Booksolution Olevel
Booksolution Olevel
1 Data representation
Answers to activities
1.1
a 51
b 127
c 153
d 116
e 255
f 15
g 143
h 179
i 112
j 238
k 487
l 1364
m 3855
n 1992
o 2047
p 31984
q 16141
r 49983
s 34952
t 32767
1
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
1.2
a 00101001
b 01000011
c 01010110
d 01100100
e 01101111
f 01111111
g 10010000
h 10111101
i 11001000
j 11111111
k 1000000011101000
l 0000001101111000
m 0000111111111111
n 0100000000010000
o 1111001101100011
1.3
a C3
b F7
c 27F
d 4EE
e 1E1
f 89E
g (0)4FE
h (0)E9C
i FF7D
j 67AE
1.4
a 0110 1100
b 0101 1001
c 1010 1010
d 1010 0000 0000
e 0100 0000 1110
f 1011 1010 0110
g 1001 1100 1100
h 0100 0000 1010 1010
i 1101 1010 0100 0111
j 0001 1010 1011 0000
Cambridge IGCSE and O Level Computer Science Teacher's Guide © David Watson and Helen Williams 2021
Answers to Student’s Book 2
1.5
a 107
b 156
c 74
d 255
e 511
f 2561
g 2996
h 3240
i 4782
j 44425
1.6
a 62
b E3
c 1EA
d 1FF
e 33A
f 3E8
g A4A
h E9F
i FA7
j 1388
1.7
1 Student investigation
2 a 35, 37, 8B
b C9, 7A, CC
c C, 6F, 51
1.8
a 10000011
b 01100110
c 01111011
d 10110110
e 01101111
f 10110111
g 01111110
h 01110000
i 11111110
j 11011101
Cambridge IGCSE and O Level Computer Science Teacher's Guide © David Watson and Helen Williams 2021
Answers to Student’s Book 3
Answers to Student’s Book
1.9
a 98 = 01100010 and 15 = 00001111; sum = 01110001 (= 113)
b 29 = 00011101 and 88 = 01011000; sum = 01110101 (= 117)
c 49 = 00110001 and 100 = 01100100; sum = 10010101 (= 149)
d 51 = 00110011 and 171 = 10101011; sum = 11011110 (= 222)
e 82 = 01010010 and 69 = 01000101; sum = 10010111 (= 151)
f 100 = 01100100 and 140 = 10001100; sum = 11110000 (= 240)
g 19 = 00010011 and 139 = 10001011; sum = 10011110 (= 158)
h 203 = 11001011 and 30 = 00011110; sum = 11101001 (= 233)
i 66 = 01000010 and 166 = 10100110; sum = 11101000 (= 232)
j 211 = 11010011 and 35 = 00100011; sum = 11110110 (= 246)
1.10
1 a 89 = 01011001 and 175 = 10101111; sum = 1 00001000 (= 8)
overflow error has occurred (9 bits)
b 168 = 10101000 and 99 = 01100011; sum = 1 00001011 (= 11)
overflow error has occurred (9 bits)
c 88 = 01011000 and 215 = 11010111; sum = 1 00101111 (= 47)
overflow error has occurred (9 bits)
2 a 1101 1111 0010 1010 – result is correct
b 1 1110 1011 1110 0100 – overflow error has occurred
1.11
1 a denary value = 64 + 32 + 8 = 104
00001101
b denary value is 13 (104 ÷ 8) therefore shift three places right is the same as division by
23 (i.e. 8)
c denary value = 15
11110000
d denary value is 240 (15 × 16) therefore shift four places left is the same as multiplication by
24 (i.e. 16)
2 a 29 = 00011101 and 51 = 00110011
b sum = 01010000
c 00001010
d 75 = 01001011
e 01010101
f 10101010
4
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
1.12
1 a 00100111
b 01000010
c 01011000
d 01100110
e 01101111
f 01111101
g 01001101
h 00010100
i 00110001
j 00111000
2 a 85
b 51
c 76
d 126
e 15
f 125
g 65
h 30
i 113
j 120
1.13
a 11101110
b 11100001
c 11010001
d 11000001
e 10101000
f 10100100
g 10011100
h 11111111
i 11110000
j 10000001
Cambridge IGCSE and O Level Computer Science Teacher's Guide © David Watson and Helen Williams 2021
Answers to Student’s Book 5
Answers to Student’s Book
1.14
a −51
b −66
c −17
d −121
e −96
f −7
g −81
h −1
i −127
j −10
1.15
1 i The number of possible colours of a group of pixels (usually three or four) based on the bit
depth.
ii The coding system for all the characters on a standard keyboard and control codes; extended
ASCII, gives another 128 codes to allow for characters in non-English alphabets and for
some graphical characters to be included.
iii The coding system which represents all the languages of the world (the first 128 characters are
the same as ASCII code).
iv The number of sound samples taken per second.
v Images which are made up of pixels.
2 i, ii, iii each colour is 28 = 256
iv 256 × 256 × 256 = 16 777 216 possible colours
3 They both increase the size of the sound file.
1.16
1 1920 × 1536 = 2 949 120 pixels
4 sample size = 44 100 × 16 × 210 × 2 (two songs) = 296 352 000 bits
iv The developer may wish to use lossy compression and use the JPEG format to save
space on their camera and/or computer.
2 a The editor decides how many bits to represent the sound amplitude. Increasing the number of bits
to represent sound amplitude increases accuracy; this is sampling resolution. The editor also
decides how many samples per second should be taken; this is the sampling rate – the higher
the number of sound samples per second, the better the quality of the sound recording.
b The editor will use lossy format, for example, MP3 format, which uses perceptual music
shaping, which removes sounds the ear cannot hear properly, therefore the sound quality is
essentially retained.
Lossless files would be larger than lossy files for little improvement in sound quality. c i
RLE is a form of lossless compression. It reduces the size of a string of adjacent, identical
data, for example, repeated colours of an image. The repeating string is
encoded into two values; one value represents the number of identical items and the
second value represents the code of the data item (ASCII code).
ii 3G 2W 4G 9W 4G 2W 1G 2W 2G 2W 1G (W = 1 and G = 0)
⇨ 30 21 40 91 40 21 10 21 20 21 10
8 × 4 grid = 32 bytes
RLE code = 11 × 2 = 22 bytes
3 a 32 + 16 + 4 + 2 = 54 (base 10)
bi00011011
ii 16 + 8 + 2 + 1 = 27 (base 10)
ci11011000
ii 128 + 64 + 16 + 8 = 216 (base 10)
Therefore two places shift to the left = multiply by 4 (22)
4 a Parts i to iii
01111011
00110111
10110100
b i 123 + 55 = 0 1 1 1 1 0 1 1 + 0 0 1 1 0 1 1 1 = 1 0 1 1 0 0 1 0 (178)
ii 123 + 180 = 0 1 1 1 1 0 1 1 + 1 0 1 1 0 1 0 0 = 1 0 0 1 0 1 1 1 1 (47), which is
incorrect; overflow has occurred
ci01110100
two’s complement gives: 1 0 0 0 1 1 0 0 (−116)
ii −112 = 1 0 0 1 0 0 0 0
iii 1 0 1 1 1 0 0 1 = −128 + (32 + 16 + 8 +1) = −128 + 57 = −71
di01101000
ii 1 0 0 1 1 0 0 0
5 a A picture element is the smallest element used to make up an image; each pixel is represented
by a minimum of 8 bits and 3 pixels are needed to make up the RGB colours. b The number of
possible colours of a group of pixels (usually three or four) based on the bit depth.
c 1140 × 1080 = 1 231 200 pixels
⇨ number of photos = (32 × 1024 × 1024 × 1024)/(3 693 600) = 9302 photos d Use file
compression (e.g. JPEG) which reduces the size of the files/images being stored. Therefore
more files/images can be stored on a memory stick.
8
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
b Lossy:
7a
Hours 0 0 0 0 0 0 1 0
Minutes 0 0 0 1 1 1 1 1
Seconds 0 0 1 1 1 0 1 0
b00000101=5
0 0 0 1 1 0 1 0 = 26
0 0 1 1 0 1 1 1 = 55
Time shown as:
9
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
9
Cambridge IGCSE and O Level Computer Science Teacher's Guide © David Watson and Helen Williams 2021
Answers to Student’s Book 10
Cambridge IGCSE™ and O Level Computer Science
2 Data transmission
Answers to activities
2.1
1 Parts i and ii
• routers check header against IP address values to determine next router to send data packet •
hop value checked to see if it is zero
3 a This takes all the 1-values in the payload and adds them together to generate a hex number. • this
b 29 1-bits ⇨ 1D in hex. If recalculated value doesn’t equal 1Dhex then it needs to be re-sent. 4 a •
packets keep 'bouncing around' from router to router and never reach the destination • use hop
numbers; if hop number = 0 then the packet is deleted and is therefore lost
1
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
• … each time a data packet reaches a router, the hop number is decreased by 1
• … once the hop number = 0, and the destination hasn’t been reached, then the data
packet is deleted
c • each packet takes a different route …
• … therefore if a packet is intercepted, hacker still won’t have the whole message 2.2
1 i data sent one bit at a time over a single channel in both directions, but not at the same time ii
several bits of data sent down multiple channels in both directions, at the same time iii data sent
one bit at a time over a single channel in one direction only
2 i serial, simplex data transmission
ii parallel, simplex data transmission
iii parallel, full-duplex data transmission
iv serial, full-duplex data transmission
v parallel, simplex data transmission
2.3
Statement True False
Packets have a header which contains the IP address of the sender and
the receiver ✔
✔
Packets don’t require any form of error checking
✔
Serial data transmission suffers from data skewing
✔
The longest cable length supported by USB is 5 metres or less
Simplex data transmission occurs when data is transmitted one bit at
a time ✔
2.4
Parity bits: 1, 0, 1, 1, 0, 0, 1, 0, 1, 0
2.5
1 no error, error, error, no error, error, error, no error, no error, no error, no error
2
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
⇨ 26 + 12 + 33 + 10 + 9 + 8 + 0 + 0 + 0 + 16 + 6 + 16 = 136
136/11 = 12 remainder 4
11 – 4 = 7, the check digit
ii ISBN 13: 9 + 9 + 1 + 1 + 3 + 4 = 27
3 × (0 + 8 + 2 + 2 + 5 + 4) = 3 × 21 = 63
(27 + 63)/10 = 90/10 = 9 remainder 0
check digit = 0
Modulo-11: sum = (13 × 9) + (12 × 0) + (11 × 9) + (10 × 8) + (9 × 1) + (8 × 2) + (7 × 1) +
(6 × 2) + (5 × 3) + (4 × 5) + (3 × 4) + (2 × 4)
⇨ 117 + 0 + 99 + 80 + 9 + 16 + 7 + 12 + 15 + 20 + 12 + 8 = 395
395/11 = 35 remainder 10
11 – 10 = 1, the check digit
2.8
1 Tom would need to send Jane his public key.
2 Two keys are required; one of the keys is only known to the recipient of the document (i.e.
the private key).
3
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
2.9
a E – text following an encryption algorithm
b B – the receiver
c B – plaintext
d E – there is a security problem when transmitting the encryption key
e A – symmetric key encryption
f E – check digit
g A – automatic repeat request
h B – parity check
i D – checksum
j A – echo check
4
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
2 i Packet switching is a method of data transmission where a message is broken into many data
packets, which can then be sent along different pathways independently of each other. ii Cyclic
redundancy check is an error-checking method which adds up all the 1-bits in the data packet
payload and stores this hex number in the trailer; the same calculation is done at the receiving
station.
iii Data skewing occurs when data arrives at the destination with the bits no longer
synchronised; this usually occurs during parallel data transmission.
iv Universal serial bus is a type of serial data transmission which has become the industry
standard for connecting computers to devices using the USB port.
v Parity bit (0 or 1) is added to a byte of data in the most significant bit position (left-most bit);
this ensures that the byte follows the correct even parity or odd parity protocol.
Description Checksum Parity ARQ
✔ check ✔ ✔
Cambridge IGCSE and O Level Computer Science Teacher's Guide © David Watson and Helen Williams 2021
Answers to Student’s Book 6
7ai Answers to Student’s Book
Method 1 Method 2
Tick ✔ Tick ✔
Serial Simplex
✔
Parallel Half-duplex
Full-duplex
✔
• byte checked at destination to see if it has the correct parity protocol (odd or even) • if
the parity has changed, an error has occurred
ARQ:
• when device detects an error in the data transmission, it requests the packet to be re-
sent; if no error, a positive acknowledgement is sent
• universal standard, so it is likely to be compatible with the computer • can only be inserted
one way, so there is less chance of connecting a device incorrectly • high-speed data
connection, so data transmission is fast
• does not require (wireless) network, therefore can be used even if network is down •
backwards compatible, so no additional technology required
• no need for a separate power source, because USB supplies (5V) power • drivers are
automatically identified/loaded, so no need to find them online/installs drivers
automatically
8
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Cambridge IGCSE™ and O Level Computer Science
3 Hardware
Answers to activities
3.1
1 a address bus, data bus, control bus
b address bus: carries addresses throughout the computer; it is unidirectional
data bus: bidirectional bus allowing data to be sent throughout the computer
control bus: carries signals from the control unit to all other computer components; it
is bidirectional
c • wider address and data buses would increase computer performance
• higher clock speed would increase processor speed, (overclocking could have serious
consequences however, such as unsynchronised operations or overheating)
2 fetches
current instruction register (CIR)
program counter (PC)
memory address register (MAR)
address bus
memory data register (MDR)
decoded
executed
control signals
control bus
arithmetic and logic unit (ALU)
accumulator (ACC)
1
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
3.2
1 a • increasing the width of the address bus and width of the data bus •
• use of larger cache memories (uses static RAM) which have faster data access time than
normal RAM (which is dynamic)
• using dual core and quad core processors; but doubling number of cores doesn’t double
processor performance since the CPU needs to communicate with each core which uses up
time
b • instructions are a set of operations which are decoded in sequence
• each operation is made up of an opcode (which informs the CPU about what operation
needs to be done) and an operand (data which needs to be acted on/register) • limited number
of opcodes exist and this is known as an instruction set
• instruction sets are low level language instructions which instruct the microprocessor how
to carry out an operation
2 a • destination address input
• data from satellites, which gives the location of three or four satellites … • …
together with very accurate timings
• Sat Nav computer uses satellite data to calculate the position of a car on the
stored maps
• this combination allows accurate tracking of the vehicle on stored roads b • use of satellite
or cellular network used to download the latest map updates/software updates
• if the Sat Nav is a portable unit, it can be connected to a computer via USB port and new
maps/software will be downloaded
3.3
1 a || wwwbwbb/wwwbbwb/wwwbbwb || bwwwwbw/bwbbbww/bbbwwbw || b ||
wwbbwwb/wwbwwbb/wbbwwwb/wbbbwbb ||
bwbwwww/bwbwwww/bwbbbww/bwwbwww ||
c || wwwbbwb/wbbwwwb/wbbwbbb/wbbwbbb/wwwbwbb ||
bbbwwbw/bbwbbww/bbbwbww/bbwwbbw/bwwbwww ||
2 a • hold more information
• the remaining corner square is used to ensure the correct size and correct angle of QR
camera shot
d • more than one QR format exists
2
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• QR codes can contain malicious codes (called attagging); QR code software is free;
therefore, it is easy to embed malicious software or fake websites
3.4
1 a Laser printer:
• makes use of the properties of static electricity to produce text and images on paper •
prints whole page in one go
• printing is done line by line as paper advances forward after each printed line • ink
droplets are ejected onto paper using thermal bubble or piezoelectric technology b Parts i and ii
Laser printer:
• can print on various types of paper and other media (for example, can print on T-shirts)
• where small paper trays and small capacity ink cartridges are not important for small print
jobs
2 Order: C, E, G, A, I, B, F, H, D
3 a In an LCD–LED screen, each pixel is made from liquid crystals that are backlit using LEDs.
In pure LED screens, the pixels are made up of the LEDs themselves. b LEDs:
4 • Filipe uses an application on his computer that can play music files. • The application finds the
files on the backing store (HDD or SSD) and moves it into RAM.
• The data in the file is read by the application and then sent via a device driver to
loudspeakers which are connected to the computer.
• The device driver software translates the digital data into a series of analogue electrical
signal using a digital-to-analogue converter (DAC).
• The electrical signals make the loudspeaker cones move, through the use of a solenoid. • If
the file is a stereo recording then two different signals are sent to each loudspeaker.
3
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• The movement of the loudspeaker cone moves molecules of air, which Filipe's ears detect, and
means he can hear music.
3.5
1 a Control:
• if the temperature sensor reading > set temperature, the microprocessor will send a
signal to an actuator …
• if the temperature sensor reading <= the set temperature, the microprocessor will send a
signal to an actuator …
• if the humidity sensor reading > factory set value, the microprocessor will send a signal to an
actuator …
• if the humidity sensor reading <= the factory setting AND temperature sensor reading <
the set temperature …
• … the microprocessor will send a signal to an actuator to switch off the air
conditioning unit
4
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• monitoring/control is continuous
4 • pressure sensors in all four roads at junction used to detect vehicles approaching lights in all
directions
3.6
1 a RAM – settings (time, weight, defrost, …)
ROM – microwave wavelength, pre-programmed cooking times, safety systems b
RAM – temperature settings
ROM – control program to monitor fridge
c RAM – user settings, bespoke programs
ROM – wavelength of remote signals, pre-programmed flights, …
3.7
1 RAM:
• when phone switched on, it pulls OS and app data from solid state memory to allow it to
function; user’s data
Solid state:
• used to store apps and operating system so that it is always there even when phone
switched off
• part of solid-state memory not accessible to users (for example, the OS) •
stores user’s photos, music files, and so on
2 a • uses movement of data between RAM and HDD/SSD
5
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• RAM is physical memory and virtual memory is RAM + swap space on HDD/SSD • to
execute a program, data is loaded into RAM from HDD/SSD
b • when P5 wants access to RAM we use virtual memory since RAM is full • assuming P1 is
oldest data, P1 data (10 GiB) is moved out of RAM into HDD/SSD • P5 now points to
memory space in RAM once occupied by P1
4a
3
RAM: ROM:
• temporary memory device
• volatile memory
• read-only
• ROM – used by a PC to find out what it should to do when the power is switched on
6
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
5 a electrons
NAND
matrix
intersection
control gate
floating gate
electrons
control gate
• are lighter
• are thinner
• It is usually part of the device hardware and contains the Media Access Control (MAC)
address generated at the manufacturing stage.
b • Media Access Control is an address which refers to a number which uniquely identifies a
device on the internet.
• It gives a unique address to each device connected to the internet which identifies their
location.
d • These enable data packets to be routed between the different networks, for example, to join a
LAN to a WAN onto the internet.
e • A server that automatically provides and assigns an IP address.
2 a • changes each time a device connects to the internet
b • IP address is associated with a particular device and does not change each time the device
connects to the internet
• they give greater privacy since they change each time a user logs on
7
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• dynamic IP addresses can be an issue when using, for example, VoIP since this type of
addressing is less reliable as it can disconnect and change the IP address causing the
VoIP connection to fail
Static IP addresses are needed for the following reasons:
• since static IP addresses don’t change, they allow each device to be fully traceable •
allow for faster upload and download speeds
3 MAC:
• Unique
• 48-bit address
• The light-emitting layers of an OLED are lighter; OLED layers can be made from
plastic rather than the glass used in LED and LCD screens.
• OLEDs do not require backlighting like LCD screens – OLEDs generate their own
light.
• Since OLEDs require no backlighting, they use much less power than LCD screens
(most of the LCD power is used to do the backlighting); this is very important in
battery-operated devices such as mobile phones.
• Since OLEDs are essentially plastics, they can be made into large, thin sheets (this means
they could be used on large advertising boards in airports, subways, and so on). • OLEDs have
a very large field of view, about 170 degrees, which makes them ideal for use in televisions
and for advertising screens.
b • many colours are possible if each primary colour (RGB) uses several bits to represent its
colour intensity …
• … for example, 32 bits per colour gives 232 × 232 × 232 possible colour combinations •
however, the human eye cannot detect more than a few thousand different colour shades
…
8
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• television contrast (etc.) needs to be set up perfectly to show all colours accurately 2 a i
Two from:
ii RAM allows the user to store their own data, such as game status
• only the part of the software needed at each stage in the game would be in RAM at any
time
iii USB ports allow other games stored on memory sticks, for example, to be plugged into the
games console
• can plug the console into external speakers for better sound effects
• in control, the output affects the input and actuators are used to change the process (for
example, open valve, operate pump)
• in monitoring, no changes to the process are made; the system simply shows the status on a
screen or prints out data or sounds an alarm
b • temperature and humidity sensors are used
• if the temperature sensor reading is > set temperature, the microprocessor will send a
signal to an actuator …
• if the temperature sensor reading <= the set temperature, the microprocessor will send a
signal to an actuator …
• if the humidity sensor reading > factory set value, the microprocessor will send a signal to an
actuator …
• … the microprocessor will send a signal to an actuator to switch off the air
conditioning unit
9
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
• dynamic IP address is a temporary IP address assigned to a device each time it logs onto
the internet
• static IP addresses assigned to servers which host websites or to FTP servers; this gives the
device a consistent location and also means less bandwidth is used reducing network
traffic (and takes less time to retrieve data)
• dynamic IP addresses afford greater privacy since they change each time a device logs onto
the internet, therefore it makes the device more difficult to trace
b • MAC address is a media access control address
• there are two types referred to as UAA (set at factory) or LAA (can be changed by
user)
5a
10
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
b RAM: ROM:
• volatile memory
• since human skin is a conductor of electricity, when bare fingers (or special stylus)
touch the screen, the electrostatic field of the conductive layer is changed • the installed
microcontroller is able to calculate where this change took place and hence determine the
coordinates of the point of touching
• with surface capacitive screens, sensors are placed at the corners of a screen • small
voltages are also applied at the corners of the screen creating an electric field • a finger
touching the screen surface will draw current from each corner reducing the capacitance
• a microcontroller measures the decrease in capacitance and hence determines the point
where the finger touched the screen
• with projective capacitive screens, the transparent conductive layer is in the form of an
X–Y matrix pattern
• when a finger touches the screen it disturbs the 3D electrostatic field allowing a
microcontroller to determine the coordinates of the point of contact
• this system works with bare fingers, stylus and thin surgical or cotton gloves; it also
allows multi-touch facility (for example, pinching or sliding)
11
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Infrared touch screens: Answers to Student’s Book
• infrared touch screens use a glass screen with an array of sensors and infrared
transmitters
• the sensors detect the infrared radiation; if any of the infrared beams are broken (for
example, with a finger touching the screen), the infrared radiation reaching the sensors is
reduced
• the sensor readings are sent to a microcontroller which calculates where the screen was
touched
Resistive touch screens:
• these screens are made up of two layers of electrically resistive material with a voltage
applied across them
• the upper layer is made of flexible polyethylene (a type of polymer) with a resistive
coating on one side
• the bottom layer is made of glass also with a resistive coating (usually indium tin
oxide) on one side
• these two layers are separated by air or an inert gas (such as argon)
• when the top polyethylene surface is touched, the two layers make contact • since both
layers are coated in a resistive material, a circuit is now completed which results in a flow
of electricity
• a microcontroller converts the voltage (created when the two resistive layers touch) to
digital data which it then sends to the microprocessor
b i Uses organic layers which emit their own light and therefore there is no need for any
backlighting
ii • The plastic, organic layers of an OLED are thinner, lighter and more flexible than the
crystal structures used in LEDs or LCDs.
• The light-emitting layers of an OLED are lighter; OLED layers can be made from
plastic rather than the glass used in LED and LCD screens.
• OLEDs do not require backlighting like LCD screens – OLEDs generate their own
light.
• Since OLEDs require no backlighting, they use much less power than LCD screens
(most of the LCD power is used to do the backlighting); this is very important in
battery-operated devices such as mobile phones.
• Since OLEDs are essentially plastics, they can be made into large, thin sheets (this
means they could be used on large advertising boards in airports, subways, and so
on).
• OLEDs have a very large field of view, about 170 degrees, which makes them
ideal for use in televisions and for advertising screens.
12
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
7 a touchscreen/concept keyboard/microphone/trackerball/touchpad
b headphones/speakers
c (removable) hard disk drive/SSD/USB drive/Blu-ray disk
d • QR code scanned using a camera on smartphone or tablet
• pH sensor:
• light sensor:
• temperature sensor:
• alerts Anna when it is too hot/too cold for optimum growing conditions
• gas/O2/CO2 sensor:
• measures amount of CO2 in the air
• humidity sensor:
• measures infrared/microwaves
• pressure sensor:
• … to alert Anna about how much fruit has fallen from the trees
13
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
9
Cambridge IGCSE and O Level Computer Science Teacher's Guide © David Watson and Helen Williams 2021
Answers to Student’s Book 14
Cambridge IGCSE™ and O Level Computer Science
4 Software
Answers to activities
4.1
Software System software Application software
Screensaver
✔
Anti-virus software
✔
Printer driver
✔
Compiler
✔
QR code reader
✔
On-screen calculator
✔
1
1
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
• meanwhile, data from download/video buffer is sending data to video player • once printer
buffer is full, attention returned to video download and video buffer starts to fill again
• if video buffer is at minimum value, an interrupt is sent to stop other processes to allow
video buffer to start filling again
c interrupt sent to CPU indicating an error and message appears on screen; printing process
suspended until new black ink cartridge is installed
3 Human computer interface can be CLI or GUI; permits user to interact with computer
Multitasking allows computer to carry out several tasks at the same time (allocating resources
to each task)
Platform (to run software) all apps come under the control of OS; manages movement of data
into and out of RAM to allow software to run with
required resources
User account management allows more than one user to log onto a computer; each user is
allocated separate parts of memory; administrator has
overall control
Managing files carries out specific tasks (for example, create, open, close, delete, rename,
copy, etc.); maintains directory structures;
monitors access control mechanisms and ensures they are
maintained; loads files into memory as required
Hardware management involves management of all I/O devices; communicates with devices
via device drivers; ensures allocation of
resources according to priority; manages queues and buffers
Memory management manages RAM and keeps track of which apps are using memory
locations; prevents competing apps from using the
same memory locations
Interrupt handling handles interrupts from hardware and software to ensure they are serviced
in correct priority and that all devices
have access to the CPU and resources as required
System security ensures the integrity, confidentiality and availability of data is maintained; use
of passwords, maintaining access rights,
and so on
2
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• Descriptors include the vendor ID, product ID and serial number of a device.
• If a device doesn’t have a unique serial number associated with it, the OS will treat the
device as new every time it is plugged into a USB port.
• When a device is plugged in, descriptors are used to recognise the device and load the
device driver automatically.
5 a • when the computer is powered up, part of the OS needs to be loaded into RAM … • … this
• … which tells the computer where the storage device that hold the OS can be located •
BIOS is stored on firmware, such as EEPROM
b • BIOS settings are stored on a CMOS chip …
• user can change BIOS settings if required but not the BIOS software
6
3
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
4.2
True False
2 a • Auto-completion means that an IDE can automatically show the reserved words or variable
names that are available for use, so that the correct one can be picked from a list.
• Prettyprinting – code editors can colour code parts of a program, for example reserved
words or strings and automatically lay out the program in a meaningful way.
• Translators are supplied as part of the IDE; these can be compilers or interpreters or
both.
b A compiler translates the whole program written in a high-level language into machine
code program. An interpreter executes a program written in a high-level language by
translating then executing each line of the program.
A compiler can produce a file containing the translated machine-code program that can be
executed without the compiler, whereas an interpreter will always need to be present during
the execution of an interpreted program.
c Assembly language programs can be smaller in size and execute tasks more quickly as
fewer instructions are used, programs can also control specialist hardware using
appropriate simple commands.
4
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to questions 6 and 7 in this section are example answers for past paper questions. The details of the
relevant past paper can be found with the corresponding exam-style question in the Student’s Book.
1 2
a virus scanner
b defragmentation
c security software
d screen saver
e device driver
3 a provide a platform for the execution of apps and also provides an HCI (human-computer
interface), memory management, security management and management of user accounts,
hardware management (e.g. keyboards and monitors), file management, handles interrupts,
manages multitasking (i.e. running more than one application at a time)
b memory management system which gives the impression that the RAM is larger than it is;
involves moving data into and out of RAM and HDD/SSD
c this occurs when large volumes of data are being moved in and out of HDD; involves a large
number of head movements
d program within the operating system that allows a user to run several applications at the
same time; but only one app is actually 'active' at any given time
e signal sent from a device or software to a processor to temporarily halt the process
currently being run
5
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
• Windows manager looks after the interaction between Windows, applications and
pointing devices/cursor position for touchscreen
Command line interface (CLI):
b and c
Interface Advantages Disadvantages
Graphical The user doesn’t need to learn This type of interface uses
user any commands. up considerably more
interface It is more user-friendly; icons are computer memory than a
(GUI) used to represent applications. CLI interface.
A pointing device (such as a mouse) is The user is limited to the
used to click on an icon to launch the icons provided on the
application – this is simpler than screen. It needs an
typing in commands OR a touch operating system, such as
screen can be used where applications Windows, to operate,
are chosen by simply touching the which uses up considerable
icon on the screen. memory.
6
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
5 a C – an area in memory that temporarily holds data
b B – software that communicates with the operating system and translates data into a format that
can be printed out
c C – allocating memory to competing applications running on a computer system d D
– multitasking
e A – command line interface (CLI)
f C – a GUI interface makes it easier to use the computer
g C – interrupt
h D – CMOS
i A – any device plugged into the USB port of a computer must have a unique serial number j B –
post-WIMP interfaces make use of the more modern optical mouse to select icons 6 a • A compiler
produces a file containing a translated machine-code program; an interpreter does not.
executing each line of the program, provided there are no errors in that line. • A compiler
does not execute the program.
b Advantage – compiled programs are smaller in size; source code not included in compiled file.
Disadvantage – longer development time if compilers are used whilst developing code. c
Advantage – easier to edit programs during development. Disadvantage – programs cannot run
without the interpreter.
7 A compiler translates a high-level language into machine code, whilst an assembler translates a low-
level assembly language into machine code. One assembly language instruction usually translates
to one machine code instruction, whereas one high-level language instruction usually translates to
many machine code instructions.
8 a An Integrated Development Environment (IDE) is software that is used by programmers to aid the
writing, editing and development of programs.
b Auto-completion means that an IDE can automatically include matching keywords when the
first keyword is typed. For example, when IF is written in Visual Basic, the IDE
automatically adds the keywords: End If
Auto-correction means that an IDE can automatically correct errors, for example,
underlining the places where syntax errors occur and offering the corrected statement to
use.
Prettyprinting means colour-coding words and adjusting the layout of a program for
readability, for example, always showing reserved words in orange and strings in red. c • A
debugger to test a program in a controlled environment. For example, a separate report
window can be used to display the values of each variable as the program is running.
• A code editor to type the program and correct errors means that there is no need to exit the
IDE for every alteration during development.
7
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
9 As the program has already been written it can be translated using a compiler as the development
has already been done. This means that there would be an executable program available in binary
that can be run on his friend’s computer without the use of any additional software. Pedro knows
that his friend’s internet connection is very slow, and the compiled program is smaller than the
original program so there will be less data to transmit, which means that it will take less time for
the program to arrive and the transmission is more likely to be successful.
8
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Cambridge IGCSE™ and O Level Computer Science
Answers to Student’s Book
Exam-style questions and sample answers have been written by the authors. References to
assessment and/or assessment preparation are the publisher’s interpretation of the syllabus
requirements and may not fully reflect the approach of Cambridge Assessment International
Education. Cambridge International recommends that teachers consider using a range of teaching
and learning resources in preparing learners for assessment, based on their own professional
judgement of their students’ needs.
Cambridge Assessment International Education bears no responsibility for the example answers to
questions taken from its past question papers which are contained in this publication. The questions,
example answers, marks awarded and/or comments that appear in this digital material were written
by the author(s). In examination, the way marks would be awarded to answers like these may be
different.
• temporary cookie
to be typed in each time a user visits a website, which allows a faster log in • serves as a
memory, enabling a website to recognise users every time they visit the website
• allows social networking sites to recognise certain preferences and browsing history •
allows different languages to be used on web pages automatically/personalised web pages
stored
5.2
1a b
If block 4 is hacked and any data is changed, then the hash value for the block will change; this will result
in the chain being broken since block 5 can no longer point to block 4. 2 • cryptocurrency uses
cryptography to track transactions
• cryptocurrency is decentralised unlike digital currencies which are centralised • traditional digital
currencies are regulated by central banks and governments • unlike normal digital currencies,
cryptocurrency transactions are publicly available and can be tracked/money monitored
2
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
5.3
a b c
Three from:
2 • worm: type of stand-alone virus that can replicate itself with the intention of spreading to other
computers/networks; often uses networks to search out computers with weak security •
ransomware: programs that encrypt data on a user’s computer; a decryption key is sent back to
the user once they pay a sum of money (ransom); they are often sent via a Trojan horse or by
social engineering
• Trojan horse: malicious programs often disguised as legitimate-looking software; they replace
all or part of the legitimate software with the intent of carrying out some harm to the user’s
computer system
3
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• firewalls
5.5
1 a • as soon as motion detector recognises a person, a camera automatically photographs the face
of the person
• software scans face for key features and creates an electronic image/file • the file is
compared to the database containing face scans of authorised people • if key features
match database data then entry is allowed …
2 Benefits: Drawbacks:
• more secure system since only certain people can be • a person’s voice can be recorded to overcome the
recognised as authorised drivers security system
• safer since driver doesn’t need to look at screens/dials to • low accuracy; doesn’t understand verbal commands
select options or look at key data
• change of voice (e.g. due to a cold) can make
• relatively inexpensive technology recognition 'hit and miss'
commands to make system work
• sometimes there is a need to remember certain
4
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
5.6 f DNS
1 a two-step verification b proxy g biometrics
server h authentication
c privacy settings i social engineering j pharming
d SSL Answers to Student’s Book
e firewall
2 A browser requests an SSL/TLS digital certificate from the website it is trying to access. This is sent
from the web server to the user’s browser, containing a public key which can be used to
authenticate the website. Once the digital certificate is authenticated, the browser lets the web
server know, and secure communication can begin.
3 a Three from:
• Is the domain name in the email address spelt correctly, or does it exactly match the real
company?
• Is there a clickable link? If so, what address does the link point to when you hover over it?
(DO NOT CLICK THE LINK!) It may not match the expected website.
• If it claims to be from a real company, log into your account with the company without
using the link.
b Three from:
• the email address which this is from does not look like a real or reputable company • there
is no further information in the email, such as details about the company itself • reputable
companies would not expect a customer to click on a link in an email to pay an account
5
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
1 a i A cookie is a small file stored on a user’s computer; they are sent by a website to a browser
when a user visits the site.
ii Session cookies are stored in a temporary memory on the computer; they don’t collect any
information from the user’s computer and don’t identify the user; they cease to exist when
the browser is closed or the user terminates the session with the website. Persistent cookies
are stored on the hard drive of the user’s computer; they remain stored until an expiry date is
reached or the user deletes the cookie; they remain in
operation on the user’s computer even when the browser is closed or the website
session has been terminated; they remove the need to type in login details every time a
website is visited.
iii Three from:
• allows a website to remember a user’s email address and invoice details so these
don’t have to be typed in each time a user visits a website, which allows a faster
log in
• serves as a memory, enabling a website to recognise users every time they visit the
website
2 a • Spyware is software that gathers information by monitoring activity on a user's computer. It can
gather information by finding information such as bank account details and passwords
stored on the computer or within web browser cookies. Spyware called keyloggers can
record what a user types and which websites they visit. The gathered information is then
sent back to the person who created or sent the software, which can be used for
fraudulent purposes.
6
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
b Two step verification – extra security that means that even if passwords are stolen
criminals cannot gain access to the bank account. It requires some biometric
identification – this would limit access to specified employees only.
c • checks for any unusual network traffic and blocks access to the local network
• can be used to only allow specified external connections, so that all traffic is blocked apart
from these specified sites
• any known undesirable sites can be added to a list of blocked network sites d •
passwords/biometrics
• levels of access
• proxy servers
7
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
4 a Order: C, E, A, B, D
b • student places finger on scanner
• if recognised, the database is updated to show student present (including time and date
of entry)
• on leaving, the same process is carried out and the database is again updated to show the
date/time student left the school premises
5 a Four from:
• instant messaging – links embedded in messages to fake websites
• scareware – pop-up message claiming, for example, user’s computer is infected with a virus
and user downloads the fake virus checker
• emails/phishing – apparently genuine emails sent out which contain links to fake
websites
• phone calls – so-called IT professional calls a user on their mobile phone claiming their
device has been compromised and they are advised to download software which lets the
cybercriminal take over their device
• Stage 3 – attack on victim takes place and information is gathered or disruption to their
system done
• Stage 4 – when cybercriminal has achieved their goal, all traces of the attack are
removed
c i digital currency exists purely in a digital format; there is no physical money (fiat
currency); digital currency involves electronic transfer of funds
ii if a hacker accessed a block and changed anything (for example, an amount of
money) …
• this means that all blocks beyond the hacked block would now be invalid because the
chain would be broken
8
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
6 a Used for layout of content – this structure is defined by HTML tags, e.g. for each heading and
paragraph text.
b browser
Internet Protocol address (IP address)
web server
Hypertext Markup Language (HTML)
7 a SSL is a security protocol:
b
9
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Cambridge IGCSE™ and O Level Computer Science
• if bottle is present, computer sends signal to actuator to open valve to allow liquid to
fill bottle
• once level sensor reading indicates bottle is full, a signal is sent to computer which then
sends a signal to an actuator to close the valve
• computer then sends signal to actuator to open valve and add measured amount of
carbon dioxide gas
• again sensor detects bottle and computer sends signal to robot arm to place cap on
bottle and tighten it
• sensor detects bottle and computer sends signal to actuator to rotate table through 360°
as label is glued to bottle
1
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• more consistent – each bottle will have almost exactly the same amount of each
ingredient
• less expensive over time as it can replace most of the workforce who would need to
monitor the process 24 hours a day
• higher productivity
Disadvantages:
• expensive to set up
• possible for a set of conditions to occur that were never considered during testing •
automated systems always need enhanced maintenance which can be expensive • any
computerised system is subject to cyberattacks
6.2
• extra data needs to be width and length of gap (infrared and ultrasonic sensors can be used to
find these values)
• parallel parking will use cameras which will search out white (parallel) lines and ensure that
the distance between vehicle and white lines is consistent
6.3
• the computer takes readings from sensors in the car's front bumper …
• … to calculate the distance between the car and the vehicle in front
• the computer takes additional sensor readings to determine the speed of the car • the
computer calculates required safe braking distance
• data from the (given) table is then used and the computer determines if the calculated
braking distance is greater than the data in the table ….
• … if braking distance is greater than safe distance (in table) then brakes are applied and
accelerator/throttle also reduced and warning signal/light produced
6.4
Students should produce a table showing all the advantages and disadvantages of using an
automated weather station. This will require research using the internet or a local weather station
(if it exists). No answer has been supplied because this answer will vary from country to country
and students will need to make their own judgements.
6.5
1 • data gathered automatically from various locations around the world …
• … could all be collated over time and patterns of global weather changes
automatically generated
• automatic projection of key weather data into the future to predict weather could then be
checked for its accuracy (by comparison of predicted weather with ACTUAL weather)
2
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• results of this comparison would allow the climate change model to be modified 2 •
three sensors needed: temperature, light and moisture
• if temperature readings < pre-set value, the microprocessor sends a signal to the
actuators …
• if temperature readings >= pre-set value, the microprocessor sends a signal to the
actuators …
• if light level readings < pre-set value, the microprocessor sends a signal to the actuators … • …
to operate motors to open blinds (and turn on artificial lighting)
• if light level readings >= pre-set value, the microprocessor sends a signal to the
actuators …
• if moisture level readings >= pre-set value, the microprocessor sends signals to the
actuators …
• process is continuous
3 • cameras read road signs (60 kph) and software converts the images into a text file • …
• if the car’s speed > 60 kph, the microprocessor sends a signal to the actuators … • …
to operate motors to apply the brakes and/or reduce throttle position • if the car’s speed
< 60 kph, the microprocessor sends a signal to the actuators … • … to operate motors
to increase throttle position
• sensors in the car’s bumpers/fenders will ensure a safe distance between car and vehicle in front
is maintained (by applying brakes and altering throttle as necessary)
• data is sent to a central computer which checks optimum driving conditions • if present driving is
not the same as stored driving parameters, then computer sends signals to actuators to change
gears and apply brakes as necessary
4 Parts i and ii
Step 1
3
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
A sensor detects a vehicle and sends a signal to instruct a camera to capture an image of the
front of the vehicle (often an infrared camera is used to give a clearer image and for use at
night).
Step 2
a An algorithm is used to locate and isolate the number plate from the image taken by the
camera. This algorithm also takes into account the size of the number plate and any
damage or orientation.
b
c Each character is then recognised using optical character recognition (OCR) software. The
characters are converted into a string of editable text by the software.
d This text string is then stored on a database.
Step 3
Once all of this has happened, the car park barrier is raised and the motorist is issued with a
ticket. The ticket shows the date and time of entering the car park.
Step 4
When the motorist returns to the car park, they insert their ticket into a machine which calculates
the car park charges. The payment is registered on the database. The motorist then drives to the
exit barrier and the ANPR system again reads the number plate and checks its database. If the
number plate is recognised (and payment made), the exit barrier is raised.
iii Advantages:
• much faster system than having to check a ticket at the exit; car parks can issue tickets on
entry, but this ticket is simply used for payment purposes by the motorist before leaving
the car park and isn’t used at the exit since payment will now be linked to the number
plate on the car
• can be used to automatically control the entry and exit to a car park or private roads
• there is a lack of manned security car park surveillance which could lead to vandalism (and
other crimes) since nobody is checking on a regular basis; CCTV is often used, but this
is often just used 'after the event'
• number plate cloning; the ANPR system only recognises the number plate and not the car,
so it is possible for a car to be fitted with a cloned number plate thus by-passing car park
security, for example
4
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
6.6
Each student should produce a presentation in the form of a table which highlights the advantages
and disadvantages of immersive games consoles. The table should include research into which
sensors are used (for example, accelerometers, proximity, magnetic field and pressure), together with
a description of the function of each sensor identified. 6.7
1 a i flow sensors, temperature sensors
ii light sensors, infrared/motion sensors
iii infrared/motion sensors, cameras, pressure sensors
b i Advantages, two from:
• 24/7 monitoring
Disadvantages:
• expensive to set up
• much safer
• fewer delays caused by people pulling emergency cord if someone has an item
stuck in the door
Disadvantages, two from:
6.8
Students to produce a table showing all the advantages and disadvantages of the use of robots in
agriculture. This may involve research using:
• more accurate
• much faster
• expensive to implement
• different conditions or plants may require more retraining, casual workers will lose their
work
6
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
6.9
1 Examples:
• weed control
• robots have been designed to do this labour-intensive work; they are more accurate (only
picking ripe fruit, for example) and much faster at harvesting
• for the reasons above, this leads to higher yields and reduces waste – for example, Vegebot
(Cambridge University) uses cameras to scan, for example, a lettuce and decide whether or
not it is ready to be harvested
• a second camera in Vegebot (near the cutting blades) guides an arm to remove the lettuce from
its stalk with no damage.
Weed control:
• weed management robots can distinguish between a weed and crop using AI • examples of
weed control robots are being used in France (by Mouton Rothschild) to remove weeds
between grape vines in their vineyards; this saves considerably on labour costs and improves
vine growth
• weed control robots use GPS tracking to stay on course to move along the rows of vines and
remove the weeds; a weed removal blade is operated by an actuator under the control of the
controller (microprocessor) in the robot
• very often a drone (flying robot) is used first to do an aerial view of the vineyard, so that a
programmed course of action can be produced, which is then sent to the weed control robot’s
memory.
Phenotyping:
• phenotyping is the process of observing physical characteristics of a plant in order to assess its
health and growth
• robots designed to do phenotyping are equipped with sensors (including spectral sensors and
thermal cameras) that can create a 3D image/model of the plant, thus allowing it to be
monitored for health and growth
• machine learning is used to recognise any issues with leaves (for example, if they have a
blight or have the wrong colour) so that the robot can convey this back to the farmer
• these robots are much more accurate and faster at predicting problems than when done
manually.
7
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
• drones (flying robots) can produce an aerial image of a farm sending back a 'bird's eye
view' of the crops and land
• drones can also be used in cloud seeding where the drone can add silver iodide crystals to a
cloud forcing it to give up its rainwater
• the drones use a very complex camera system to target seeding and allow fertiliser spraying
Autonomous labour-saving devices:
Several of the devices described above could be referred to as autonomous. The following list
summarises some of the devices which can work independently of humans: • grass
mowers/cutters
• seeding robots
• fertiliser spraying
• All of these devices use sensors and cameras to go around obstacles, or they can even be
programmed to 'go to sleep' if the weather turns bad.
6.10
Essay produced by student on robotics in entertainment including their advantages and
disadvantages.
8
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
6.11
Advantages Disadvantages
• robots are capable of working in • robots can find it difficult to do 'non
conditions which may be standard' tasks (for example,
hazardous windscreen being fitted to a car
to humans is cracked)
• robots work 24/7 without the need to stop • robots can lead to higher
unemployment amongst manual
• robots are less expensive in the long run labourers
(since there will be fewer salaries to pay) • • there is a risk of deskilling when
robots are more productive than humans robots take over certain tasks (for
(higher productivity) example, welding and paint spraying)
• mechanical structures made up of motors, hydraulic pipes, actuators and circuit boards •
makes use of electronic components
9
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
4 sensors
microprocessor
environment
end-effectors
controller
programs
repetitive
adaptive
5 a • sensors can use radar/sonar to detect objects under the sea
• actuators also used to operate electric motors in undersea robots to allow them to move
around the shipwreck
b i • sensors can be used to recognise samples
ii camera used to recognise terrain, recognise potential rock samples and to allow
manoeuvring safely
c Advantages include:
• no need for any humans to be present (useful on long journeys, such as visit to Mars
which takes several years)
Disadvantages include:
• as with any robot, they are limited to the functions programmed in (although some ability
to reprogram will exits – they may not have the necessary attachments to carry out a
newly required task)
d Could be used in defusing bombs, clean-up operations in nuclear plants (for example,
Chernobyl), etc.
6.12
a knowledge base
b explanation system
c expert system shell
d robotics
e rules base
10
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
6.13
1 artificial intelligence
cognitive
expert systems
explanation system
inference engine
search engine
inference rules
2 a • Is there anything showing on the screen?
3 a • sub-set of AI
• algorithms are trained and learn from past experiences and examples • offer fast
AI Machine learning
the aim is to build machines which the aim is to make machines that learn
are capable of thinking like humans through data acquisition, so that they
can solve new problems
• relationship between key words typed in and key words following collaboration
filtering is used to train the model
• these searches are evaluated to further refine the search engine model
11
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
4
Answers to exam-style questions
1 a Advantages:
• higher productivity
12
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
2 • accelerometers
• proximity sensors
• if light sensor value < stored value for office the microprocessor sends signal to turn
on lights
ii Advantages:
13
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
b Four from:
• explanation system informs user of the expert system’s reasoning behind its
conclusions and recommendations
• inference engine is a type of search engine used in an expert system that examines the
knowledge base for information that matches the queries
• knowledge base is a repository of facts which contain all the knowledge of the expert
system; it is composed of a collection of objects and attributes
• rules base is a collection of inference rules used to draw conclusions, based on inputs
• user interface is a method whereby the expert system interacts with the user; the
interaction can be through dialogue boxes or command prompts; questions are often
simple Yes/No responses and are based on responses to previous questions
5 a • sensors (infrared, pressure) indicate the presence of a person trying to leave/enter the train
• cameras can also be used to check that nobody is trapped in the doors
• … a signal is sent to actuators to operate motors to open doors/halt the closing of doors • if
sensors and camera detect no presence of passenger in door area, …
14
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• it is safer since no one can get trapped and train can’t move off …
c • allows driver to make a manual check on whether it is safe to move off (a double safety
check)
• gives passengers confidence if they know there is a manual back-up safety system d i
autonomous means driverless, no human operators
ii Sensors:
reduced running costs (fewer staff system doesn’t work well with very
are required) busy services (at the moment)
easier to change train scheduling (for no drivers mean there will be a need
example, more trains during busier for CCTV to monitor railway stations
times)
iii
15
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
• this is done via sensors (such as light, pressure, temperature, acoustic, and so on)
• sensors allow a robot to recognise its immediate environment and gives it the ability to
determine things like size, shape or weight of an object, detect if something is hot or
cold, and so on; all sensor data is sent to a microprocessor or computer
Have a degree of movement:
• they can make use of wheels, cogs, pistons, gears (etc.) to carry out functions such as
turning, twisting, moving backwards/forwards, gripping or lifting
• they are mechanical structures made up of many parts (for example, motors, hydraulic
pipes, actuators and circuit boards)
• can make use of end effectors (different attachments to allow them to carry out specific tasks
such as welding, spraying, cutting or lifting)
Apparent intelligence:
• they have a 'brain' known as a controller which determines the action to be taken to
perform a certain task (the controller relies on data sent from sensors or cameras, for
example)
b Independent robots:
• have no direct human control (they are said to be autonomous; for example, an
autonomous vehicle)
• can replace the human activity totally (no human interaction is required for the robot to
function fully)
Dependent robots:
• have a human interfacing directly with the robot (the human interface may be a
computer or a control panel)
• can supplement, rather than totally replace, the human activity (for example, in a car
assembly plant where both humans and robots work together to produce a car)
16
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
7 8 a end effector
b inference engine
c autonomous
d machine learning
e automated systems
f artificial intelligence
g chatbots
h search bot/web crawler
i robotics
j cognitive
k attributes
l knowledge base
m drone
n controller
o inference rules
Cambridge IGCSE and O Level Computer Science Teacher's Guide © David Watson and Helen Williams 2021
Answers to Student’s Book 17
Cambridge IGCSE™ and O Level Computer Science
7.2
7.3
Amount 100
TotalPrice 350
Discount 0.2
FinalPrice 280
Name "Nikki"
Message "Hello Nikki"
7.4
OUTPUT "Please enter a mark "
INPUT Mark
1
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
3
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
7.8
Telephone number – the number needs to be the one that is required as well as having the
necessary characteristics.
Pupil's name – the name needs to be the one that is associated with the pupil. Part number – a
part number could have the required format but not be for the part intended. 7.9
For example:
Normal test data: 7, 34, 55, 67, 74, 83, 21, 45, 72, 64; Expected result: 54.2
(Other values acceptable.)
7.10
For example:
Erroneous test data: −7, 1001; Expected result: both values rejected
(Other values acceptable.)
7.11
1 Boundary test data for 100 is: 100, 101; Expected result: 100 accepted, 101 rejected 2
Normal test data: 2, 14, 15, 6, 7, 13, 20, 4, 10, 9; Expected result: 10
Normal test data: 17, 13, 15, 15, 14, 16, 2, 8, 7, 6; Expected result: 11.3
Erroneous test data: −7, 23; Expected result: both values rejected
Boundary test data: −1, 0 and 20, 21
Expected results: −1 rejected, 0 accepted and 20 accepted, 21 rejected
7.12
Answer in chapter (page 285).
4
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
7.13
A B C X OUTPUT
1 4 4 4
2 8 8
3 19 19
4 17
5 3 3
6 11
7 6
8 1 1
9 13
10 9 19 1
5
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
7.14
First Last Index Swap Temp Temperature
TRUE 35 31 35
2 TRUE 35 32 35
5 39 39 37 39
7 42 38 42
7 1 FALSE
6 TRUE 39 38 39
6 1 FALSE
6
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
7.15
Sample data: −1, −7, −11, −19, −3, −20, −9, −4, −6, −8
A B C X OUTPUT
0 0 100
1 -1
2 -7 -7
3 -11 -11
4 -19 -19
5 -3
6 -20 -20
7 -9
8 -4
9 -6
10 0 -3
0 -20
A ←0
OUTPUT "Enter your ten values"
INPUT X
B ←X
C ←X
REPEAT
INPUT X
IF X > B
THEN
B ←X
ENDIF
IF X < C
THEN
C ←X
ENDIF
A ←A + 1
UNTIL A = 9
OUTPUT B, C
7
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
A B C X OUTPUT
1 12390 12390
2 0
3 77
4 359
5 -2
6 -89
7 5000
8 21
9 67
12390,-97
7.18
0, 26
Expected results rejected – erroneous data
1, 25
Expected results: Your tickets cost 20
Your tickets cost 400 – extreme data
9, 10
Expected results: Your tickets cost 180
Your tickets cost 180 – normal data
19, 20
Expected results: Your tickets cost 342
Your tickets cost 320 – normal data
Extra test data:
0, 1
Expected results: 0 rejected
1 Your tickets cost 20 – boundary data lower bound
26, 25
Expected results: 26 rejected
25 Your tickets cost 400 – boundary data upper bound
-30, 200
Expected results rejected – erroneous data
8
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
7.19
1 Change FOR Test ←1 to 4 // outer loop for the tests to
FOR Test ←1 to 2 // outer loop for the tests
remove 3 : SubjectName ← "English" and 4 : SubjectName ← "IT"
OverallTotal ← 0
SubjectLowest ← 100
SubjectTotal ← 0
CASE OF Test
1 : SubjectName ← "Maths"
2 : SubjectName ← "Science"
ENDCASE
FOR StudentNumber ← 1 TO 5 // inner loop for the students
REPEAT
OUTPUT "Enter Student", StudentNumber, "’s mark for ", SubjectName INPUT
Mark
UNTIL Mark < 101 AND Mark > -1
IF Mark < OverallLowest THEN OverallLowest ← Mark
Test data (sample – yours might be different): 1, 99, −1, 101, 20, 80, 30, 70, 40,
60, 50, 50
9
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
2 Trace table:
Tes Stude Mar Subje Subject Overall Output
t nt k ct
Numb Name Av High Low Total Av High Low Total
er
0 100 0
1 0 100 0
1 1 1 1 1 1 1 1 Enter student
1’s mark for
Maths
2 99 99 100 99 100 Enter student
2’s mark for
Maths
3 -1 Enter student
3’s mark for
Maths
101 Enter student
3’s mark for
Maths
20 120 120 Enter student
3’s mark for
Maths
4 80 200 200 Enter student
4’s mark for
Maths
5 30 230 230 Enter student
5’s mark for
Maths
46 Maths
Average mark is
46 Highest mark
is 99 Lowest
mark is 1
2 0 100 0
10
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
7.20
1 Total ←0
FOR Counter ← 1 TO 10
REPEAT
OUTPUT "Enter positive number "
INPUT Number
UNTIL Number > 0
NEXT Counter
Average ← Total / 10
2 Total ←0
Counter ← 0
REPEAT
REPEAT
OUTPUT "Enter positive number, -1 to finish "
INPUT Number
UNTIL Number > 0 OR Number = -1
IF Number <> -1
THEN
Counter ← Counter + 1
ENDIF
UNTIL Number = -1
• Processes – the tasks that need to be performed using the input data and any other
previously stored data
• Outputs – information that needs to be displayed or printed for the users of the system •
Storage – data that needs to be stored in files on an appropriate media for use in the future
11
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
2
3 a Diners – range check 2 to 12 inclusive, presence check and type check of integer Bill –
range check 10 to 500 inclusive, presence check and type check of real b Test data
(sample – yours might be different):
• Boundary data for upper bounds 12 diners and 13 diners and bills of $500.00 and
$500.01
Expected result: 13 and $500.01 both values rejected, 12 and $500.00 $41.67 4
Validation – the automated checking by a program that data is reasonable before it is accepted into a
computer system
Verification – checking that data has been accurately copied from another source and input into a
computer or transferred from one part of a computer system to another
5 Name:
Validation checks:
12
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
Date of birth:
Validation checks:
• format check to ensure that all the components of the data are in range •
range check to ensure that the value for the date is realistic
Verification check – yes to ensure that the date entered is the one intended and there are no
typing errors
Password:
Validation checks:
0 0 0
1 1 15 10 150
2 2 20 17 340
3 1 32 10
4 2 30 35
5 3 30 15 450
6 3 30 28 840
7 4 25 25 625
8 4 20 15 300
9 5 40 20 800
10 5 12 10 120 5 5
13
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021
Answers to Student’s Book
• calculate size and check size less than 600 for each parcel
b Total ← 0
FOR Counter ← 1 TO 10
REPEAT
OUTPUT "Enter a positive whole number "
INPUT Number
UNTIL Number > 0
NEXT Counter
OUTPUT Total
c Test data: 1, 0, 67, 10, 22, −10, 3, 7, 2, 8, 1, 9 (sample – yours might be
different).
Counter Number Total OUTPUT
1 1 1
2 0
67 68
3 10 78
4 22 100
5 -10
3 103
6 7 110
7 2 112
8 8 120
9 1 121
10 9 130 130
14
Cambridge IGCSE and O Level Computer Science Teacher's Guide
© David Watson and Helen Williams 2021