Computer Science Revision Worksheet
Computer Science Revision Worksheet
1) An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is represented by an
8-bit register, A, and the number of minutes is represented by another 8- bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.
(b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the hours and
minutes of the alarm time. Show how 07:30 would be represented by these two registers:
2)
(b) Convert the about binary numbers to hexa decimal number.
3) Victoria is building a website for her cake design business. She uses the hexadecimal colour code #D2E3F5
as the background colour for her website. The colour code is stored in two 12-bit binary registers. Show
how the code would be stored in the registers.
4) Letters from the alphabet are represented in a computer by the following denary (base 10) values:
A = 97
G=103
I=105
L=108
N=110
The word “A L I G N” is stored as: 97 108 105 103 110
(a) Convert each of the five values to binary. The first one has been done for you
(b) An encryption system works by shifting the binary value for a letter one place to the left. “A” then
becomes:
This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:
C2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these values into
hexadecimal:
6 Explain IP address
9 Convert the following negative denary numbers into binary numbers using the two’s complement
format:
iii Unicode
iv sampling rate
v bitmap image
11 Uma is concerned about risks that she may encounter when using the Internet.
Two of the risks she is concerned about are phishing and pharming.
(a) Give one similarity and two differences between phishing and pharming.
Similarity
Difference 1
Difference 2
(b) Identify two other risks that Uma could encounter when using the Internet.
Risk 1
Risk 2
(c ) Edie is concerned that her children may download a virus when accessing websites.
State what is meant by a virus and explain what could happen if a virus was downloaded.
12) Secure socket layer (SSL) is used in the security of information on Internet websites.
(a) State how it is possible for a user to know that a website is secure by looking at the web address
(b) Describe three of the stages a web browser goes through to detect whether a website is
Secure
14) The Unicode character set is used to represent text that is typed into a computer.
(a) Describe what is meant by a character set
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is that the
text stored takes up more storage space. Give one reason why it takes up more storage space.
15) A student is concerned about the threats to their computer when using the internet. The student
wants to use some security solutions to help protect the computer from the threats. (a) Identify a
security solution that could be used to protect the computer from a computer virus, hacking and
spyware. Each security solution must be different.
16)
17) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.
18) Complete the table by identifying and describing two other examples of malware.