Paper 1 SL MS
Paper 1 SL MS
1. State two compatibility issues that may occur when two information technology (IT) systems
are merged. [2]
● Language differences / lexical differences present across datasets to be merged;
● Data representation differences / different data structures (e.g., date format,
incompatible file formats);
● Incompatible hardware;
● Incompatible operating systems / different software versions;
2. Identify three functions of the control unit (CU) in the central processing unit (CPU) [3]
● Decodes the instructions
● Control Signal Generation // controls all the other internal components of the CPU
● Timing and Sequencing // The CU manages the timing and order of operations,
ensuring that each step in the execution of an instruction happens in the correct
sequence and at the right time.
● Retrieves and stores data/addresses from RAM // writes or reads the data to/from the
location in RAM
3. State three pieces of information that a data packet must contain. [3]
● Destination Address
● Source Address
● Payload
5. Identify two usability problems that can occur in a voice recognition system. [2}
○ Accuracy Issues
○ Limited Vocabulary and Understanding.
○ Need Training
6. Outline the role of the memory data register in the machine execution cycle. [2]
First Mark: Awarded for stating that the Memory Data Register (MDR) is used to temporarily
hold data that is being transferred to or from the computer's main memory. (1 mark)
○ Second Mark: Awarded for explaining that the MDR interfaces between the CPU and
the memory, serving as a buffer that either stores data fetched from memory awaiting
to be processed by the CPU or holds data that the CPU is sending to memory. (1
mark)
7. Construct a truth table for the following logical expression. [3]
○ (A XOR B) AND NOT C
0 0 0 0 1 0
0 0 1 0 0 0
0 1 0 1 1 1
0 1 1 1 0 0
1 0 0 1 1 1
1 0 1 1 0 0
1 1 0 0 1 0
1 1 1 0 0 0
Award [4 max]
Example 1:
Calculate the index of the middle point in the array: (first + last)/2;
Compare item found with the one stored at middle point;
If greater than the value at the middle point, search the upper half of the array (right side) by
calling the binary search method again with a new first index (first = middle + 1);
If smaller than the value at the middle point, search the lower half of the array (left side) by
calling the binary search method with a new last (last = middle −1);
if found algorithm terminates;
Example 2:
Find the centre point of the array[ ];
Compare item to be found with the current name in array[ ];
If correct surname found => STOP;
Else if item to be found is greater than the current name in array eliminate lower half of array
from search and repeat algorithm;
Else if item to be found is less than the name in array eliminate upper half of array from
search and repeat algorithm;
A=3
B=7
A=A+1
output(B – A)
B=B-1
end loop
A B output
3 7
4 4
5 6 1
6 5 -1
(a) Outline one security measure that can be taken to prevent unauthorized
access to the patients' data stored on the central computer. [2]
● (ii) Describe one method that can be used to prevent data loss [2]
Regular backups of all critical data, which can be stored off-site or in the
cloud to ensure it can be recovered in case of data loss. (1 mark)
● Use of Uninterruptible Power Supplies (UPS) to prevent data loss due to
power outages or surges. (1 mark)
● Implementing disk mirroring or RAID (Redundant Array of Independent
Disks) systems to duplicate data across multiple drives, which ensures data
is not lost if one drive fails. (1 mark)
● Employing version control systems to keep track of changes and allow
rollback to previous versions in case of data corruption. (1 mark)
A new vaccine has been distributed that would be of benefit to some of the doctor's
patients. A large number of personalized letters need to be written to these patients,
inviting them to visit the doctor's practice to be vaccinated.
When the doctor visits a patient in their home, she needs to be able to access the
patient's medical records stored on the central computer in the practice.
(d) Outline two reasons for the use of a virtual private network (VPN)
in this situation. [4]
● Security:
○ data encryption provided by the VPN (1 Mark)
○ encryption protects sensitive data from unauthorized access.(1
Mark)
● Remote Access:
○ remote access capability provided by the VPN. (1 Mark)
○ allows the doctor to retrieve patient records as if they were on the
local network. (1 Mark)
(e) Explain why the speed of data transmission across a mobile network can
vary. [3]
● Signal Strength: The strength of the signal between the mobile device and
the cell tower can affect transmission speeds. Obstacles such as buildings,
natural terrain, or distance from the tower can weaken the signal, leading to
slower speeds. (up to 3 marks)
11. A systems analyst has been employed to make proposals on how to improve the current
operation of a design company.
(a) (i) Identify one other method of obtaining information from the
end-users. [1]
● Phone interviews
● Online surveys
● Focus groups
● Observation
● Document analysis
● Online user forums or communities
(ii) Outline one advantage of using the method identified in part (a)(i) in
preference to interviews. [2]
(Question 11 continued)
A software company has been employed to program and implement a new system
proposed by the systems analyst.
(c) Explain why software testing is important at all stages of implementation. [3]
● Detecting and Fixing Bugs: Testing helps identify and uncover software defects,
bugs, and errors.
● Ensuring Functionality and Quality: Testing verifies that the software meets the
specified requirements and functions as intended.
● Validating System Integration: During implementation, various software
components, modules, or subsystems are integrated to form a cohesive system.
● Assessing Performance and Scalability: Testing allows for evaluating the
performance of the software under different conditions and workloads.
● Verifying Security and Compliance: Testing is essential for validating the security of
the software and ensuring that it adheres to relevant standards, regulations, or
industry best practices.
● Enhancing User Experience: Testing is critical for ensuring a positive user
experience.
● Building Confidence and Trust: Thorough testing instills confidence in the
software's reliability and performance.
Using images in design may have ethical considerations.
(d) Explain one ethical problem associated with using images. [3]
(e) (i) Describe how large image files can be sent by email. [3]
● File Compression: Use file compression software or tools to reduce the size of the
image file without compromising its quality. You can compress the image file into a
more compact format, such as ZIP or RAR. This can significantly reduce the file size,
making it easier to send as an email attachment. However, note that some email
providers may still have limitations on the maximum compressed file size.
● Cloud Storage Links: Instead of attaching the large image file directly to the email,
upload the file to a cloud storage service like Google Drive, Dropbox, or OneDrive.
Once uploaded, generate a shareable link for the file and include it in the email. This
way, the recipient can access and download the file from the cloud storage service
without any size limitations. Ensure that the cloud storage account has sufficient
space to accommodate the large image file.
● File Transfer Services: There are specialized file transfer services designed for
sending large files. These services allow you to upload your image file to their servers
and generate a secure download link. You can then include the download link in the
email for the recipient to access and download the file. Examples of such services
include WeTransfer, SendSpace, or Filemail.
● FTP (File Transfer Protocol): If you have access to an FTP server, you can upload
the large image file to the server and provide the recipient with the FTP server details,
including the login credentials and file location. The recipient can then use an FTP
client to connect to the server and download the file. FTP is suitable for larger files
and is commonly used for file transfers.
● Splitting the File: If none of the above methods are feasible, you can split the large
image file into smaller parts using file splitting software. This divides the file into
several segments, each below the attachment size limit. You can then send each
segment as a separate email attachment, and the recipient can reconstruct the
original file using file merging software.
(ii) State one other hardware or software problem associated with the use
of images. [1]
● Insufficient Storage
● Inadequate Processing Power
● Display Quality and Calibration
● Incompatible Hardware Devices
(a) State the judge who awarded the highest score to the competitor Tea Fox. [1]
Answer: 3
(b) Construct an algorithm that determines and outputs the number of times the highest
attainable score was awarded in this competition. [4]
- Search through the 2D array to find highest score (which is =10) - use of any
applicable loop (nested for loop for ex) - 2 marks - a correct row and column loop
- Declaration of the variable that represents the count of the highest score and
increment by 1
- If statement with the correct condition (highest attainable score = 10.0)
- Output of the count of the highest score
highest_score_count = 0
for n in 0 to 19:
for j in 0 to 7:
If SCORES[ n ] [ j ] = 10.0
highest_score_count += 1
OUTPUT highest_score_count
n=0
j=0
If SCORES[ n ] [ j ] = 10.0:
highest_score_count += 1
j+=1
n+=1
j=0
A competitor's final score is calculated by ignoring the highest and the lowest mark
awarded and averaging the remaining marks.
For example, the highest mark awarded to Lilly Bush was 7.9, and the lowest mark was 6.9,so her
final score was(7.2+ 6.9 + 6.9 + 6.9 +6.9 + 7.2)/6.
(c) Construct an algorithm in pseudocode to output the name and the final score for
every competitor. [10]
Answer:
2 marks - for looping through 2D array (rows and columns)
1 mark - finding min score (if statement) - searching through all the scores
1 mark - finding max score - searching through all the scores
1 mark - assigning min score to a variable, such as minScore
1 mark - assigning max score to a variable, such as maxScore
1 mark - for calculating total and average
1 mark - for subtracting max_Score / min_Score from total_Score or any valid alternative calculation
1 mark - for correct use of row index and column index throught the solution
1 mark - for outputting name and score with correct indices
min_Score = SCORES[n][0]
max_Score = SCORES[n][0]
total_Score = 0
for j in range 0 to 7:
total_Score -= minScore
total_Score -= maxScore