti eth
qa Om) epnigi=
nn Aiy
aiece
- | ie
_—<s ne oe >
a ne |
a ree ee ae
OO
Answ
Higher
Computing
Science
fy GIBSON
HODDER
LEARN MORE
Practice PaperA
Section 1
Where aporopriate, hints contain the page number of the relevant corresponding material from
sow To Pass Higher Computing Scrence by Greg Reid, published by Hodder Gibson. See
OOO nogge "egt CSt Nd 7 LULURK tO gete iS
Question |Answer
i 10100100 Positive 92 would be 01011100
(1 mark) Invert the bits to get 10100011
Add one to get 10100100
You can always convert it back again to
check your answer.
[For an siternative method, see HTP
2 Unicode can represent a greater range Unicode uses 16 bits per character
of characters than ASC SO can store 2'* os5536) characters.
1 mark ASCIi only uses 7 bits per character.
Answers referring to Unicode being
able to represent non-English language
characters must still refer to the
a ter range of characters that can be
represented by Unicode. With ASCII, the
Sth bit is used as a check digit to take it
up te 8 bits.
y Answers A Ve 55
|Question _[Answer Hint
7 a) (= Data Is lost during compression. Compression involves storing the data
(1 mark] in a different way so that it takes up less
storage capacity, and takes less time to
transmit. Lossy compression will involve
getting rid of some of the data while still
trying to keep as high quality as possible.
Lossless compression will involve storing
the data in a different way that keeps all
of the original data and quality. Run length
encoding (RLE]) is an example of lossless
compression, whereas discrete cosine
transform (DCT] is an example of lossy
compression.
(HTP p.56)
b) Removes sounds that humans Some frequencies that are not in the range
cannot hear that humans can hear are still picked
OR up by recording equipment and stored.
Removes the quieter of two similar Perceptual coding will remove this data.
eaande Where two similar sounds are present, the
quieter one will be removed, as this would
(1 mark] most likely be drowned out by the louder
one when the sound is played.
(HTP pp.57-58]
8 IF parcel code(iteration) = | This is an example of the linear search
target code THEN algorithm. The loop exits if it has checked
OR all the 18 parcels. The missing line is
im pay eer sesde =e Reel needed to set the Boolean variable ‘found’
—~* - to true If the correct parcel is found. This
code (fechat lon) AEN variable was set to false before the loop
(1 mark] was started. Remember arrays are indexed
from zero.
(HTP p.10) |
9 lal Ta compound key Is two or more fields For the first mark, you must express
combined so as to uniquely identify each | both the fact that multiple fields are used
record in a database. together and that this is to ensure you can
(1 mark] have a unique reference for each record in
In this example, there could be a the database.
problem if two staff members have (HTP p.41]
the same forename, surname and
designation.
L | | U1mark) |
b) Any one of: A surrogate key is an extra field added
s Add enew tieldanduce to the database to uniquely identify each
Ade onumber” to decide the record in a database. The field added is
contents not a required piece of data about the staff
a Adda new teldand decide on member, but is instead extra artificial
arbitrary number/text ID for each imadesip) bata onlyeo,they can Wave
menor unique ID. The "Autonumber" field type
(1 mark) is often used for this in popular database
applications. Your SQA candidate number
L | 1s an example of a surrogate key,
Mn,‘
Answers A
rn
A 7
/
Section 2
ESSERE STL SEF SESS LSS SENRELRG IDS IIE UD BES Ht DI GIDL DNS BILE LLM SESS GUTH nica
A a dE ae Lae BE,
Question Answer
11. | a) OPEN FILE VScoreswkxt" The file operations that you may be asked
FOR couUnGcer FROM 0 TO 9. DO to use are listed by SQA in the Course
RECEIVE name(counter) FROM
Assessment Specification: CREATE, OPEN,
READ, WRITE, CLOSE. Be sure to use the
FILE
filename and array/variable names given in
RECEIVE score (counter ) FROM the question.
FILE
(HTP p.7]
NEXT counter
CLOSE Fair,
(1 mark for correct open and close lines)
(1 mark for two correct lines to read
contents into array)
a
arn) DECLARE party[2] As A record allows a set of variables, with
adventurer different types, to be named and organised
(2 marks] under one data structure. DIM in place of
DECLARE would also be acceptable. Be
Sure to use the array name party as this
is given in the question. The [2] indicates
the array size — this will set up an array of
three adventurer records called party [0],
Party) andpariy tT? (.
[HTP
p.7)
=
c) SET party[0].name TO "Grek" | The order you will often see is a line to
SET party[0].strength TO 19 | define the record [in this case this is given
SET party[0].magic TO 3 in the question], then a line to create an
instance of that record - usually as an array
SET party[0].speed TO 6 [this is the answer to part (b}], then code to
SET party[0) .intelligence assign values to the attributes/fields within
TO 4 an instance of the record (the answer shown
OR here in part (c)).
DECLARE party[0] INITIALLY |(H7Pp.7)
SC Ventre ure (Me rek 1 Oma.
6, A,)
OR
SET party[0] TO adventurer
(ICO, e497 si eed)
(1 mark for use of array declared in
part (b], e.g.
Party! ]..)
(1 mark for use of dot to indicate correct
field names)
|_| _| (mark for correct entries into fields] a|
»
58 ‘ Higher Computing Science \
i"
‘N
é
|Question |
Answer [Hint
d) Users may feel that this limits freedom of While you may be tempted to give other
speech. relevant answers, this is the answer taken
(1 mark] from the Course Assessment Specification,
and so is sure to be accepted by markers.
(HTP p.76)
e) Any two of: An older handset will tend only to be able
m There may not be enough storage to update up to a certain version of the
space to install the app operating system. It will also tend to have
poorer specification in both processor and
=» There may not be enough main
storage.
memory to run the app
=» The processor may not be fast enough (HTP p.62)
to run the app
m The handset may not be able to run
the version of the operating system
needed to run the app
(2 marks)
For two tables to have a relationship, one
of the tables must contain a field that is
a foreign key, i.e. the primary key from
the other table. Whichever table contains
the foreign key is on the many’ side of a
relationship with the table for which that
field is the primary key. The answer given
here is to the standard required by SQA.
(However, a more detailed version is found on
[HTP pp.40-41]
1 The field indicated is the primary key
for the Member table; there must be an
(1 mark} entry in this field for every record in that
3 Lookup from Album table table so that each different member can
be uniquely identified.
(1 mark] 2 The field indicated is the primary key for
the Album table; the entry in this field
must be unique for every record in that
table so that each different album can be
uniquely identified.
3 There can be no entries in this field in
the song table of albums that don't exist
in the album table. Asong must appear
on an existing album in this database
example.
rc »
Any one of:
(HTP p.42}
The two user types are novices and experts.
Novices require a user-friendly interface
Novices/beginners because it makes it as they will have little or no technical
easy for them to operate the database
knowledge.
a Novices/beginners because no expert
knowledge is required to perform
tasks on the database
(1 mark]
/ Answers A 59
C 7) oy
ry
hat was
v :
=]
+ fs
)
oO.
8-H BW
re!
q 4s A
OW oS 0 ‘/ ysy)
other
,:
g,
2
3 e YWpd od
tude HTML ¢
e =
«© i) ho M 4) 2) a8) oO.” 6 Mt
as
;v£
.
*
— od "CS
WF A fay WM : 0 ao @
o be added
mie hd Md orf OF
y
»~ VW ,,
ror
e @ 6 fa WH
“ ew
Ws fey 4)
~
ite f
£ r —] ra Pat ”
m4 y 4
Qo =7 a
A 2
e seredi y a 4
{f) Ind oO 8 y) ba) 7; OS hd
ri
- Me) m4 YOon So Magn a 4 ‘YD 0 ee
priate Keywon
a
npting lanquage Ss w
~»
OM BerdOO of I CHD ao oO
Y DOG
—
8OH PP
wi
"Oe £°OHOM2»
~
r. £ wy) ze W@
formatting,3 hyperlink
>
~
‘ { 2 L n ty) a) =
’ OP Ym = i OF
a " ot y rs ~ ©
text con
:im
OD & if fe fl fy HOt 4
o t ce &£Hh he
as vas
ry
s 37s © gt rr,
Ce Ow Yo >
=)
~
wee
rm
a) va Yn &
keyvwo
opt + a Om
tsuogdg¢ o% lawPor Of os by
D pS& ang
with app
5 FS uo Vvax wda
=elevant
CYSE
SEoe
WYW A ry &
STHSYPYV AHH
owe vse VE YVEn OEOO
PH kg Se 0.
)tai no
<
Sire BOS C
Vv OO ROR
VY O VY OCO
UMW W £FVY Sie sBe
Rie of ©EABllWE&
eee
a
SS
ae
s» ) oo th
Te je Tt
cc
ce)
Cj oe ee oo wae
Tad
s To get more hits by getting h
4
OQ bl OC) bed OC) bed
-=
BO ae) Oo —&
for the form open/load event.
an?)
more easily foun d b e
h{ ©
Oo
ranked more highly b > © tH
(a)
m © m © O go
—»
a)
Ch)
Cl)
oOo
of o of - oe *.
PA ded Py 4d ;
Pa
&b
2
'S lie
~~ =
© c
J
W=
D
VW Ww
oO
Any one of
A=
Any one of
Cad
rm)
pa
(0Mm
(1 mark]
(1 mark]
(1 mark)
£ ® = oOcS)= a.5
Sy i)
tags
| w 4 Yi OW | W o|
By
~—_—
— mw J) = wt 1) ©
ww 0
bd MW ©
S
DO es
=
(i)
a
hs
Any two of: The Regulation of Investigatory Powers
a Inform employees that authorities may Act applies only to digital communications,
so be sure to mention this term in your
have access to digital communication
answers.
Provide access/encryption keys to
authorised authorities (HTP p.73]
Have facilities to store digital
communications
Have facilities to monitor digital
communications
(2 marks]
There will be an economic benefit of For a system to be intelligent, its
lower energy bills. programming must allow it to learn from
(1 mark] past experience. It will require user input
and interaction more often initially, but
There will be an environmental benefit of
should progress to needing little or no user
reduced carbon emissions.
interaction as long as user behaviour remains |
(1 mark] the same. It should respond automatically to |
data from sensors or other inputs.
(HTP p.35)
Economic benefits relate to money, but some of
these (such as competitive advantage or access
to a global marketplace) apply more to a
business than to a charity, as in this situation.
= | (HTP pp.65-66)
/ Answers A
y /
Hint ee ee
c] User guide - willexplain how to use the —|While it is true that there may be other
program. documentation also produced (e.g. a licence
agreement] the two descriptions listed are
Technical guide - will explain how to the only ones that SQA have accepted in
nstalV/run the program OR will contain the past.
the system requirements for the program. | (HTP p.19) .
1 mark]
d) Any number less than zero - because |The order of your answer isn't important
this Is exceptional data that the program | as long as the correct explanation follows
should not accept. each answer. A good test plan will test
(1 mark) normal, extreme and exceptional data.
Zero - because this is extreme data on Only normal data is present in the table
the boundary of what should be accepted. | given in the question.
(1 mark] (HTP p.13)
e) Line 3; This is a version of the find maximum
SET max TO numberarray[0] standard algorithm. Variations in the
OR language/wording of your answer from the
SET max TO 0 answer given here will still be accepted,
as long as the meaning is the same as that
ey e ae ; given here. Forgetting to end the IF isa
Le number > max THEN frequent mistake.
max TO number (HTP p. 10)
A Answers A 63
Question Answer
e) The data is encrypted on the user's device | This form of encryption involves two
using Style Print’s public key algorithms for encryption/decryption. If you
(1 mark] encrypt using one, you can decrypt using
and the data is decrypted at the the other, and vice versa. One algorithm
destination using Style Print’s private key. R iiereiore released to.the ey oleleia ie
public key ~ users can encrypt using this
(1 mark] algorithm. The second algorithm that could
decrypt the data is kept secret - as a private
key. So only the one who released the public
key can decrypt data encrypted by that
public key — it is decrypted through the use
of the private key.
i [HTP p.70)
17 | a) Any two of: A prototype is a working version of part of
a Prototypes allow the client to see what |the product produced at an early stage
in
the finished product may look like the development process.
a Client can clarify/change (HTP p.20)
requirements during development
a Aworking version of the app can be
made available (to customers) more
quickly
{ (2 marks]
|b) | Low level language programs are not Low level languages use mnemonics. These
portable are short text codes that mean something
(1 mark] in English, but the meaning can be difficult
So Malala could not easily transfer an app to WOK OULse.g ole i pon be
created on her desktop to run on a mobile implemented could be with the ous
Heirons JNE’, which means ‘jump not equal to’. The
mnemonic will be used along with references
OR to processor registers or components, which
because the low level language will refer |is why low-level instructions are not portable
directly to components of the desktop's to other processor types.
processor. [HTP p.1]
= hi (1 mark]
c) | Use an emulator An emulator will use software to act not only
(1 mark] like another operating system but also the
to simulate the smartphone'’s software beeen lincluding rails
and hardware. registers, ALU, control unit], cache,eels
memory
(Pear) and other hardware of another device. A
virtual machine only simulates another
operating system but does not simulate
hardware.
L (a eee | (ATP p37} a4
.
»,
/| Answers A / 65
A
Question |Answer
18 a) Ensure the embedded CPU has multiple Multiprogramming is the ability of a
cores system to service multiple processes
(1 mark] simultaneously. Multicore processors and
in order to process simultaneous inputs
sufficient RAM are required to do this. As
_ from sensors/user. with all Higher answers, make sure to
refer to the situation given in the question.
/ (1 mark]
/OR
| Ensure sufficient main memory is
| present
! (1 mark]
| to store multiple concurrent/
simultaneous processes.
ab(1 mark]
b) Any two of: | These questions require you to show both
» Thesystem could result in greater fuel technical knowledge and common sense.
efficiency, burning less fossil fuel Make sure to provide a lot of detail to be
a Internal heating/cooling of the car certain of gaining the available marks.
could be more efficient, wasting less (HTP p.76]
energy
'= More older cars may be scrapped,
which could mean more waste in
landfill
» Bernard’s system may tempt
customers to buy this petrol-
powered car rather than a more
environmentally friendly electric or
hybrid car, which would burn less
fossil fuel
| (2 marks]
Bs
Address of instruction placed on There is no need to mention specific
address bus registers such as Memory Address Register,
Read line [on control bus) is activated Memory Data Register, Program Counter
Contents of location (instruction) or Instruction Register. However, you will
transferred to a register along data not be marked down for using these terms
bus correctly.
4 Instruction decoded/executed It is important to memorise the steps of the
| (3 marks for all four steps in the correct fetch-execute cycle as this kind of question
| order) appears fairly often.
(2 marks for three steps in the correct (HTP p.29)
_order OR four steps in incorrect order]
| (1 mark for two steps in the correct order
=
_QR three steps in incorrect order)
| (0 marks for any other response]
66 Ba Higher Computing aN
Answer Hint
Users are given set tasks to perform in The set tasks and scenarios will allow the
the car under a set scenario. developers to target parts of the system
(1 mark] to see how they perform under usability
Observation of performance of users/eye testing. Usability testing is a way to see
tracking/thinking aloud. how easy a program or website is to use by
testing it with real users. They are asked
OR
to complete set tasks while they are being
Feedback is given to developers. observed by a researcher to see where the
(1 mark) users encounter problems. The observed
results are fed back to the development
team to improve the final version.
SS
va
/
yo p
/
/
Answers A j
/
Practice Paper B
SSS SLEDS LESSEE LTO MTEL ELT TEED ce AE RDS OLE IT OST BETES TTL FEIT ELE ETO TEE
(Where appropriate, hints contain the page number of the relevant corresponding material
from How To Pass Higher Computing Science by Greg Reid, published by Hodder Gibson. See
www.hoddereducation.co.uk for details.)
Answers B / 69
Question Answer Hint
8 is Any two of: Declarative languages are used to create
» Facts and rules are stored within the |an artificial intelligence system. The
knowledge base knowledge of the system Is stored in the
= Rules can be used in place of knowledge base using facts and rules.
multiple facts Recursion is when a rule calls itself. The
= Queries make use of pattern knowledge base can be queried to see what
matching/heuristic search/breadth-_ |the system knows.
first search/depth-first search (HTP p.3)
m Uses recursion
| (2 marks]
9 iS RECORD songdetails IS A record allows a set of variables,
{PLIROENG cele; sSrRING with different types, to be named and
artist, INTEGER highest organised under one data structure.
Chart position} This answer defines that a record called
(1 mark for an obvious record structure |Songdetails exists, but no instances of
with a name} the record have been created yet.
(1 mark for all fields with correct data All text in capitals in the answer here IS
types] required exactly as shown. The names lin
lower case] were not stated in the question,
So just have to be sensible.
|__| S HTP p. 7)
=
b) Any one of: As you can see from the answers given,
» DIM songCollection[4999] the ideas are more important than the
as songdetails See ee of the ane a Be sure to use
whichever name you used in your answer
pe ee SUE ee to part (a) asa fa type for cee
oe ee omgderalts array with a new name not seen yet in your
ao ee paper. In this example, the variable/array
s Create variable has been named songCollection. Be
songCollection[4999] of sure to indicate the array size in square
data type songdetails brackets.
(1 mark for array with value] (HTP p.7)
(1 mark for data type from record
(a ais created in part (a})
10 | ASCII takes up less storage. |Unicode uses 16 bits per character so can |
(1 mark] store 2' (65536) characters. ASCII only
uses 7 bits per character so can only store
2’ (128) characters. With ASCII the 8th bit is
used as a check digit to take it up to 8 bits.
te On aera ected|
|
X \
70 x Higher Computing Science ‘
ma ORAS a Mc eae Ae FERNS OES 2D RE I EB ALLL IEE LB II TE
Answer |Hint |
11 | al) (i) SEL Sound TO false This is a version of the Linear Search
Sar wndex' TO” O standard algorithm.
REPEAT Other structures of this solution are
IF name (index) = target _ possible. |
Answers B 71
Question | Answer
b) | (i) | Allocates main memory for the process The functions of the operating system are:
{U1 mark) a Interpreting user commands - receives
(ii) |Any one of: input from the user and works out what
a ldentifies a free space on backing SKY OMBeee yen
storage to store the file us Memory management - allocates
» Updates file directory/access table eae Pye er eye
of memory as free’ when processes are
(1 mark] finished with them
a File management - uses the file
directory/access table to store the virtual
location of a file [in the folder hierarchy)
and the physical location of a file (on
disk}; will mark disk locations as ‘free’ if
data there is deleted
a Input/output management - handles
communication to and from all
peripheral devices
=» Resource allocation - prioritises and
allocates use of system resources (e.g.
access to a device] to different processes
m Process management - each core can
only work on one process at a time; this
function of the OS determines which
process runs on which core and which
have to wait to be processed
a Error reporting - generates interrupts if
L_ = an error is detected
in (i) |49 eles trace table is a paper and pencil
~i
\ ;
\ i 7 Ks
72 \ Higher Computing Science \
\
i"
‘Question _| Answer ‘Hint
e) Can learn from the trends of what hours’ | Most definitions of an intelligent system
the desktop is not in use would include some form of independent
(1 mark) learning by the system based on the data
and automatically shut down it has gathered. An example showing an
OR automatic action based on previous user
; , behaviour is the best way to show your
SUT SU een aMels understanding of the operation of an
(1 mark] intelligent system within a context.
2 [HTP p.35]
Can use geolocation on the smartphone
(1 mark}
to put the desktop Into energy-saving
mode OR shut it down when the user is
not close by.
(1 mark)
OR
User can use app on phone to remotely
(1 mark]
start up/shut down/use energy-saving
mode on the desktop.
eri 4) |(1 mark]
12 | a) Category For two tables to have a relationship, one
of the tables must contain a field that Is
Acuuct a foreign key, i.e. the primary key from
the other table. Whichever table contains
Sarena, the foreign key is on the many’ side ofa
relationship with the table for which that
ule field Is the primary key. The answer given
here is to the standard required by SQA in
epg 2016-17. However, a more detailed version
is likely to be required after changes are
made to the course.
4 (HTP pp.40-41]
b) |(i) |Product.name Take care to use the field names as given
Product.Product ID in the description of the database, not
Product .Description those that appear on the screenshot of
the web page as those labels are often
Manufacturer.Name different.
Category.Current discount (HTP p.43)
(1 mark for three correct tables]
(1 mark for five correct fields)
(1 mark for correctly relating fields
to tables] ie
(ii) Jerodmck. Produc. ID) = v0azZ This is the only entry shown on the query
(1 mark] result that is guaranteed to be unique - the
shop may sell ‘soor plooms’ from a number
of different manufacturers, so the product |
name is not an appropriate answer here.
(HTP p.43]
Vw /
a
y Answers B Fs 73
Question Answer
c) SSCrLpL> The HTML h1 element in the question
function mouseOver () has already been named dani’, so be
{document sure to use this name. The inclusion of
getElementById ("dani"). onmouseover = "mouseOver()"
style.color = "blue"; } ensures that the mouseOver () function
will be called when the pointer moves over
nae Geanieg . the relevant text - your answer need only
(1 mark for opening and closing script show what happens within that function.
tags] Be sure to spell ‘color’ in the US way.
(1 mark for function mouseOver] (HTP p.60]
(1 mark for document.
getElementById("dani"))
(1 mark for .style.color =
"Hlawe™)
aul
ae
td) <meta name = "keywords" Ine tags can be used for a number of
content = "Scottish, Canada"> | purposes. It is important that the tags
(1 mark for "keywords"] contain the correct attribute to match with
(1 leagues ane da") the reason you are using the tag. Here the
ohne a eee ery Cela attribute ‘name’ is used to indicate that
the tag contains keywords followed by the
‘content’ attribute to specify what those
keywords are.
al ath (HTP p.49)
e) Mail services, where emails (and Cloud-based services mean that a third
attachments] are stored on servers on party is responsible for aspects such as
the internet, maintenance of servers, security of data
would save local storage capacity. and replacement of storage devices.
OR (HTP p.67)
meaning emails could be accessed from
multiple locations/devices.
OR
Software updates provided by servers on
the internet for Dani's devices.
(1 mark}
Plus any one of:
a Device updates can be applied
simultaneously
» Device updates can be scheduled fora
convenient time (e.g. at night)
a
Cloud service will be responsible for
ensuring that it is the latest update
that is installed
wl mark}
~ meena Iremeneeremnererty.
7
"
\
\
\ Higher Computing Science
. . . N
\,
\
Question Answer Hint
13 | a) left OR back The actual parameters are created
(1 mark) within the part of the program that goes
on to call the subprogram or function.
An actual parameter is a variable
These variables can be passed into the
in use in the program that calls the
subprogram by value or by reference. If
subprogram/function/procedure.
an actual parameter is passed in by value,
OR the formal parameter will be a copy of
A copy of an actual parameter can be the actual parameter that will only exist
created and sent in to a subprogram/ for the life of the subprogram, and have
function/procedure. no effect on the original variable [i.e. the
OR actual parameter). If an actual parameter
A pointer to the actual parameter can is passed by reference then the formal
parameter will contain a pointer to the
be sent in to a subprogram/function/
actual parameter and any change made to
procedure.
the formal parameter will in fact change
1
Ean) the actual parameter. Passing by value
or reference allows the programmer to
control the flow of data.
A
(HTP p.13)
ra | By value Parameters are passed by reference
when the subprogram has to be able to
(1 mark]
change the variable. Passing by value
as the function does not change the value creates a copy of the variable and sends
of the variable. the copy into the subprogram where
(1 mark) the subprogram should not change the
original variable.
(HTP p.8}
Answers B
Question Answer
e) Hours _hiredwithin the function isa | A local variable is one that is not passed
local variable. as a parameter and is instead only valid
(1 mark] in the subprogram it appears within. Use
of local variables allows variables of the
same name in different modules without
affecting others. Also using local variables
makes a program more modular as parts
can be developed in isolation by different
programmers, or more easily transferred
between programs with little or no
change. Local variables are more efficient
as memory assigned to a local variable
becomes available once the function is
ended.
laren | (HTP p. “)
14 | a) Any two of: Usability testing is a way to see how easy
a Can test with a specific user group/ a program or website isto use by testing
novice/expert it with real users. They are asked to .
w Can assign tasks to test certain areas complete Set tasks while
Grineidite observed by a researcher they are being
to see where the
; users encounter problems. The observed
sea te ae Hteelatciel ye eseyo tne results are fed back to the development
ree ae ee team to improve the final version.
(2 marks]
i= iz —— 4p
b) Any one of: Take care with these questions as there
= Sort Results By are a lot of items on the page that would
PRG cleceView be incorrect due to not requiring any
Rei eRaeraAt scripting. Just because an item is not
generated with server-side scripting,
(1 mark] does not automatically mean that it uses
client-side scripting. The ‘Go’ button does
not require scripting to operate, but will
initiate the search, which is server-side
scripting. The underlined text will link to
another page, but scripting is not required
for a simple hyperlink. The same is true of
selecting Football, Rugby, Cricket or Other.
The correct choices all make use of the
database records that have already been
sent to the client computer by the server.
heal | {HTP pp.60-61) |
c) Any two of: PHP scripts are executed on the server
» Aconnection with the database/server |29d mySQL is used to query the database.
is created The client computer does not see PHP or
= Data from the web page form is SQL as the results are sent back as part of
captured and used to create the query an HTML document.
a The results that match the criteria are |!H7P pp.60-61)
returned to update the web page
| (2 marks] ‘a
“ye |
eee eee
With a public cloud the data is stored Cloud services all store data securely.
securely on the servers of a third party. They will use firewalls and encryption to
(1 mark] ensure this. An authorised user can log
in to any of the cloud services remotely
A hybrid cloud stores some data ona
with a username and password. Public
public cloud, but other data is stored
cloud services are provided by an outside
securely on servers owned by Alford Kits/
company, most likely to many customers,
the company that owns the data.
with all the data kept to separate areas
(1 mark] of the cloud for each customer. A private
cloud is when a company operates their
own cloud services instead. A hybrid
cloud is when a company chooses to use a
combination of these. Don't be confused:
public cloud storage still requires log-on
by a user with the correct username and
password to access data.
(HTP p.67)
Answers B 77
Question Answer Hint
f) | (i) |The colour {code} of the affected/relevant |Vector graphics are stored as text. The
pixels would be changed. (Pixels where text is the list of objects (shapes) and their
the oval has moved from are changed attributes. Attributes include line colour,
from black to white; pixels where the oval | fill colour, coordinates and the layer the
has moved to are changed from white to | shape is on. Adding a new object adds
black.] more text to the file, so increases file size.
_| (1 mark) The system uses the text to Ree the
a4 Bret image; it is not stored at a set resolution,
ii) Sora earn pete Veale SO the resolution is determined by the
re available hardware - scaling will not lead
shape or editing the text of the file]. to pixilation. This is known as resolution
ee ae (1 mark] | independence.
g) (i) iatine new designs have a higher file size Bitmapped graphics are stored using a
(1 mark] colour code for each pixel in the image.
as new shapes/instructions/attributes To move or remove an object involves
have been added. changing the colour code for the relevant
een pixels. These images are saved at a set
Hs iz i: | 4 resolution when created.
(ii) |No change to file size (HTP pp.24-25]
(1 mark)
as the colour of existing pixels has been
changed but no new pixels have been
added.
laietaae ccsPs
(1 mark]
15 :
|a) | (i) | Stores a colour code that repeats in ee
————{
the Run length encoding is lossless
graphic compression - there is no loss of quality.
(1 mark) It is used where a number of pixels ina
andstogesthe numbenceconsecdtive row have the same colour. The colour code
niceletthat haveunatecisuaccde. for that colour is stored, along with the
number of pixels in a row that have that
(1 mark] exact colour.
a eases (HTP p.56)
(ii) areas of similar colour are set to the Discrete cosine transform is a lossy
same colour. compression method where the image
(1 mark] is divided into blocks of 8 x 8 pixels. A
This means there will be more repetitions mathematical equation is applied to each
of a colour code within the graphic. block. The resulting effect is that there are
fewer available colours because areas of
(1 mark) similar colour are set to the same colour.
Fewer possible colour codes can then aid
RLE or LZW compression.
a a |{HTP p.57]
J
»,
\
Higher Computing Science \
|Hint
b) (i) Interframe compression saves the Intraframe compression compresses
differences/changes between frames. each frame, perhaps using DCT and/or
(1 mark} RLE as described above. The first part of
interframe compression involves saving an |
File size is smaller for the speech
initial frame called a key frame. Perhaps
because |-frames will be smaller for a
one of these would be saved each time
video with little movement.
the camera angle changes or anew scene |
OR begins, as that frame will then have little
File size is larger for the dance because resemblance to the preceding frames. The |
|
i-frames will be larger for a video with second part of interframe compression
more movement. involves saving subsequent frames, called |
OR i-frames, where only the changes from
the frame before are saved. The i-frames
File size is larger for the dance because
are saved in this way until the next major
more key frames will be needed in a video
change, when a new key frame would then
with lots of movement.
be saved.
(1 mark)
(HTP p.58]
The frame rate was too low when The frame rate is the number of frames
capturing the video. captured per second. If frames are not
captured often enough, a lot of movement
may have happened between captures,
causing playback to look jerky and unnatural.
=
os
(HTP pp.26-27)
The text ‘Welcome To’ will be centred and laine CSS shown first is internal CSS that
coloured green. sets up that paragraph [indicated by the
On the next line, the text Boris Romanov’ <p> tag) should be centre-aligned with a
will be centred, coloured blue, double the text colour of green. This formatting applies
size of the text on the first line. in line 1 Welcome To’. Line 2 has some
inline CSS that supersedes [replaces] the
On the third line, the text Videography’
internal CSS from the head section. So the
will be centred, coloured green and the
size is changed for this text, and the colour
same size text as the first line.
is also changed. However, the inline CSS
(1 mark for correct colours] makes no mention of alignment, so the
(1 mark for correct alignment and size} alignment of the original internal CSS rule
(1 mark for correctly identifying when text still applies (centre-aligned]. Line 3 has
is on a newline} no inline CSS so the internal CSS rule still
applies to this text. Every pair of <p> and
</p> is indicating a new paragraph, so
appears on a newline.
ad i (HTP pp.82-83]
d) Proprietary software is produced by a Proprietary software often appears in
software development company. questions involving a comparison with open
(1 mark] source software, such as in the 2016 paper.
Proprietary support is provided by the Many of the advantages that you may think
Er ncinreducedrt of for one of these types of software can
pete P , actually apply to both, so take care, e.g. both
OR types can be free and both types are likely to
Boris may already be familiar with the benefit from prompt updates. Advantages of
user interface of proprietary software open source include that it provides support
from previous versions. via a community of users and developers,
(1 mark) and open source code can be edited.
ie (HTP p.65) :
y Answers B 79
id
/
C |
Practice Paper C
section 1
RSS
Ra SOE~ ssc ESET a DLE i ANT A PAT TC AT 7
POPC. MA ASFe Ge o A ai mss Re pc
ee A RETR EOE TTSSS
(Where appropriate, hints contain the page number of the relevant corresponding material
from How To Pass Higher Computing Science by Greg Reid, published by Hodder Gibson. See
www.hoddereducation.co.uk for details.]
Question Answer
1 116 ‘Denary’ is a name for the base 10, or
(1 mark) decimal, number system that you are used
to.
Invert the bits to get 01110011
Add 1 to get 01110100
Converting, this is 4+16+32+ 64
=e
When adding 1, be careful that when you
carry a 1 to the next column you place a 0
in the column you're in, i.e. in binary
0117+.001 = 100
When converting, remember that the
place values of the bits begin with 1 at the
right-most place, and double each time. So
from the right, with 8 bits, the values are 1,
2, GvGielO, S104 7G
(For an alternative method, see HTP
wees
2 Autumn OR Winter OR Spring OR Most functions require some information
Summer to be able to do their job, for example the
(1 mark) LEN ( ) function will return the length of
A variable/a parameter/data that a string that is passed in to the function as
must be passed in toa function forthe |@ argument, suchasSET length to
function to operate. LEN (name).
{| mark) (HTP p.24]
ne ee \
80
\ ry
\.\ Higher Computing
N Wi
Science \iN
\
\ M
C
feuesient ime Taint
3 The possible precision will increase. The mantissa part of the floating point
(1 mark} number is responsible for the precision/
accuracy of the number. The number of
The possible range will decrease.
bits for this has increased from 8 to 16, so
(1 mark) the number can be more precise.
The exponent part of the floating point
number is responsible for the range of
possible numbers that can be stored. The
number of bits for this has decreased from
24 to 16, so the number cannot have as
wide a range as before.
Peace
(HTP
:
p.23)
| =
4 Any two of: ° Procedural languages are designed to
a Instructions are executed in the order |allow programmers to create programs
in which they appear that follow a logical order. SQA have not
= Programs have defined start and end asked an examination question specifically
points about these as yet, so be sure to include
G Bae art b “aa as much information as you can In your
Oe ee est «: anewerto becctre sat gaining the available
using fixed or conditional loops cae ie
= Branching is possible within the .
programs, using conditional/IF (HTP p.2)
statements
s Modular as sets of instructions can
be contained within procedures/
Subroutines
a Data can be passed between
procedures/subroutines through
parameter passing
(2 marks} _|
5 |Lesteywill be able to sell the game to If a program or information system is
more customers. portable then it can be run on a computer
(1 mark) system other than the one it was designed
on, with little or no change. This means
Lesley will attract customers other than
those who own only a certain type of
computer.
zi (HTP p.65]
6 Any two of: Computer systems will pre-load cache
with the upcoming instructions to make
a Instructions 3/4 will already be
fetching them quicker than from slower
(pre-loaded) in cache, i.e. a cache hit
main memory. However, this can be of
will occur
no use if the program branches [using an
a Datainvariable password will IF]. Recently accessed data is also stored
already be in cache, improving access in cache. Cache need only be checked for
time/instruction time data when attempting to read data from
a Instruction 4 may never be reached, main memory - data stored in registers Is
so pre-loading may have no effect already inside the processor. Registers are
(2 marks} faster access memory than cache.
(HTP p.31)
Answers C 81
Cc
‘Question Answer Hint |
7 Any two of: Social media sites must allow users to
Privacy settings should allow users to: _|Configure their privacy settings so that the
users Can protect themselves and their
= control who can see what they port information from being accessed by anyone
a control who can see their profile without their permission. SQA have not
a control who can see specific personal | asked an examination question specifically
information, e.g. date of birth, about thesé as yet, so be sure to include
location, contact details. as much information as you can in your
(2 marks] answer to be sure of gaining the available
marks.
(HTP p.76)
8 <link rel = "stylesheet" This must be placed in the head section
type = "“text/css" href = of the HTML to apply the styling contained
"webstyle.css"> within the external stylesheet to the web
(1 mark for Link] page. Be careful to include css’ at the end
(1 ene of the filename.
mark for type [HTP p.50)
SET
,\,
%, \4,
82 \. Higher Computing Science
\ . . IY \,
\,
C
Question _| Answer Hint
11 Stores repeated patterns of dataina Lempel Ziv Welch compression looks for
‘dictionary’ file. repeating patterns within the data. When
(1 mark] a repeating pattern is found it is stored
in a dictionary file, along with a shorter
Stores a code to match these repeating
binary code to identify it. When the pattern
blocks in the data file.
appears in the image, the data file for the
(1 mark) image will store the shorter lookup’ code
rather than the full pattern code. However,
the data file cannot reproduce the image
without the dictionary file. This is a lossless
compression technique.
E.g: If this was being used to compress an
800 x 800 bitmap of a chess board, it would
notice that each row of pixels has only one
of two possible patterns. Either the pattern
of 100 white pixels then 100 black pixels
four times, or the pattern of 100 black
pixels then 100 white pixels four times.
So the dictionary file would store ‘0’ and
the first pattern, then 1° and the second
pattern. This means the data file would
only store one bit for each row of pixels In
the image.
(HTP pp.56-57]
A
Answers C /
C
Section 2
Question _| Answer
12 |a) OPEN FiLE “steats.cxt™ Remember: arrays are indexed from
FOR counter FROM 0 TO 31 DO |zero. Dot notation is often used when
RACE IVER Anenor ty (counter referencing attributes of records within
= programs. However, if you just have
ee ee authority.name, the program
RECEIVE authority (counter) .« |wouldn't know which of the authorities you
annual rainfall FROM FILE | are referring to, so the correct
RECEIVE authority (counter) . | syntax is either
hours sunshine FROM FILE SULhOPLLyY (counter) mame. or
RECEIVE authority (counter). authority.name (counter).
average windspeed FROM FILE (HTP p.7]
NEL Counter
CLOSE FILE
(1 mark for open and close file}
(1 mark for correct fixed loop/end loop)
(1 mark for correct relation of field name
to record name}
(1 mark for reading from file using
‘counter’ correctly to index the array]
b) Any two of: The arguments are the parameters passed
a» Jiong’s windspeeds are of type real: into a function so that it can do its job.
this function processes windspeeds of Rebekah’s function here expects one
type integer argument; an array of integers. Jiong has
ws This function returns only the number used an array of records, so the function
of the highest windspeed, not the name would have to be changed to accept an
of the authority this corresponds to array of records. Once this had been done,
it could then be further changed to find
a» Jiong’s windspeeds are as attributes
the name of the authority with the highest
within an array of records; he cannot
average windspeed.
pass only the windspeeds as an array
into this function as an argument
a (2 marks] |
13 | a) Sal total sto) Thisis an example of the count
FOR entry FROM 0 TO 299 DO_ | occurrences standard algorithm.
IF age(entry)<18 THEN (ATP pati}
pul total VO Twotaei
END IF
END FOR
SEND total IO DISPLAY
(1 mark for initialising total to 0)
(1 mark for correct loop/end loop)
(1 mark for IF with correct condition
andEND IF)
(1 mark for increment total)
(1 mark for displaying total)
™, »,
ae /
4 Answers C a
f
C
Question Hint
(i) | Quality will have been lost as DCT is DCT loses data by looking at areas of
lossy compression. 8 x 8 pixels and applying a formula. The
(1 mark} result means that fewer colours are
shown, so data and quality are lost.
(HTP p.57)
(ii) Analogue-to-digital conversion will An interface is designed to compensate
| | already have taken place within the for differences between how a device may
|digital camera at the time of capture/ operate and how a computer operates.
storage. In the past, it was a piece of hardware
separate from either, but nowadays It is
usually part of the peripheral device.
The five functions of an interface are:
= data format conversion for converting
camera signals, e.g. serial to parallel
» buffering/temporary storage of data
in transit between the camera and the
computer compensates for differences
in speed between the camera and the
computer
» handling of status signals so as
to ensure camera data is received
correctly
= voltage conversion so as to change
voltage levels of the camera to relevant
levels for the computer
= protocol conversion to ensure camera
and computer adhere to the same
protocols.
Ordinarily data format conversion between
analogue and digital might also be
relevant, but is not in this case as this is
done in the digital camera at the time of
capture, not at the time of transfer toa
computer.
| (HTP p.31)
\
. Higher Computing Science .
-
(iii) A ny two of: The operating system has seven main
Interpreting user commands functions.
(1 mark}: Interpreting user commands processes
= receives the input from the user to information entered by the user and
initiate transfer (1 mark] converts this to the correct instruction that
File management (1 mark]: the user intended to give.
u identifies a free space on backing Memory management monitors what areas
storage to place photo files (1 of main memory (RAM) are available for
mark] use and assigns memory to processes.
OR File management uses a file access table
= updates/checks file directory/file to keep track of the physical location of
access table (1 mark] data on the storage devices and link this to |
OR ; their apparent location within the folders
un locates files on camera storage and subfolders that the user sees. It keeps
(1 mark) | track of free space.
Memory management (1 mark]: Input/output management ensures that
a allocates main memory for communication with devices takes place.
process/photos (1 mark]
Resource allocation determines which
Input/output management (1 mark):
processes can access which system
a transfers from camera memory to
resources at any given time.
backing storage [1 mark)
Resource allocation/process Process management decides which
management (1 mark): process (or processes if multiple cores are
= managing processes and memory available) will receive processor time.
(1 mark) Error reporting detects errors and
Error reporting (1 mark]: generates an interrupt if necessary.
= generates an interrupt if there is
an error during transfer (1 mark]
h) Any two of: This would be particularly effective on
human hd speech
cays as the frequency of one
= Stores an attempt to predict the
frequency of future samples (linear | PETSONS VOICE does not change a great
prediction] deal across the course ofa recording, SO
Be seeped difference penvecnavhat the linear prediction would be quite close
to the actual samples. >
was predicted and what was actually ;
sampled (Golomb-Rice encoding} Other features of FLAC include that it is
= Applies run length encoding/RLE open source and that it was designed to be
(st 3 03) quick to decompress and for fast playback.
|
14 |a) Any one of: A surrogate key is an extra field added
to the database to uniquely identify each
é 2 record in a database. The field added here
is not a required piece of data about the
(1 mark] instructor/booking, but is instead extra
artificial {made-up} data only so they can
have a unique ID. The Autonumber
field type is often used for this in popular
database applications. Your SQA candidate
i number is an example of a surrogate key. —
oe
———————
ke Answers C f: 87
C
Question Answer
b) instructor S-{ Resort Track For two tables to have a relationship, one
—- a of the tables must contain a field that is
ae a foreign key, i.e. the primary key from
| the other table. Whichever table contains
| (1 mark for each correct relationship: the foreign key is on the many’ side of a
Many Instructors to one Resort relationship with the table for which that
| Many Tracks to one Resort Be pale Beata ae ;
: This example is particularly tricky as all the
Many Bookings to one Resort) relationships are with the Resort table. A
| database like this could just as easily be set
up with the relationship between Instructor
| and Booking rather than Instructor and
| | Resort, so be careful not to use your own
common sense but stick to checking where
the FK’ text appears. The answer given
here is to the standard required by SQA in
2016-17. However, a more detailed version
is likely to be required after changes are
| made to the course.
= (HTP pp.40-41.]
c) Add a Boolean-type field to the Booking | Boolean fields can only have two values:
table. true or false. On the screen they are
_| | (1mark) normally represented as a check box. |
1d) | Set up a form that allows entry of resort | Forms allow data entry from users only in
| name and difficulty. a restricted way. However, that data must
(1 mark] still be made use of to query the database.
Use the form contents to construct a query Be sure to include sufficient detail about
(1 mark] all steps to gain all the available marks.
on the fields Resort .Name and (HTP p.42]
Ereck
Dl fAcuLley.
(1 mark}
Update the screen with the query
results.
= (1 mark)
e) | (i) | Any two of: Distributed data storage involves storing
» Data is duplicated across servers so if the same data on two or more servers in
one goes down the data is still available physically separate locations. While this
» Data is duplicated across servers so involves duplication of data, which costs
if one is busy another can service the more in terms of purchasing storage
request hardware, there are clear advantages
» Requests can be serviced by a relating to data access.
physically closer server that will
allow faster access
(2 marks)
| (ii) Any one of: Office staff concerns will be related to
» Changes to records may take time to be functionality of the database.
applied across all relevant servers
» Connection to other sites may go
down, perhaps making some data
inaccessible
(1 mark)
\ ;
aan
\ Higher Computing Science X
\ ¥
C
Question
_| Answer Hint
(iii) Any one of: Where a network stretches across a large
=» Broadband geographical area, it will prove necessary
a Optical fibre to lease a connection. Satellite links would |
not be needed for a connection entirely
a UTP
within the UK.
Copper wire
T1-5
a DS1-5 leased from a telecom
cornpany
a ISP
(1 mark)
Create a web-based app rather than a Development of different apps for different
native app. | operating systems is eliminated in the
(1 mark] question.
This can then be viewed using any Use of emulators is not valid as the
browser (regardless of operating question focuses on what Paterson Dirt
system). Moto could do rather than what the users
(1 mark} could do.
OR [HTP p.62]
So that there is no need to install an app
for a specific operating system.
(1 mark} |
g) (i) Any two of: Most definitions of an intelligent system
a If aGPS signal indicates that a bike is would include some form of independent
learning by the system based on the data
taking a good deal longer than usual
it has gathered. An example showing an
to navigate a track, alert an instructor
automatic action based on previous user
a If aGPS signal indicates that a bike
behaviour is the best way to show your
has remained stationary on the track
understanding of the operation of an
for a certain length of time, alert an
intelligent system within a context. In this
instructor
context, the system Is learning about the
a lf aGPS signal indicates that a bike shape of the track and the time users should
has left the track, alert an instructor take to get around it. Various automatic
a If aGPS signal indicates that a bike is actions can be taken based on input from the
extremely close to another bike, alert GPS sensor meeting certain conditions.
an instructor (HTP p.35]
a If aGPS signal is lost, alert an
instructor of the last known location
| (2 marks)
tii) Specific processes/instructions/tasks/ Multicore processors allow parallel
bikes can be allocated to certain processing, i.e. multiple processes being
processors/core processors serviced simultaneously. With a number of
(1 mark] bikes sending simultaneous updates, this is
allowing concurrent/simultaneous clearly advantageous in this situation.
execution/parallel processing. (HTP p.30]
(1 mark)
y Answers C
|Question Answer Hint pe eee
15 |a) | | Any two of: Be sure to include sufficient detail in your
| | 'm Uses English-like words, so itis easier |answer.
to learn/find errors/create programs (HTP p.1)
» Portable as it can easily be
| transferred between systems other
| than the one it was designed on with
| little or no change
| a Translation to machine code is
| | required/necessary
eee ee | (2 marks]
| b) | Correct Normal test data to be entered A test plan always includes the expected
| (any integer 1-99] with the expectation result for an entry. Stating the type of test
| that this will be accepted. data (Normal/Extreme/Exceptional) is
| |(1 mark] advised. Extreme Is valid data that is right
| Correct Extreme test data to be entered on the edge of a boundary. Exceptional is
| | |(0 or 100) with the expectation that this invalid data. Candidates may be tempted
| |will be accepted. to use a string as an Exceptional entry but
it is best to stick to a number to be sure of
| | (1 mark]
gaining the mark.
| Correct Exceptional test data to be entered (HTP p.13}
(integer less than 0 or integer greater than
| | | 100 or real value} with the expectation that
| this will not be accepted.
| | | (1 mark}
| cd) | BOR ndex = 0. TO. 7 This is a version of the linear search
| IF score(index) = 100 THEN standard algorithm. The data given has
SEND name (index) TO more than one pupil who has scored 100,
so be careful to display the data inside the
DISPLAY
IF and FOR loop rather than at the end to
| END IF avoid only showing the last name found.
|NEXT index (HTP p.10)
| (1 mark for correct fixed loop with END
| loop]
(1 mark for IF with correct condition)
| {1 mark for displaying name within the IF]
enna ee
~
\
Preview of
video Show menu
Exit
Can type
description
/ Answers C / 91
C
Question |
Answer
c) | (i) | Problems are broken down into steps. Step-wise refinement is a form of top-
(1 mark) down design.
Each step is further broken down until it
can be solved in one line of code.
i (1 mark] sod
i |Any one of: Be sure your answer refers to development
a Different teams of programmers time.
can be assigned to different tasks/ A module is a section of code, such as a
modules at the same time method, function or procedure/subroutine.
=» Perhaps some code can be reused A module library may contain fully coded
due to modular nature of solution, and documented modules that can be
saving development time reused In order to reduce development
time.
(1 mark]
L_ (HTP p.7)
d) Execution of the program will pause There are two ways to pause the program
when a specified variable is accessed/ mid-execution In order to check If the
changed. variables contain the data the tester
(1 mark] believes that they should. Breakpoints
are set on a specific line of code, so the
The programmer can compare values of
program will pause when that line has
variables with expected values.
been executed. Watchpoints are set ona
(1 mark] particular variable, so that the program
can be set to pause either whenever that
variable is accessed or whenever that
variable is changed.
e) The beta testers may find errors that In many situations beta testers will also
in-house testers have overlooked. test the software with a variety of operating
(1 mark) systems and software and hardware
The beta testers may generate user configurations, which can make it more
interest in the app/smartphone. likely that any potential clashes will be
found. However, that is not relevant in this
(1 mark)
situation as all will be testing on the new
smartphone.
(HTP p.19]
f) Any two of: Maintenance is changing a program after
a 1o fix/correct an error/security flaw its release. Corrective maintenance is
discovered after release amending a program to fix errors that were
not found in pre-release testing. Adaptive
= To enable the app to work with a new
maintenance is changing the program to
version of the smartphone’s operating
work under new conditions. This could be
system
for a new or upgraded operating system,
w To add anew feature to the app
or could be to work with new hardware.
(2 marks] Perfective maintenance is adding new
functionality to software.
(HTP p.19)
™,
,"
‘hy,
\, Higher Computing Science X
C
[Hint
g) Any one of: Compatibility issues are common when
The user’s phone may not have trying to run newer versions of software on
older devices. The new phone may feature
enough main memory
an accelerometer that the old one lacks,
The user's phone may not have
or may use an onscreen keyboard via a
enough processor speed/cores
touchscreen where the old phone had a
The app may not be compatible with
keypad.
the older operating system
The app may require hardware that Is
(HTP p.62)
not present in the old smartphone
(1 mark] 7
Answers C 93
= aN
i. _ ;
» Aas reteae
: a
ae: Pea sea =
ae = i
a a woe _
_ yy a a --e® - Ys _ _
-
aca ee
_
-
0
=
a
-
—— : “ : 14
:
P : om,
: | one i
; eat 7 b¢ . a |
7 Be y i -
4
- - 7 — _
Practice Exam Practice Exam Practice Exam
Higher Papers Higher
ahs Higher
SON BIOLOGY BUSINESS
How to Pass SoM ANAGEMENT How to Pass SOA HEMISTRY
Biology 9
HIGHER
Business Chemistry
Management
5 Hopper 7
Billy Dickson and Graham Moffat Craig McLeod
<5 Hove
ed (eid (8 =>
4-100) Practice Exam Practice Exam
Papers Higher Papers . Papers Higher
Higher
|
OMPUTING
x
SCIENCE NGLISH Son . RAPHY
How to Pass How to Pass
HIGHER HIGHER
Science
> HopoeR
BIOLOGY
f
:
/ Howto Pass SON ee
Me a ay hk
[ Comy
Top t
notes
ie
n tJ
/
P),
mh,
ce
om
Pod e Gety de —r advice
= es technique
' Gy Hopper
john A. Kerr and Simon Wood L Billy Dickson and Graham Moftat
re DER
:
Practice Exam Practice Exam
Papers Higher Papers Higher
MODERN PHYSICS
ii How to Pass STUDIES How to Pass SOA
HIGHER HIGHER
Modern Physics
Studies
Practice Exam
Papers
Higher
=~ COMPUTING
“~~ ~SCIENCE
Make a difference!
Practise for your SQA Higher exams with specially commissioned
Hodder Gibson Practice Exam Papers with complete answers.
Hodder Gibson
Scotland’s Number One Educational Publisher
d+ HODDER
J CIBSO! £9.99 9 781510"41 35 3 |
www.hoddergibson.co.uk