Computer Science New Worksheet
Computer Science New Worksheet
1 A computer stores data in binary form. Binary numbers can be represented as hexadecimal and denary numbers.
(a) Convert the 8-bit binary number 01010101 to denary
2 (a) Tick to show which logic gates will give an output of 1 for the given inputs A and B.
(b) Draw the logic circuit for the given logic statement:
X = (A XOR B) AND (B OR NOT C) Do not attempt to simplify the logic statement. All logic gates must have a
maximum of two inputs.
3 Adele chooses to set a biometric password for her mobile device, instead of a personal identification number
(PIN).
(b) Give two reasons why a biometric password is more secure than a PIN.
(c) Adele has a software-based firewall installed on her mobile device. The firewall gathers data about the traffic
coming into and going out of her mobile device. Explain how the firewall uses the gathered data to keep the
mobile device more secure.
4
5 This algorithm checks the temperature of hot food being served to customers.
Complete the trace table for the algorithm using this input data: 75, 78, 84, 87, 91, 80, 75, 70, 65, 62, –1, 20
6
7 Stages of program development life cycle
(a) Give the denary number for the binary number stored in the register
(b) Give the hexadecimal number for the binary number stored in the register
(c) A logical left shift of two places is performed on the binary number stored in the register. Complete the
binary register to show its contents after this logical left shift.
(d) The negative denary number −99 needs to be stored in the register. Complete the register to show the
binary number that would be stored, using two’s complement. Show all your working
(e) The number 01001100 is added to 11100011 Add the two 8-bit binary numbers, using binary addition.
Give your answer in binary. Show all your working.
9 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception
(b) Identify one security solution that will help keep data safe from data interception and state why it will help
keep the data safe.
10 The table contains terms and descriptions about the internet. Complete the table with the missing terms and
descriptions
11 A database table called Horses stores details about the horses kept at a horse sanctuary
(a) State the number of records in this database table.
(b) Give the name of the field that is most suitable to be the primary key. State the reason for this choice.
Field ..
Reason ..
FROM .........................................
12 A type of validation check is a length check. Another type of validation check is used to make sure that any
date entered is in the dd/mm/yyyy style: dd means day, mm means month and yyyy means year.
(a) State the type of validation check used.
(b) Give one example of normal test data and one example of abnormal test data you should use to make sure
the check in part (a) is working properly. State a reason for each of your choices of test data.
Normal
Reason
Abnormal
Reason