0% found this document useful (0 votes)
63 views

YEAR 9 Computer Science

Uploaded by

tarajimwalili
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

YEAR 9 Computer Science

Uploaded by

tarajimwalili
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

END OF SEMESTER III EXAMINATION JUNE/JULY 2024

STUDENT NAME:

LOWER SECONDARY COMPUTING-YEAR 9


Duration: 1hour 30 Minutes
You must answer on the question paper.
No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75
● The number of marks for each question or part of question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware

__________________

©Sunrise Virtual School™ 2024


1. Jack has an MP3 file stored on his computer.
(a) (i) Tick (✓) to show which type of data is stored in an MP3 file.[1]
Tick (✓)
Video
Sound
Image
2. A computer is designed using the Von Neumann model for a computer system. The computer has a
central processing unit (CPU).
(a) Data is fetched from primary storage into the CPU to be processed.
(i) State the name of the primary storage from where data is fetched.[1]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(ii)The CPU performs a cycle to process data. Fetch is the first stage in this cycle.
State the names of the second and third stages in the cycle.[2]
Second stage
………………………………………………………………………………………………………………

Third stage
………………………………………………………………………………………………………………

(iii) Identify two components within the CPU that are used in the fetch stage of the cycle.[2]
Component 1
………………………………………………………………………………………………………………
Component 2
………………………………………………………………………………………………………………
3. (a)Three types of storage media are magnetic, optical and solid state.
One example of solid‑state storage is a Solid State Drive (SSD).
Identify one other example of solid‑state storage.[1]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) All data needs to be converted to binary data so that it can be processed by a computer.
Explain why a computer can only process binary data.[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(c) The denary values 64, 101 and 242 are converted to 8‑bit binary values.
Give the 8‑bit binary value for each denary value.[3]
64
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
101
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
242
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(d) The hexadecimal values 42 and CE are converted to binary.
Give the binary value for each hexadecimal value.[2]
42
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
CE
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
4. Adele chooses to set a biometric password for her mobile device, instead of a personal identification
number (PIN).
(a) State what is meant by a biometric password.[1]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) Give two reasons why a biometric password is more secure than a PIN.[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
5. Three Internet terms are browser, Internet Protocol (IP) address and Uniform Resource Locator (URL).
Five statements are given about the Internet terms. Tick (✓) to show which statements apply to each
Internet term. Some statements may apply to more than one Internet term[5]

6. A printer is one example of an output device.


(a)Give three other examples of output devices.[3]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b)Give three examples of input devices.[3]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
7. A scientific laboratory requires a sensor to trigger an alarm if the environmental conditions in a chamber
change, for each requirement, suggest one suitable sensor that could be used to measure the condition:[2]
(a) Absolute darkness:
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) Low oxygen:
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
8. Describe what is meant by the following terms, and give an example of each[4]
(a) Application software
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) System software
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
9. Automated systems are used in many countries to issue flood warnings. Sensors may be placed at
various points along a river to measure the depth of water and speed of flow
State two other devices other than sensors which would be needed as part of an automated
system for flood defence.[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
10. Robots are used in a factory to build cars.
(a) One characteristic of a robot is its mechanical structure.
State two other characteristics of a robot.[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b) Suggest two advantages of using robots, instead of humans, to build cars in the factory.[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
11. A student is concerned about the threats to their computer when using the internet. The student wants to
use some security solutions to help protect the computer from the threats.
(a) Identify a security solution that could be used to protect the computer from a computer virus, hacking
and spyware. Each security solution must be different.[3]

(b) Describe how each security solution you identified in


(a) will help protect the computer. [3]
Computer virus security solution
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
Hacking security solution
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………

Spyware security solution


………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
12. Tick (✓) one box in each row to identify the most appropriate data type for each description. Only one
tick (✓) per column.[5]

13. (a)What is the difference between a syntax error and a logic error?[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(b)Differentiate between counting and totalling.[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
(c)There are four different types of test data that can be used to test a computer program.
Consider a program that will only allow numbers between 1 and 50 (inclusive) to be input.
Complete the table with a description for each type of test data, along with example test data for the
program.[4]

Type of test data Description of test data Example test data

Normal

Abnormal

Extreme

Boundary

14. A satellite navigation system is an example of a computer system that is made up of sub-systems. Part of
a satellite navigation system:
• allows the user to enter details for a new destination or select a previously saved destination
• displays directions in the form of a visual map or as a list.
Draw a structure diagram for this part of the satellite navigation system.[5]
15. An algorithm has been written in pseudocode to input some numbers. It only outputs any numbers that
are greater than or equal to 100. The number 999 is not output and stops the algorithm.

(a) Identify the four errors in the pseudocode and suggest corrections. [4]
Error 1 ...........................................................................................................................................................

Correction ......................................................................................................................................................

Error 2 ...........................................................................................................................................................

Correction .....................................................................................................................................................

Error 3 ...........................................................................................................................................................

Correction ......................................................................................................................................................

Error 4 ...........................................................................................................................................................

Correction ......................................................................................................................................................
(b) Write a pseudocode statement to change the corrected algorithm to output all numbers between 100
and 200 inclusive. You do not need to rewrite the whole algorithm.[2]
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
16. A factory manufactures plastic pipes. It uses logic circuits to control the manufacturing process.
a) Give the name of the logic gate below:[1]

_____________________________________________
b) Complete the truth table for this logic gate.[2]

Input A Input B Output

0 0

0 1

1 0

1 1

c) Study the truth table below: e) Draw the logic gate you mentioned below[1]
Input A Input B Output

0 0 0

0 1 1

1 0 1

1 1 1

d) State the single logic gate that produces the given output.[1]

________________________________________________________

You might also like