IGCSE COMP
Describe how a digital image file is stored by a computer.
Any three from:
• Image is made of pixels
• Each pixel stores one colour
• Image has a set number of pixels wide by pixels high
• Each colour has a unique binary value // Each colour has a unique colour code
• The colour/binary value of each pixel is stored in sequence
• File contains metadata to identify how the file should be displayed
• … metadata can be the colour depth / resolution
Explain why Nadia compresses the digital image file before emailing it.
•reduces the storage/memory space taken on email server // reduces the storage space taken on her
friend's computer when downloaded
• sending/receiving email accounts may have restricted file size for attachments
• reduces the time taken to transmit/upload/download to destination
• reduces amount of bandwidth needed to transmit/download
• file will mean less data usage is taken (for mobile clients)
Explain why lossy compression is not suitable.
• Data will be permanently removed
• … and that could be important/necessary data
• (The report will have text in it and) lossy is not suitable for text files
• … as it will damage/corrupt the file
• The report may have images in it and the quality of these will be reduced
Describe how the parity bits are used to detect errors.
•Parity can be set to odd or even
• Sender and receiver agree on parity to use
• Data/email/image is split into bytes // blocks of 7 bytes
• Sender counts the number of 1s/0s in each group/byte
• Each group/byte is assigned a parity bit to match the parity/odd/even
• Receiving device/server recounts the number of 1s/0s in each group/byte
• … and compares to parity used/odd/even and if it does not match the parity, an error is
reported/identified
• (in block check) the location of the error(s) can be identified/estimated at the intersection
Identify and describe one other method of error detection used during the transmission of data.
Checksum
•Value is calculated from the data …
•…using an algorithm // by example
•Value is transmitted with the data
•Value recalculated by receiver (using same algorithm) …
• …if checksum values are different there is an error // reverse
Automatic Repeat request/reQuery (ARQ)
• Uses acknowledgement and timeout
•Sender starts a timer when data is transmitted
•Receiver uses an error checking method to check whether the data has been received accurately
•If no error detected a positive acknowledgement is returned to sender
•If error detected negative acknowledgement is returned to sender
•If sender gets no acknowledgement within the set time it resends the data
Explain why LCD is better than DLP
• More visible pixels // higher resolution
•Higher colour contrast (in ambient lighting) // more vivid colours
•Colours are (often) more accurate
•Image (usually) appears brighter (with same wattage)
•Will be stationary so does not need the portability of DLP
•Does not need the compactness of DLP
•Cost of purchase (usually) less
•Run quieter
• Any surface can be used as a display
• Uses less power • Produces less heat
•Does not give the rainbow effect DLP often gives
• Longer lasting lamps
Give one example of primary storage. Explain the purpose of your chosen example
• RAM
• To store data/instruction that is currently in use
• To store software/programs that are currently in use
• For volatile storage // to store data temporarily
• To allow data to be accessed directly by the CPU/processor // To allow data to be stored closer to the
CPU/processor
• ROM
• To store the BIOS
• To store the bootstrap/bootloader
• To store start-up instructions
• To store the firmware
• For non-volatile storage // to store data permanently
• To store data/instructions that should not change (unless needed)
• Cache
• To store frequently used instructions/data
• For volatile storage // to store data temporarily
Identify and justify an appropriate storage device to store the copies
HDD
• Large capacity storage
• …for videos/films that have large file sizes / require large storage space
• Longevity // Can be read from/written to large number of times
• … the copies will be accessible for a long time // device will not break if accessed regularly
• …may require large number of read/write to access fields
• Relatively cheap per GB // cheaper than SSD per GB …
• … there is a large capacity required therefore overall may cost less than other devices
• Device will not be moved regularly so no need for portability/durability
SSD
• Large capacity storage
• …for videos/films that have large file sizes / require large storage space
• No moving parts
• …can be carried/moved to other locations with limited risk of damage
• Fast access speed
• … videos are large files that will be stored/accessed in less time
• Cost per GB is not significant (in comparison)
• …there is a large capacity required therefore overall cost will not be significantly more than others
• Used as a copy of files to may not be accessed regularly
• … the limited number of read/write times/longevity is inconsequential
• Uses less power // runs cooler
• No latency // does not take time to start-up
•Small in size
•Low power consumption
•Lower temperature
•Portable
•Faster access speeds
•Runs quietly
Describe functions of IP address
IPv4:
• 4 groups of numbers // 12 numbers
• separated by full stops (.)
• 0-255 in each group
• 4 bytes long // 32 bits
• Represented in denary
IPv6:
• 8 groups of numbers // 32 numbers
• separated by colons (:)
• 0-FFFF in each group
• 16 bytes long // 128 bits
• Consecutive groups of 0000 can be replaced with ::
• Represented in hexadecimal
Describe function of MAC
First part is manufacturer ID
• Second part is serial number
• Each part has 3 pairs of numbers // Each part has 6 numbers // 6 pairs of 2-digits // consists of 12
numbers
• …between 00 and FF
• ..separated by :
• Each part is 3 bytes // Is 6 bytes long // Is 48 bits long
• Represented using hexadecimal
Effects of Ddos on company
Denial of service
• Users cannot access the website
• Loss of sales (of holidays)
• Loss of reputation Proxy/firewall
Solution: Proxy server
Effects of Malware on company
• Data on the server may be deleted/changed
• Website may be deleted/changed
• Server may be filled with data and crash
Solution: Anti malware/Anti virus
Advantage of interpreter
• … easier to debug
• …stops when an error is detected
• …reports one error at a time
• …can correct errors in run-time // correct the line and then continue running from that point
• …can test one section without the rest of the code being completed
Advantage of compiler
After completion
• It creates an executable file
• …than can be distributed without source code
• …so that other people cannot edit/view the code
• …so end users do not need translator software // so end users do not need to compile/interpret each
time
• …so it is machine/platform independent (usually)
In final testing
• It creates an executable file
• …do not need to retranslate for each test sequence
• …can test repeatedly with different data faster
Another example of SSD
Usb flash memory drive
How are laser use in optical storage
•Laser is shone at the disk
•An (arm/head) moves the laser across the surface of the disk
•The laser burns pits onto the surface of the disk
•The laser is used to read the pits and lands on the surface of the disk
•The reflected light from the laser shining on the disk is captured (by a sensor)
Explain why a computer can only process binary data
•Computer consist of logic circuits/gates … …
•that can only store/process data in two states 1 and 0
What is a Web browser
•SOFTWARE that allows users to view web pages and renders HTML
What is a URL
•A TEXT BASED VERSION of a web address
What is a Cookie
•TEXT FILE that stores user preferences
Give two reasons why an LED display screen has been used.
•It has a bright screen/colours
•It does not consume much power
•It runs at a cool temperature
•Longevity
•Can operate in cold conditions
•Can be small/compact/thin
Explain the purpose of the CPU. Identify the three stages of the cycle performed by the CPU in
your answer.
Any two from:
•It processes data
•It processes/executes instructions
•It carries out calculations
•It carries out logical operations
Any three from: Fetch Decode Execute
Describe the purpose of the MAR in the CPU.
•To temporarily store …
•the address of the next data/instructions required …
•the address of the location in memory where data is to be stored
•Stores the address that is to be collected by the address bus
Describe how the text document is scanned by the 2D scanner to create the digital version.
•A light is shone onto the surface of the document
•The light is moved across/down/under the document
•The reflected light is captured (using mirrors and lenses)
•The reflections are converted to binary
Identify the component within the CPU that the accumulator is built into and describe the purpose
of the accumulator
Any two from:
• To temporarily store data
• It stores the result of interim calculations
One from:
• Arithmetic logic unit / ALU
Why hexadecimal over binary
•It takes up less space on a display
Give two reasons why chooses to write the software in assembly language.
•He can directly access the hardware
• He can use special machine-dependent instructions
• There is no need for the program to be portable
• Smaller file size // takes up less storage space
• More efficient use of memory
• Programs will be more time efficient when running
Give two drawbacks of using assembly language to write programs.
• Programs are not portable
• It is complex to learn
• Difficult to debug
How HTTPS is used to secure connection
• Web browser sends request to web server
• … to view the digital certificate
• Web server sends the digital certificate to the web browser
• Web browser checks the certificate for authenticity
• If certificate is authentic a secure connection is created
• Any data sent is encrypted
• If certificate is not authentic the connection is rejected
• Uses a protocol such as SSL/TLS
Explain what is meant by the term cookies and give two examples of how cookies can be used.
Any two from:
• A (small) text files
• … that is stored by the browser
• … sent between web server and browser when user visits the website
Any two from e.g.:
• To track users browsing habits
• To store personal details
• To tailor web page to user's presentation requirements
• To store items in a virtual shopping cart
• To tailor adverts to a user
How does proxy server protect
• It examines the incoming traffic to server
• It limits the number of requests to the website
• … preventing too many requests that could overwhelm the server
• Block multiple requests from the same IP within a timeframe
Describe how resistive touch screen technology operates to recognise a user’s touch
• The screen is made up of (two) layers/multiple layers
• The user pushes the top layer into the bottom layer // The user pushes the layers together
• The layers create a circuit (when pushed together)
• causing electricity to flow
• allowing the co-ordinates/location of the users touch to be calculated
Give two benefits of using resistive touch screen technology
• Cheap to manufacture/buy
• Can still be used whilst wearing gloves
• Waterproof // Can be used in bad weather
• Does not easily shatter
• Low power consumption
• (Can) support multitouch
Give two problems of using resistive touch screen technology
• Does not (normally) support multitouch
• Screen visibility can be poor in sunlight
• Longevity issues
• (Normally) lower resolution
• Not very sensitive to touch // Lower response time (than capacitive)
• Prone to scratches
Describe the stored program concept.
• Data and instructions are stored in the same memory • and can only be fetched one at a time
State two methods she could use to help prevent accidental loss of data in this way.
• Create a back-up
• this means the data can be restored/recovered
• Add verification
• to get the user to confirm they want to delete the data
• Set access rights
• so that she cannot delete any files
Explain why the parity bit you found from the parity block contains an error
• Counted all the 1s
• An even parity has been used
• Odd number of ones in that row (byte _) and column (bit _)
Explain why Jian uses a proxy server as part of the system for his website.
• To act as intermediary between browser and web server
• to filter/examine/monitor traffic to the web server
• to help stop malicious traffic to the web server
• To cache frequently viewed web pages
• to allow faster response time for requests
• to reduce the number of requests the server needs to process
• To help prevent DoS
• stopping the webserver being overloaded with requests
• by redirecting away from server // by stopping DoS attack reaching server
• To act as a firewall
Give three other benefits of using a USB connection
• It can charge/power the device
• It is a universal/industry standard
• Fast rate of data transfer
• Supports different data transmission speeds
• Automatically detects the phone
• Backward compatible
• Little chance of data being skewed
How QR codes work
• The device shines a light/laser onto the QR code
• Corners of code are used to determine position/orientation
• Black and white sections of code reflect light differently
• The device captures the light that is reflected back …
• … using sensors
• The light reflections are converted to binary
• Link/URL to video is stored in the QR code
Describe how the LED screen operates to display the video.
• Display made up of pixels
• … that are arranged in a matrix
• LEDs are behind the screen
• Light shone at pixels
• Can have diffuser is used to distribute light evenly
• RGB filters used
• … and are mixed to create different colours
Describe what is meant by HTTPS
• It is a secure protocol // hypertext transfer protocol secure
• It is a set of rules for data transmission
• It combines HTTP and SSL/TLS to transmit data
• It encrypts data for transmission
Microprocessor questions example answer
• Uses an infra-red/proximity sensor
• Sensor continuously sends the digitised value/reading/distance to the microprocessor
• Microprocessor compares the data/signal to the stored value of 10(cm)
• If the data/signal is greater than the stored value/10 …
• …a signal is sent to make the robot move forward
• If the data/signal is less than or equal to the stored value/10 …
• …a signal is sent to make robot turn
• An actuator is used to make the robot turn/move forward
• The whole process repeats continuously until turned off/stopped
Describe the characteristics of AI.
• Collects data
• Stores rules for using the data
• The ability to reason
• The ability to learn // uses machine learning
• … by adapting what it does
• … for example, from mistakes to not make them again // result from previous decisions impacts future
• … by changing its own rules
• …by changing its own data
• …by being trained
• Makes one or more predictions (to make a decision)
• Find/analyse patterns
Explain why the overflow error occurred.
• The result of the calculation is greater than 255 // The value generated is larger than can be stored in
the register
•The result of the calculation would require more than 8 bits to be represented // A register has a
predetermined number of bits and there are too many bits for it
Explain how the file is transmitted using packet switching.
•Data is broken/split/divided into packets
•Each packet (could) take a different route
• A router controls the route/path a packet takes … selecting the shortest/fastest available route/path
•Packets may arrive out of order
•Once the last packet has arrived, packets are reordered
• If a packet is missing/corrupted, it is requested again
Describe what is meant by a dynamic IP address
•It can be used to uniquely identify a device (on a network)
•It can change … … each time the device is connected to the network
Describe what is meant by a low-level language.
•Close to the language processed by computers
•May use mnemonics
•An example is assembly language/machine code
Give two reasons why the programmer would choose to write the computer program in a low -level
language instead of a high-level language.
•Can directly manipulate the hardware
•No requirement for the program to be portable
• Program will be more memory efficient
•No requirement for a compiler/interpreter
•Quicker to execute
•Can use specialised hardware
Brute force attack process
•Trial and error to guess a password
•Combinations are repeatedly entered … … until correct password is found
•Can be carried out manually or automatically by software
State two other aims for carrying out a brute-force attack to gain access to the employee user
accounts.
•Steal/view/access data
•Delete data
• Change data
• Lock account // Encrypt data
•Damage reputation of a business
State two other characteristics of a robot.
•Electrical components
•Mechanical frameworks
Pharming reason
•Obtain PERSONAL details
Explain the difference between session cookies and persistent cookies.
•Session cookies are stored in memory/RAM …
•whereas persistent cookies are stored on the hard drive/secondary storage
•When the browser is closed a session cookie is lost …
•whereas a persistent cookie is not lost
• … until deleted by the user/they expired
Describe how the text is converted to binary to be processed by the computer.
Any three from:
•A character set is used …
•such as Unicode/ASCII
•Each character has a unique binary value
Describe how lossless compression compresses the text file.
•A compression algorithm is used …
•such as RLE/run length encoding
•Repeating words/characters/phrases are identified // Patterns are identified …
•and indexed …
•with number of occurrences …
•with their position
Describe what is meant by cloud storage.
•A collection of servers …
•that store data in a remote location // that allows data to be accessed remotely
•… that are (normally) accessed using an internet connection
Explain two advantages for the owners of the company of storing its data in cloud storage
Four from e.g.:
− The data can be accessed from any location
− … meaning that employees can work from anywhere with a connection
− The hardware is owned/maintained by a third party
− … meaning that the company are not responsible for maintaining // meaning the
company aren’t responsible for its security
− Can increase the storage needed easily
− … without needing to buy new hardware
− Do not need to house the hardware needed
− … costs can be saved on the space saved for this
− Cloud system will back up the data
− … meaning the company does not need to do this
Explain one disadvantage to employees of the company storing data in the cloud.
− Internet connection is needed/needs to be stable …
− … and if this is not available/unstable the data cannot be accessed
− Employees could be pressured to work outside of hours …
− … as they can access the data from any location
Describe how the compiler reports errors.
•It creates an error report after trying to compile …
•displaying all errors in the code …
•that require correction before execution can take place
Describe the role of the inference engine in an expert system
•It makes decisions …
•by applying the rules/logic to the facts/knowledge … …
• to provide a result/diagnosis
The CPU is replaced with one that has four cores. Explain the effect this has on performance
•Increased performance as instructions can be processed simultaneously
Describe what is meant by access levels.
•Providing users with different permission for the data
•Limiting access to reading data
•limiting the data that can be viewed
•Limiting access to editing data // limiting the data that can be deleted / changed
•Normally linked to a username
Describe the role of the rule base in an expert system.
•Stores the rules for the system …
•for the inference engine to use
•Used to link the facts in the knowledge base
Give two features of magnetic storage.
− Data is stored on platters
− (Platters) are divided into tracks and sectors
− Has components that are spun
− Data is read/written using a read/write arm
− Data is read/written using electromagnets
− Magnetic field determines the binary value
− It is non-volatile
Give three features of solid-state storage.
Any three from:
− Flashes data onto chips
− Uses transistors
− Uses NAND/NOR technology
− Uses control gates
− Uses flow gates
− Controls the flow of electrons
− It can be volatile or non-volatile
Describe how interrupts are used when a key is pressed on a keyboard.
Any five from: e.g.
− Key press generates the interrupt
− Interrupt given a priority
− Interrupt is sent to CPU
− Interrupt is placed in a queue
− CPU stops current task to check the queue/service the interrupt …
− … using an interrupt service routine
− If key press is highest priority the interrupt is processed
A key press is one example of a hardware interrupt. Give two other examples of a hardware
interrupt
− Moving the mouse
− Clicking a mouse button
− Plugging in a device
− Paper jam in printer
− Printer out of paper
State what is meant by software
Instructions/program that is used to operate a computer/hardware
Give two examples of a software interrupt.
− Division by zero
− Two processes accessing the same memory location
− Null value
Give two characteristics of an embedded system.
− Performs a single/limited/dedicated function/task
− It has a microprocessor
− It has dedicated hardware
− Uses firmware
− It is normally built into a larger device/system
− User normally cannot reprogram
− It does not require much power
− It is cheap to manufacture
− Works automatically // works without human intervention
− It is small (in size)
− It is a real-time system
Describe what is meant by sample resolution. [IF ITS A 2 MARKER]
Any two from:
− The number of bits that are used per sample
− … that provides the variation in amplitude that can be stored for each sample // defines
the number of different amplitudes that can be recorded
− … that determines how quiet/loud the sounds are that can be recorded
− Example e.g. 16-bit
Explain how an expert system operates.
Any six from:
− It has an interface …
− … used to input data/view output
− It has a knowledge base
− It has a rule base
− It has an inference engine
− Applies the rule base to/and the knowledge base to provide
output/diagnosis/result/solution/decision
− Decides what to ask next based on the data input
Describe the purpose of the operating system.
Any three from:
− It performs the basic functions of a computer
− It manages the hardware
− It provides a platform to run software
− It provides a user interface
− It performs tasks such as (any example of function of an operating system)
Explain the purpose of the cache.
− It is a type of storage
− …that stores frequently used data/instructions
− To speed up access
− … as it is faster to access than RAM
Give one reason an error may occur when data is transmitted.
− Interference // crosstalk
State what is meant by the image resolution
− The dimensions of an image // Number of pixels wide by number of pixels high
State what is meant by the image colour depth
− The number of bits used to represent each/a colour
Give one benefit of increasing the colour depth of the image.
Any one from:
− A greater range of colours can be seen/used
− Image will be closer to the actual content of the image/real life
− The image will have more detail
Explain two differences between primary storage and secondary storage.
− Primary storage is directly accessible by the CPU
− … whereas secondary storage is not directly accessible by the CPU
− Primary storage stores the data that is currently in use/for booting the system
− … whereas secondary storage stores user’s files/data/operating system/application software
− Primary storage normally has a small capacity
− … whereas secondary storage normally has a larger capacity
− Some parts of primary storage are volatile
− … whereas secondary storage is non volatile
− Some parts of primary storage the data cannot be changed
− … whereas data in secondary storage can be changed
− Primary storage has faster access speeds to data
− … whereas secondary storage has slower access speeds to data
Describe what is meant by machine learning capabilities.
Any four from: e.g.
− It is a form of artificial intelligence
− Means it can adapt/change (its own processes) // It can edit its own algorithms
− It can edit its own data
− It can be trained
− … this can be supervised/unsupervised
− … meaning it can learn with/without human interaction
− Analyses patterns and stores successful/unsuccessful results …
− … to influence future decisions
− (Supervised) means a user tells the system the input and output
− (Unsupervised) means the system is given the input and needs to work out the output
State the purpose of virtual memory.
Any one from: e.g.
• To run programs when there is insufficient RAM to run them
• To allow RAM to store more data when required
Describe the differences between symmetric and asymmetric encryption
Four from:
• Symmetric has a shared key…
• … to encrypt and decrypt
• Both the sender and receiver know the key
• Asymmetric has different keys // a public key and a private key
• …public to encrypt the data and private to decrypt
• …anyone can know the public key but only those intended know the private key
Explain why serial data transmission is used to transmit the data packets.
Any three from:
−The network may be spread over a long distance … …
−so it is more reliable
−Bits will be sent/arrive in sequence …
−so bits less likely to be skewed Less crosstalk/interference …
−so less likely to have errors
−he data may not need to be transmitted at a fast speed // data transmission speed of serial
is adequate −The cables in the network only use serial transmission
State what is meant by an instruction set.
−A list of (machine code) commands that can be processed by the CPU
Explain the purpose of the IDE.
• It is a piece of software
• … used to write/develop/edit code
• … used test/debug the code
• … with features such as auto-completion // any suitable example
• To translate the code to low level language/machine code
Describe three other ways the IDE can help the programmer
Code editor … …
that allows the user to enter and amend code in their program
Run-time environment …
that allows a program to be run and see the outputs of their program
Error-diagnostic …
to show the programmer where there are errors in the program
Auto-completion …
to give the user options/suggestions of key commands to select
Auto-correction …
to correct a command that has a minor misspelling
Prettyprint …
changes the colour of key commands so they are easy to identify
Describe the difference between system software and application software
System software manages/maintains the hardware/software
Applications software allows the user to perform tasks
Explain why a computer needs secondary storage.
To store data/files permanently …
otherwise, data/programs would need to be downloaded/entered/installed every time the computer was
used
To allow software to be installed on the computer
For the creation of virtual memory
Describe what is meant by AI
Any two from:
The simulation of intelligent behaviours by computers
A collection of data and the rules for using that data
Has the ability to reason
Has the ability to learn/adapt