0% found this document useful (0 votes)
11 views

Computer Science Revision Worksheet

IGCSE COMPUTER SCIENCE YEAR 10 REVSION

Uploaded by

nextyze
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Computer Science Revision Worksheet

IGCSE COMPUTER SCIENCE YEAR 10 REVSION

Uploaded by

nextyze
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Year 10 Revision Worksheet

1) An alarm clock is controlled by a microprocessor. It uses the 24 hour clock. The hour is represented by an
8-bit register, A, and the number of minutes is represented by another 8- bit register, B.
(a) Identify what time is represented by the following two 8-bit registers.

(b) An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the hours and
minutes of the alarm time. Show how 07:30 would be represented by these two registers:

2)
(b) Convert the about binary numbers to hexa decimal number.

3) Victoria is building a website for her cake design business. She uses the hexadecimal colour code #D2E3F5
as the background colour for her website. The colour code is stored in two 12-bit binary registers. Show
how the code would be stored in the registers.

4) Letters from the alphabet are represented in a computer by the following denary (base 10) values:
A = 97
G=103
I=105
L=108
N=110
The word “A L I G N” is stored as: 97 108 105 103 110
(a) Convert each of the five values to binary. The first one has been done for you
(b) An encryption system works by shifting the binary value for a letter one place to the left. “A” then
becomes:

This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:
C2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these values into
hexadecimal:

5 Write any 4 uses of hexa decimal system.

6 Explain IP address

7 Add the following binary number


8

9 Convert the following negative denary numbers into binary numbers using the two’s complement
format:

10 Explain each of the following terms:


i color depth
ii ASCII code and Extended ASCII code

iii Unicode

iv sampling rate

v bitmap image

11 Uma is concerned about risks that she may encounter when using the Internet.
Two of the risks she is concerned about are phishing and pharming.

(a) Give one similarity and two differences between phishing and pharming.

Similarity
Difference 1
Difference 2

(b) Identify two other risks that Uma could encounter when using the Internet.

Risk 1
Risk 2
(c ) Edie is concerned that her children may download a virus when accessing websites.
State what is meant by a virus and explain what could happen if a virus was downloaded.

12) Secure socket layer (SSL) is used in the security of information on Internet websites.
(a) State how it is possible for a user to know that a website is secure by looking at the web address

(b) Describe three of the stages a web browser goes through to detect whether a website is
Secure

13) Describe three tasks carried out by a firewall.

14) The Unicode character set is used to represent text that is typed into a computer.
(a) Describe what is meant by a character set
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is that the
text stored takes up more storage space. Give one reason why it takes up more storage space.

15) A student is concerned about the threats to their computer when using the internet. The student
wants to use some security solutions to help protect the computer from the threats. (a) Identify a
security solution that could be used to protect the computer from a computer virus, hacking and
spyware. Each security solution must be different.

16)
17) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.

18) Complete the table by identifying and describing two other examples of malware.

19) Write two advantages and disadvantages of each biometric.


20) A sanctuary for pheasants has set up a new database table called PheasantList to store details of the different
species of bird at the sanctuary. Part of this table is given, showing: species, description, number of birds at the
sanctuary, if the birds are breeding or not, and number of young born this year

You might also like