0% found this document useful (0 votes)
95 views28 pages

Computer Science O Level Specimen Paper

The document is a specimen paper for the Cambridge O Level Computer Science examination, specifically Paper 1, focusing on Computer Systems. It includes instructions for candidates, information about the exam format, and a variety of questions covering topics such as MAC addresses, data packets, IP addresses, and the Von Neumann architecture. The paper is designed for examination from 2023 and has a total mark of 75.

Uploaded by

kalsoomhumera9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views28 pages

Computer Science O Level Specimen Paper

The document is a specimen paper for the Cambridge O Level Computer Science examination, specifically Paper 1, focusing on Computer Systems. It includes instructions for candidates, information about the exam format, and a variety of questions covering topics such as MAC addresses, data packets, IP addresses, and the Von Neumann architecture. The paper is designed for examination from 2023 and has a total mark of 75.

Uploaded by

kalsoomhumera9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cambridge O Level

*0123456789*

COMPUTER SCIENCE 2210/01


Paper 1 Computer Systems For examination from 2023

SPECIMEN PAPER 1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 12 pages. Any blank pages are indicated.

© UCLES 2020 [Turn over


2

1 A school network has several computers.

Each computer in the network has a media access control (MAC) address.

Hexadecimal is used for MAC addresses.

Part of a MAC address is given.

97–5C–E1

Each pair of digits is stored as binary in an 8-bit register.

(a) Complete the binary register for these two pairs of digits.

97

5C
[4]

(b) Describe what is meant by a MAC address.

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

.............................................................................................................................................. [4]

(c) Give two other uses of hexadecimal in computer science.

1 .................................................................................................................................................

2 ............................................................................................................................................ [2]

© UCLES 2020 2210/01/SP/23


3

(d) Another value is stored as binary in a register.

0 1 0 1 0 0 1 0

(i) A logical left shift of two places is performed on the binary value.

Complete the binary register to show its contents after this logical left shift.

[1]

(ii) State one effect this logical shift has on the binary value.

............................................................................................................................................

....................................................................................................................................... [1]

(e) Negative denary numbers can also be represented as binary using two’s complement.

Complete the binary register for the denary value −54.

You must show all your working.

Working space............................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

Register:
[2]

© UCLES 2020 2210/01/SP/23 [Turn over


4

2 A company has a website that is stored on a web server.

(a) The website data is broken down into packets to be transmitted to a user.

Describe the structure of a data packet.

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

............................................................................................................................................... [4]

(b) The website hosts videos that users can stream. The company uploads new videos to the
website.

(i) The videos are compressed before they are uploaded to the website.

Tick () one box to show which statement is a benefit of compressing the videos.

A Data is encrypted.

B Duration of each video will be reduced.

C Less storage space on the web server is required.

D More bandwidth is required when viewing the videos.


[1]

(ii) Give two methods of compression that could be used to compress the videos.

1 .........................................................................................................................................

2 .................................................................................................................................... [2]

© UCLES 2020 2210/01/SP/23


5

(iii) The company uses parallel half-duplex data transmission to transmit the data for the
new videos to the web server.

Explain why parallel half-duplex data transmission is the most appropriate method.

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

....................................................................................................................................... [4]

(c) The company is concerned about a distributed denial of service (DDoS) attack.

(i) Describe what is meant by a DDoS attack.

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

....................................................................................................................................... [4]

(ii) Suggest one security device that can be used to help prevent a DDoS attack.

....................................................................................................................................... [1]

© UCLES 2020 2210/01/SP/23 [Turn over


6

3 (a) A web server has an internet protocol (IP) address.

(i) Give three characteristics of an IP address.

1 .........................................................................................................................................

2 .........................................................................................................................................

3 .................................................................................................................................... [3]

(ii) Identify the network component that uses the IP address to send data only to its correct
destination.

....................................................................................................................................... [1]

(b) The website has a uniform resource locator (URL).

An example of a URL is given.

[Link]

Complete the table to identify the name of each section of the URL.

URL section Name


https
[Link]
/[Link]
[3]

© UCLES 2020 2210/01/SP/23


7

4 A computer has a Von Neumann architechure.

(a) Circle three components that are part of the central processing unit (CPU) in this computer.

accumulator (ACC) hard disk drive (HDD) memory address register (MAR)

program counter (PC) random access memory (RAM)

read only memory (ROM) sensor sold state drive (SSD)


[3]

(b) Describe the purpose of the control unit (CU) within this computer.

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

............................................................................................................................................... [2]

(c) The computer has a single core CPU.

(i) State one purpose of a core in a CPU.

............................................................................................................................................

....................................................................................................................................... [1]

(ii) The computer is upgraded to a dual core CPU.

Explain how the upgrade can affect the performance of the computer.

............................................................................................................................................

............................................................................................................................................

............................................................................................................................................

....................................................................................................................................... [2]

© UCLES 2020 2210/01/SP/23 [Turn over


8

(d) The computer uses a bootstrap.

Tick () one box to show the part of a computer of which the bootstrap is an example.

A application software

B firmware

C hard disk drive

D MAC address
[1]

5 A programmer uses a high-level language to create a computer program.

(a) (i) Identify two advantages to the programmer of using a high-level language instead of a
low-level language.

1 .........................................................................................................................................

2 .................................................................................................................................... [2]

(ii) Suggest one disadvantage to the programmer of using a high-level language instead of
a low-level language.

....................................................................................................................................... [1]

(b) The programmer uses an integrated development environment (IDE) when creating the
computer program.

State what is meant by an IDE.

....................................................................................................................................................

............................................................................................................................................... [1]

© UCLES 2020 2210/01/SP/23


9

6 Robots are used in a factory to build cars.

(a) One characteristic of a robot is its mechanical structure.

State two other characteristics of a robot.

1 .................................................................................................................................................

2 ............................................................................................................................................ [2]

(b) Suggest two advantages of using robots, instead of humans, to build cars in the factory.

1 .................................................................................................................................................

2 ........................................................................................................................................... [2]

7 The Unicode character set is used to represent text that is typed into a computer.

(a) Describe what is meant by a character set.

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

............................................................................................................................................... [2]

(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.

Give one reason why it takes up more storage space.

....................................................................................................................................................

............................................................................................................................................... [1]

© UCLES 2020 2210/01/SP/23 [Turn over


10

8 (a) Draw a diagram to represent how virtual memory is created and used.

[4]

(b) A student is using software to create 3D models. This process often requires the use of
virtual memory.

Explain why virtual memory is needed for this process.

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

............................................................................................................................................... [3]

© UCLES 2020 2210/01/SP/23


11

9 Complete the sentences about symmetric encryption.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

algorithm cipher copied delete key plain

private public standard stolen understood unreadable

The data before encryption is known as .................................................. text.

To scramble the data, an encryption .................................................., which is a type

of .................................................., is used.

The data after encryption is known as .................................................. text.

Encryption prevents the data from being .................................................. by a hacker. [5]

10 An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on
its website.

Describe the process of SSL and explain how it provides a secure connection.

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...................................................................................................................................................... [6]

© UCLES 2020 2210/01/SP/23


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 2210/01/SP/23


Cambridge O Level
*0123456789*

COMPUTER SCIENCE 2210/02


Paper 2 Algorithms, Programming and Logic For examination from 2023
SPECIMEN PAPER 1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 16 pages. Any blank pages are indicated.

© UCLES 2020 [Turn over


2

1 Four pseudocode descriptions and five pseudocode statements are shown.

(a) Draw a line to link each pseudocode description to the most appropriate pseudocode
statement.

Some pseudocode statements will not be used.

Pseudocode description Pseudocode statement

FOR…TO…NEXT

a loop that will always iterate at


least once

IF…THEN…ELSE…ENDIF

a conditional statement to deal


with many possible outcomes

WHILE…DO…ENDWHILE

a loop that will always iterate a set


number of times

CASE…OF…OTHERWISE…ENDCASE

a conditional statement with


different outcomes for true and false

REPEAT…UNTIL

[4]

(b) Using a single loop, write an algorithm in pseudocode to output 50 names that have been
stored in the array, Name[]

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

................................................................................................................................................[3]

© UCLES 2020 2210/02/SP/23


3

2 Describe the purpose of validation and verification checks during data entry.

Include an example for each.

Validation check.................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

Verification check...............................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................
[4]

© UCLES 2020 2210/02/SP/23 [Turn over


4

3 Tick () one box to show the named section of a program that performs a specific task.

A file

B function

C parameter

D process
[1]

4 A satellite navigation system is an example of a computer system that is made up of sub-systems.

Part of a satellite navigation system:


• allows the user to enter details for a new destination or select a previously saved destination
• displays directions in the form of a visual map or as a list.

Draw a structure diagram for this part of the satellite navigation system.

[4]

© UCLES 2020 2210/02/SP/23


5

5 An algorithm has been written in pseudocode to input some numbers. It only outputs any numbers
that are greater than or equal to 100. The number 999 is not output and stops the algorithm.

INPUT Number
WHILE Numbers <> 999 DO
IF Number > 100
THEN
OUTPUT Number
ENDIF
ENDWHILE
OUTPUT Number

(a) Identify the four errors in the pseudocode and suggest corrections.

Error 1 ........................................................................................................................................

Correction ..................................................................................................................................

....................................................................................................................................................

Error 2 ........................................................................................................................................

Correction ..................................................................................................................................

....................................................................................................................................................

Error 3 ........................................................................................................................................

Correction ..................................................................................................................................

....................................................................................................................................................

Error 4 ........................................................................................................................................

Correction ..................................................................................................................................

....................................................................................................................................................
[4]

(b) Write a pseudocode statement to change the corrected algorithm to output all numbers
between 100 and 200 inclusive.

You do not need to rewrite the whole algorithm.

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

............................................................................................................................................... [2]

© UCLES 2020 2210/02/SP/23 [Turn over


6

6 Consider this logic expression.

X = ( A AND B ) OR ( B AND NOT C )

(a) Draw a logic circuit for this logic expression.

Each logic gate must have a maximum of two inputs.

Do not simplify this logic expression.

B X

[4]

(b) Complete the truth table from the given logic expression.

Working space
A B C X

0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]

© UCLES 2020 2210/02/SP/23


7

BLANK PAGE

© UCLES 2020 2210/02/SP/23 [Turn over


8

7 This flowchart represents an algorithm.

START

Flag  0
Count  1

IS Name[Count] Yes
> Name[Count + 1]? Temp  Name[Count]

No Name[Count]  Name[Count + 1]

Name[Count + 1]  Temp

Flag  1

Count  Count + 1

No IS Count
=4?

Yes

No IS Flag
=0?

Yes

STOP

© UCLES 2020 2210/02/SP/23


9

(a) The array Name[1:4] used in the flowchart contains the following data:

Name[1] Name[2] Name[3] Name[4]


Jamal Amir Eve Tara

Complete the trace table using the data given in the array.

Flag Count Name[1] Name[2] Name[3] Name[4] Temp

Jamal Amir Eve Tara

[5]

(b) Describe what the algorithm represented by the flowchart is doing.

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

............................................................................................................................................... [2]

© UCLES 2020 2210/02/SP/23 [Turn over


10

8 A programmer has written an algorithm to check that prices are less than $10.00

These values are used as test data:

10.00 9.99 ten

State why each value was chosen as test data.

10.00 .................................................................................................................................................

...........................................................................................................................................................

9.99 ...................................................................................................................................................

...........................................................................................................................................................

ten .....................................................................................................................................................

...........................................................................................................................................................
[3]

9 Explain why a program might need to store data in a file.

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...................................................................................................................................................... [3]

10 A function is declared using pseudocode.

FUNCTION ConvertToCm(Inches: REAL) RETURNS REAL


RETURN Inches * 2.4
ENDFUNCTION

Tick () one box which accurately describes the use of the variable Inches

A answer

B call

C parameter

D response
[1]
© UCLES 2020 2210/02/SP/23
11

11 A database table, 2018MOV, is used to keep a record of movie details.

CatNo Title Genre1 Genre2 Blu-ray DVD Streaming


18m01 Power Rangers Adventure Fantasy Yes No Yes
18m02 Baywatch Comedy Drama Yes No Yes
18m03 Table 19 Comedy Drama Yes Yes No
18m04 Wonder Woman Action Fantasy Yes No Yes
18m05 Justice League Action Fantasy Yes Yes Yes
18m06 Twilight Thriller Action Yes Yes No
18m07 Ant Man Action Fantasy No Yes No
18m08 Venice Beach Action History No Yes No
18m12 Fast Five Action Thriller No Yes No
18m15 King Kong Adventure Fantasy No Yes No
18m16 Transformers: The Last Knight Action Sci-Fi Yes Yes Yes
18m17 The Dark Tower Fantasy Sci-Fi Yes Yes No
18m19 Beauty and the Beast Fantasy Romance Yes Yes Yes
18m21 The Mummy Action Fantasy No No Yes
18m22 Star Wars: Episode VIII Sci-Fi Action Yes No Yes
18m23 Guardians of the Galaxy Action Sci-Fi Yes Yes Yes
18m26 Thor Action Sci-Fi No Yes Yes
18m27 Twilight Fantasy Sci-Fi No No Yes
18m30 Beneath Action Fantasy Yes No No
18m31 Despicable Me Animation Action Yes Yes No

(a) State the number of records in the database table.

............................................................................................................................................... [1]

(b) (i) Give the name of the field that would be used for the primary key.

....................................................................................................................................... [1]

(ii) State the reason for choosing this field for the primary key.

............................................................................................................................................

....................................................................................................................................... [1]

© UCLES 2020 2210/02/SP/23 [Turn over


12

(c) Complete the table to identify the most appropriate data type for each field based on the data
shown in the database table, 2018MOV.

Field Data type

CatNo

Title

Genre1

Streaming

[2]

(d) Complete the structured query language (SQL) to return the category number and title for all
Comedy movies.

SELECT CatNo, Title

.................................................. 2018MOV

WHERE Genre1 = ..................................................;


[2]

© UCLES 2020 2210/02/SP/23


13

12 The variables X, Y and Z are used to store data in a program:

• X stores a string
• Y stores a position in the string (e.g. 2)
• Z stores the number of characters in the string.

(a) Write pseudocode statements to declare the variables X, Y and Z.

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

............................................................................................................................................... [3]

(b) The function LENGTH(X) finds the length of a string X.

The function SUBSTRING(X,Y,Z) finds a substring of X starting at position Y and Z


characters long. The first character in X is in position 1.

Write pseudocode statements to:


• store the string "Programming is fun" in X
• find the length of the string and output it
• extract the word fun from the string and output it.

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

....................................................................................................................................................

............................................................................................................................................... [6]

© UCLES 2020 2210/02/SP/23 [Turn over


14

13 The one-dimensional (1D) array StudentName[] contains the names of students in a class.
The two-dimensional (2D) array StudentMark[] contains the mark for each subject, for each
student. The position of each student’s data in the two arrays is the same, for example, the student
in position 10 in StudentName[] and StudentMark[] is the same.

The variable ClassSize contains the number of students in the class. The variable SubjectNo
contains the number of subjects studied. All students study the same number of subjects.

The arrays and variables have already been set up and the data stored.

Students are awarded a grade based on their average mark.

Average mark Grade awarded


greater than or equal to 70 distinction
greater than or equal to 55 and less than 70 merit
greater than or equal to 40 and less than 55 pass
less than 40 fail

Write a program that meets the following requirements:


• calculates the combined total mark for each student for all their subjects
• calculates the average mark for each student for all their subjects, rounded to the nearest
whole number
• outputs for each student:
– name
– combined total mark
– average mark
– grade awarded
• calculates, stores and outputs the number of distinctions, merits, passes and fails for the
whole class.

You must use pseudocode or program code and add comments to explain how your code works.

You do not need to initialise the data in the array.

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

© UCLES 2020 2210/02/SP/23


15

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................
© UCLES 2020 2210/02/SP/23 [Turn over
16

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

...........................................................................................................................................................

.................................................................................................................................................... [15]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2020 2210/02/SP/23

You might also like