0 ratings0% found this document useful (0 votes) 103 views14 pagesComputer Science 22:01:22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
=
=
a
=
=
=
=
=
=
—
OCR
Oxford Cambridge and RSA
Accredited
GCSE (9-1) Computer Science
J276/02 Computational thinking, algorithms and
programming
Sample Question Paper
Date —- Morning/Afternoon
Time allowed: 1 hour 30 minutes
|
| A
You may not use:
+ a calculator
Jovpulty : =
Lala) GE"T4[49
(Cotas
(Gert | Cy]
\qumber
INSTRUCTIONS
Use black ink
Complete the boxes above with your name, centre number and candidate
number.
‘Answer all the questions.
Write your answer fo each question in the space provided.
\f additional space is required, use the: lined pagefs) at the end of this
booklet. The question number(s) must be clearly shown
+ Donetwrite in the bar codes.
INFORMATION
+ The total mark for this paper is 80.
ocr
sovessen
‘The marks for each question are shown in brackets [ J.
This document consists of 16 pages.
cd
ropa
201s Turn over2
Kofi uses his computer to record an audio fle of himself playing his guiter
(a) Qutline what happens when the computer converts the music into a file
an tell. faken Tegaler
_snteetal - logthe, ark then...
(b) Kofi increases the sample rate his computer is using to record his guitar.
Expiain two effects this will have on Kof's recording.
3 hg Bite,
lacger 1. ApeeauB Ord Tee
a otha gushes Of Me scien iitl be batit bon Das si
i
hecawd?...100t. ACB ANC table. pe. Lecondl —-Ke...h. ts
or acrudalt ia
{e) Kofi is e-mailing his recording to a record label. He uses lessy compression to produce the
mee
Explain two reasons why using lossy compression is beneficial.
.. theft id Ay loe fa. be headin eB a PME oe Babee
Ghethtennd ope, 2lbpl.biwed . Lositlat..088..2ip. file.
«fd... eeeoed need... Aeaatrcd.
ye tha. ty. aed .. Me
EP ccs
1)
omar ans arena
2 (a) Order the following units from smaliest to largest:
GE bit PB byte nibble MB
DUB goth He lB Rp PB
(b) Convert the decimal number 191 into an & bit binary number.
wd QANON OI
s
s ae
a or
{e) Conver the hexadecimal number 3E into a decimal number, You must show your working
wih - SR
woca 20 arena4
(d) There is a subroutine, HEX(), that takes a denary number between 10 and 15 and retums the
corresponding hexadecimal number. €.g. HEX(10) would retum “A*, HEX(15) would return
=
‘Write an algorithm, using the subroutine HEX(), to convert any whole decimal number
between O and 255 into & 2 digit hexadecimal number.
Bee DNL EAN OK.
Gant (13)
© ouezo
rena Turn over5
(ey
{®) Add together the following two 8 bit binary numbers. Express your response in an 8 bit
binary form
a11O/0lo
yO 01101010 yl oeloro.
(O seeue ol Olatra
OL OlO
(1)
3 (a) Complete a 2 place right shift on the binary number 11001011.
OS CULO pie= ed
oven KOON LO
qt]
(b) Explain the effect of performing a 2 place right shift on the binary number 11001011.
ba, 1G
t
a
fl
(c) Complete the truth table below for the Boolean statement P= Not (2 AND B).
= F
FALSE TROE
FALSE TVS
TRUE, tons
TRUE. FRUE, FALSE
pocK 2015
Tum over6
4 Johnny is writing a program lo create usemarties. The frst process he has developed is shown in
the flowchart in Fig. 4
Fig. 1
Start
INPUT
sumame
usemame = name +
LEFT(sumame, 2)
For example, using the process in Fig. 1, Tom Ward's user name would be Torri.
(a) State, using the process in Fig. 1, the usemame for Rebecca Elis.
2.008 2018, waren7
(b) Johnny has updated the process used to create usernames as follows:
I the person is male, then their username is the last 3 letters of their eurmame and
the first 2 letters of their fret namo. 30 then
05 print (‘Sony, that radius is inwalid’)
06 © else
07 area = 3.142 * (radius * 2)
08 print (area)
09 endif
(a) Explain, using examples from the program, two ways Finn can improve the maintainability of
the program. ‘
fit... Shad. ade........endeatittn The
ALE cee bab eee an Seca B.. pse..10teh
PI nel load Be nndbtolll be.
a OA AE TOMS NOE NOL BO arse
PS Piet. (Sond...
1
coca sas
serene4
(b) Identify two variables used in the program.
TAS. sunmemmmenrenciee caxcg
AIEN a ecccsnnnsennce
a
identify one item in the program that could have been written as a constant.
wee BYR cose
m
Give one reasan why you have identified this tem as 3 constant.
tls g)Pi..deeih...ch
WY
fo
{@) Finn uses an IDE (Integrated Development Environment) to write his programs. Identify two
features of an IDE that Finn might use:
Pe dugg “4
a Miggoraapic.. J
deatodien..08 pecenllas,...clese.
a
ogre sn76n2