June 2019 P2and MEMO
June 2019 P2and MEMO
com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
Downloaded from Stanmorephysics.com
QUESTION 1
1.1.1 C
1.1.2 B
1.1.3 D
1.1.4 B
1.1.5 B
1.1.6 C
1.1.7 C
1.1.8 C
1.1.9 B
1.1.10 D (10)
1.2.2 Interpreter
1.2.3 BIOS
1.2.4 Protocol
QUESTION 2
2.1.1 A replacement of a hardware or software with a newer or more improved
version (1)
2.2 A point-to-point connection is dedicated. This means that the wires or paths
used to transfer the data are not shared between multiple components. The
wires or paths in a bus are shared between components (2)
2.4.1 In most instances the drivers for the printer will have to initially be
manually installed, the automated process of loading a driver in most
plug and play devices does not occur (2)
2.4.2 It would send an IRQ / hardware interrupt message (1)
2.5.1 An operating system controls all the activities that takes place in a computer
(1)
2.5.2 The OS splits the CPU time between the active programs and gives each
program a fraction of access time to the CPU(s) (2)
2.6.1 Virtual memory is a section of storage that the OS reserves, to act as RAM
when RAM falls short (2)
2.6.2 Your computer will become noticeably slower or unresponsive, since access
from HDD is slower (1)
2.6.3 Any ONE of :
Close any unnecessary programs
Increase the RAM
Use the 64-bit version of the OS (1)
[20]
Downloaded from Stanmorephysics.com
QUESTION 3
3.1.1 It is the physical layout of the way in which the computers and other devices
are connected in a network. (1)
3.1.2 Any TWO of :
• If one device fails, it won’t affect the network.
• Computers can be easily added to the network
Improved security (2)
3.1.3 Switch – a hardware device that is used to connect the computers to a
central point. It regenerates and amplifies the signal and directs the traffic
on all the devices on the network.
Router – is a hardware device that provides communication between
networks over the internet through relaying data to the correct destination.
It routes data from a LAN to another network connection. (2)
4.1.3.1 text
4.1.3.2 date/time
4.1.3.3 currency (3)
Range check – used to ensure that the inputted value is within range of a set
of expected values
Presence check - used to check that values are entered into relevant
components
Check Digit – a digit, in a particular sequence of digits, that is generated
through a mathematical formula, so as to validate it’s authenticity
4.4.1 Server
4.4.2 Desktop / Server
4.4.3 Distributed (3)
QUESTION 5
5.1An algorithm is a step by step point form solution to a given problem.
Algorithms are Universal i.e. it does not contain programming specific jargon and
therefore can be used by any programmer using any programming language. (2)
5.2.1 The while loop is used because the length of the text file is not initially
known. (2)
5.2.2 a) the reset procedure opens a file given by FileHandle for read/moves the file-
pointer to the beginning of the text-file (1)
c) Opens a file and allows contents of existing file to be replaced or allows for
the creation of new text file / clears the contents of an existing text-file (2)
d) Links the logical file to the Physical File /Creates a link between the external
file on storage and file processing variable in the program /assigns a
value to FileHandle for a FileName in preparation for reading or writing to
the text-file (2)
5.3.2
sFullname ← Get Fullname
sPwd ← ‘’ (blank string)
i ← length of sFullname
Loop from 1 to i
If sFullname[i] is NOT a vowel
sPwd ← sPwd + SFullname[i]
end Loop (6)
Downloaded from Stanmorephysics.com
5.4
x arrScores[x] arrScores modulus 4 = 0? arrTemp[x]
1 8 T 8
2 5 F
3 3 F
4 12 T 12
5 2 F
(4)
[24]
QUESTION 6
6.1.1 Spyware redirects you to websites you do not intend going to OR
records your keystrokes and sends it back to it’s creator (1)
6.2.1 Multimedia files consumes a lot of storage space, and reducing it’s size will
enable files to be shared or broadcast (1)
6.2.3 Lossy compression – The file size is reduced by sacrificing some insignificant
data, which would not tremendously compromise the quality of the file
LossLess compression - compresses the file without losing any data (2)
6.3.1 An attempt to manipulate or trick someone into willingly giving out sensitive
personal information/data or installing malware. (1)
Downloaded from Stanmorephysics.com
6.3.2 Spoofing – Using electronic technologies to fool people into believing that the
communication is coming from another legitimate person or institution
OR
Phishing Attempts from people, generally employing e-mails to direct people
to fake websites, where they are tricked into releasing personal information (2)
6.4.1 A way of scrambling text/data into a new format using a specified set of
rules (1)
6.5.2 - Notification – user is notified by a sound or message that a new e-mail has
arrived
- Push Technology – The user is notified and the e-mail is automatically
downloaded to the device (2)
TOTAL = 120
Downloaded from Stanmorephysics.com