Computer Science O Level Specimen Paper
Computer Science O Level Specimen Paper
*0123456789*
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
Each computer in the network has a media access control (MAC) address.
97–5C–E1
(a) Complete the binary register for these two pairs of digits.
97
5C
[4]
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
.............................................................................................................................................. [4]
1 .................................................................................................................................................
2 ............................................................................................................................................ [2]
0 1 0 1 0 0 1 0
(i) A logical left shift of two places is performed on the binary value.
Complete the binary register to show its contents after this logical left shift.
[1]
(ii) State one effect this logical shift has on the binary value.
............................................................................................................................................
....................................................................................................................................... [1]
(e) Negative denary numbers can also be represented as binary using two’s complement.
Working space............................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
Register:
[2]
(a) The website data is broken down into packets to be transmitted to a user.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [4]
(b) The website hosts videos that users can stream. The company uploads new videos to the
website.
(i) The videos are compressed before they are uploaded to the website.
Tick () one box to show which statement is a benefit of compressing the videos.
A Data is encrypted.
(ii) Give two methods of compression that could be used to compress the videos.
1 .........................................................................................................................................
2 .................................................................................................................................... [2]
(iii) The company uses parallel half-duplex data transmission to transmit the data for the
new videos to the web server.
Explain why parallel half-duplex data transmission is the most appropriate method.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [4]
(c) The company is concerned about a distributed denial of service (DDoS) attack.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [4]
(ii) Suggest one security device that can be used to help prevent a DDoS attack.
....................................................................................................................................... [1]
1 .........................................................................................................................................
2 .........................................................................................................................................
3 .................................................................................................................................... [3]
(ii) Identify the network component that uses the IP address to send data only to its correct
destination.
....................................................................................................................................... [1]
[Link]
Complete the table to identify the name of each section of the URL.
(a) Circle three components that are part of the central processing unit (CPU) in this computer.
accumulator (ACC) hard disk drive (HDD) memory address register (MAR)
(b) Describe the purpose of the control unit (CU) within this computer.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [2]
............................................................................................................................................
....................................................................................................................................... [1]
Explain how the upgrade can affect the performance of the computer.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
....................................................................................................................................... [2]
Tick () one box to show the part of a computer of which the bootstrap is an example.
A application software
B firmware
D MAC address
[1]
(a) (i) Identify two advantages to the programmer of using a high-level language instead of a
low-level language.
1 .........................................................................................................................................
2 .................................................................................................................................... [2]
(ii) Suggest one disadvantage to the programmer of using a high-level language instead of
a low-level language.
....................................................................................................................................... [1]
(b) The programmer uses an integrated development environment (IDE) when creating the
computer program.
....................................................................................................................................................
............................................................................................................................................... [1]
1 .................................................................................................................................................
2 ............................................................................................................................................ [2]
(b) Suggest two advantages of using robots, instead of humans, to build cars in the factory.
1 .................................................................................................................................................
2 ........................................................................................................................................... [2]
7 The Unicode character set is used to represent text that is typed into a computer.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [2]
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.
....................................................................................................................................................
............................................................................................................................................... [1]
8 (a) Draw a diagram to represent how virtual memory is created and used.
[4]
(b) A student is using software to create 3D models. This process often requires the use of
virtual memory.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [3]
Some of the terms in the list will not be used. You should only use a term once.
of .................................................., is used.
10 An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on
its website.
Describe the process of SSL and explain how it provides a secure connection.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [6]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
(a) Draw a line to link each pseudocode description to the most appropriate pseudocode
statement.
FOR…TO…NEXT
IF…THEN…ELSE…ENDIF
WHILE…DO…ENDWHILE
CASE…OF…OTHERWISE…ENDCASE
REPEAT…UNTIL
[4]
(b) Using a single loop, write an algorithm in pseudocode to output 50 names that have been
stored in the array, Name[]
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
................................................................................................................................................[3]
2 Describe the purpose of validation and verification checks during data entry.
Validation check.................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
Verification check...............................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
[4]
3 Tick () one box to show the named section of a program that performs a specific task.
A file
B function
C parameter
D process
[1]
Draw a structure diagram for this part of the satellite navigation system.
[4]
5 An algorithm has been written in pseudocode to input some numbers. It only outputs any numbers
that are greater than or equal to 100. The number 999 is not output and stops the algorithm.
INPUT Number
WHILE Numbers <> 999 DO
IF Number > 100
THEN
OUTPUT Number
ENDIF
ENDWHILE
OUTPUT Number
(a) Identify the four errors in the pseudocode and suggest corrections.
Error 1 ........................................................................................................................................
Correction ..................................................................................................................................
....................................................................................................................................................
Error 2 ........................................................................................................................................
Correction ..................................................................................................................................
....................................................................................................................................................
Error 3 ........................................................................................................................................
Correction ..................................................................................................................................
....................................................................................................................................................
Error 4 ........................................................................................................................................
Correction ..................................................................................................................................
....................................................................................................................................................
[4]
(b) Write a pseudocode statement to change the corrected algorithm to output all numbers
between 100 and 200 inclusive.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [2]
B X
[4]
(b) Complete the truth table from the given logic expression.
Working space
A B C X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
BLANK PAGE
START
Flag 0
Count 1
IS Name[Count] Yes
> Name[Count + 1]? Temp Name[Count]
No Name[Count] Name[Count + 1]
Name[Count + 1] Temp
Flag 1
Count Count + 1
No IS Count
=4?
Yes
No IS Flag
=0?
Yes
STOP
(a) The array Name[1:4] used in the flowchart contains the following data:
Complete the trace table using the data given in the array.
[5]
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [2]
8 A programmer has written an algorithm to check that prices are less than $10.00
10.00 .................................................................................................................................................
...........................................................................................................................................................
9.99 ...................................................................................................................................................
...........................................................................................................................................................
ten .....................................................................................................................................................
...........................................................................................................................................................
[3]
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...................................................................................................................................................... [3]
Tick () one box which accurately describes the use of the variable Inches
A answer
B call
C parameter
D response
[1]
© UCLES 2020 2210/02/SP/23
11
............................................................................................................................................... [1]
(b) (i) Give the name of the field that would be used for the primary key.
....................................................................................................................................... [1]
(ii) State the reason for choosing this field for the primary key.
............................................................................................................................................
....................................................................................................................................... [1]
(c) Complete the table to identify the most appropriate data type for each field based on the data
shown in the database table, 2018MOV.
CatNo
Title
Genre1
Streaming
[2]
(d) Complete the structured query language (SQL) to return the category number and title for all
Comedy movies.
.................................................. 2018MOV
• X stores a string
• Y stores a position in the string (e.g. 2)
• Z stores the number of characters in the string.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [3]
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
............................................................................................................................................... [6]
13 The one-dimensional (1D) array StudentName[] contains the names of students in a class.
The two-dimensional (2D) array StudentMark[] contains the mark for each subject, for each
student. The position of each student’s data in the two arrays is the same, for example, the student
in position 10 in StudentName[] and StudentMark[] is the same.
The variable ClassSize contains the number of students in the class. The variable SubjectNo
contains the number of subjects studied. All students study the same number of subjects.
The arrays and variables have already been set up and the data stored.
You must use pseudocode or program code and add comments to explain how your code works.
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
© UCLES 2020 2210/02/SP/23 [Turn over
16
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
...........................................................................................................................................................
.................................................................................................................................................... [15]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.