Computer Science F3 Paper
Computer Science F3 Paper
Four statements about computer memory sizes are given in the table.
True False
Statement
(✓) (✓)
25 kB is larger than 100 MB
999 MB is larger than 50 GB
3500 kB is smaller than 2 GB
2350 bytes is smaller than 2
kB
[4]
2 The Von Neumann model for a computer system uses several components in the
fetch-execute cycle. One component that is used is the Control Unit (CU).
Identify four other components that are used in the Von Neumann model for a
computer system. 1
.......................................................................................................................................
................
2 .....................................................................................................................................
..................
3 ..................................................................................................................................................
.....
4 ..................................................................................................................................................
.....
[4]
3 The data from a sensor must be converted from analogue to digital to be processed
by a computer.
...................................................................................................................................................
............................................................................................................................................. [1]
...................................................................................................................................................
............................................................................................................................................. [1]
3
0 0 1 1 0 1 0 0
...................................................................................................................................................
............................................................................................................................................. [1]
(b) The contents of the register shifted one place to the right would give the result:
0 0 0 1 1 0 1 0
The contents of the register shown at the start of question 4 are shifted two
places to the left. Show the contents of the register after this shift has taken
place.
[1]
(c) State the effect this shift has on the denary value in part (a).
...................................................................................................................................................
............................................................................................................................................. [1]
the file. She uses lossy compression to reduce the size of the sound file.
(a) Describe how lossy compression reduces the size of the sound file.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[Turn over
4
............................................................................................................................................. [4]
3
(b) Nico asks Audrey why she used lossy compression rather than lossless.
(i) State one advantage Audrey could give of using lossy rather than lossless to
compress the sound file.
...........................................................................................................................
................
...........................................................................................................................
.......... [1]
(ii) State one disadvantage Nico could give of using lossy rather than lossless to
compress the sound file.
...........................................................................................................................
................
...........................................................................................................................
.......... [1]
...........................................................................................................................
................
...........................................................................................................................
................
...........................................................................................................................
................
...........................................................................................................................
................
...........................................................................................................................
................
...........................................................................................................................
................
...........................................................................................................................
................
...........................................................................................................................
.......... [4]
……………….........................................................................................................
.............
...........................................................................................................................
................
[Turn over
6
...........................................................................................................................
................
...........................................................................................................................
................
...........................................................................................................................
................
...........................................................................................................................
................
...........................................................................................................................................
[4]
5
c) Write a SQL query to list Type, Age in years and At Risk only. List Yew and
Banyan type of trees. List the trees order by map position.
SELECT ……………………………………….
FROM ………………………………………….
…………..Type=…………………………….
……………………………………………….. [4]
[Turn over
6
1................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................
...................................................................................................................................................
[3]
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
........... [3]
7
X
B
............................................................................................................................................. [3]
(b) Complete the truth table for the given logic circuit.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
[Turn over
8
8 Maisey purchases a new router and attaches it to her computer. The connection she
sets up uses duplex data transmission.
True False
Statement
(✓) (✓)
Duplex data transmission can be either
serial or parallel
Duplex data transmission is when data is
transmitted both ways, but only one way at a
time
Duplex data transmission is always used to
connect a device to a computer
Duplex data transmission is when data is
transmitted both ways at the same time
Duplex data transmission automatically
detects any errors in data
[5]
b) Maisey’s computer uses an integrated circuit (IC) for data transmission that sends
multiple bits at the same time.
............................................................................................................................................. [1]
Benefit 1
..................................................................................................................................
.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 2
..................................................................................................................................
.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
9
a) Companies use error detection methods to make sure that data is accurate.
Explain what is meant by a check digit and how it is used to detect errors.
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
........... [4]
b) Companies can use a range of Encryption methods to keep their data secure.
Identify two Encryption methods that a company can use to keep their data
secure and explain how each method can keep the data secure.
Encryption method 1
.....................................................................................................................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
Encryption method 2
[Turn over
1
0
.....................................................................................................................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
..................................................................................................................................
.................
...................................................................................................................................................
[6]
1
1
10 Von Nuemann Architecture has following registers
a) State what the CIR,MDR and Program Counter are used for.
CIR.............................................................................................................................
.............
..................................................................................................................................
.................
MDR .........................................................................................................................
................
..................................................................................................................................
.................
Program Counter
..................................................................................................................................
........
...........................................................................................................................
............[3]
12AE
AD89
[2]
1. System clock
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
2. Operand
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
3. Embedded Systems
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
4.Nibble
[Turn over
1
2
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
13