Section 1: Computer Systems
Question 1:
(a) Identify two components of the CPU and describe their functions. (4 marks)
Answer:
1. Arithmetic Logic Unit (ALU) – Performs calculations (addition, subtraction, etc.) and
logical operations (AND, OR, NOT). (2 marks)
2. Control Unit (CU) – Directs the flow of data, decodes instructions, and controls
hardware components. (2 marks)
Explanation: The CPU consists of different components, but the ALU and CU are key in
processing and executing instructions.
Section 2: Algorithms & Programming
Question 2:
(a) What is an algorithm? (2 marks)
Answer:
An algorithm is a step-by-step set of instructions designed to solve a problem or perform a task.
(2 marks)
(b) Given the following pseudocode, determine the output when number = 5:
plaintext
CopyEdit
total ← 1
FOR i ← 1 TO number
total ← total * i
ENDFOR
OUTPUT total
(4 marks)
Answer:
This algorithm calculates the factorial of number (5!). The loop runs from 1 to 5, multiplying
total each time:
yaml
CopyEdit
Iteration 1: total = 1 × 1 = 1
Iteration 2: total = 1 × 2 = 2
Iteration 3: total = 2 × 3 = 6
Iteration 4: total = 6 × 4 = 24
Iteration 5: total = 24 × 5 = 120
Final output: 120 (4 marks)
Explanation: This is a for loop that multiplies numbers from 1 to number, calculating the
factorial (5! = 5 × 4 × 3 × 2 × 1).
Section 3: Networking
Question 3:
(a) Define the term IP address and explain its purpose in networking. (3 marks)
Answer:
An IP address (Internet Protocol address) is a unique numerical identifier assigned to each
device on a network. It is used to route data between devices over the internet or a local network.
(3 marks)
(b) What is the difference between IPv4 and IPv6? (2 marks)
Answer:
IPv4 uses a 32-bit address format (e.g., 192.168.1.1) and allows about 4.3 billion unique
addresses.
IPv6 uses a 128-bit address format (e.g., 2001:db8::ff00:42:8329) and provides a much
larger address space.
Explanation: The world is running out of IPv4 addresses, so IPv6 was introduced to expand the
number of available addresses.
Section 4: Cybersecurity
Question 4:
(a) Identify one method cybercriminals use to gain unauthorized access to systems and explain
how to prevent it. (3 marks)
Answer:
Method: Phishing – Cybercriminals send fake emails pretending to be from a legitimate
company, tricking users into revealing sensitive information. (1 mark)
Prevention:
Never click on unknown links.
Verify sender addresses.
Use spam filters and two-factor authentication. (2 marks)
Section 5: Data Representation
Question 5:
(a) Convert the binary number 101101 into denary (decimal). (2 marks)
Answer:
Binary 101101 converts as follows:
(1×25)+(0×24)+(1×23)+(1×22)+(0×21)+(1×20)(1 \times 2^5) + (0 \times 2^4) + (1 \times 2^3) +
(1 \times 2^2) + (0 \times 2^1) + (1 \times 2^0)(1×25)+(0×24)+(1×23)+(1×22)+(0×21)+(1×20)
=32+0+8+4+0+1=45= 32 + 0 + 8 + 4 + 0 + 1 = 45=32+0+8+4+0+1=45
Final answer: 45 (2 marks)
Section 1: Computer Systems
1. Identify the main function of the CPU.
2. Explain the role of RAM in a computer system.
3. Describe the difference between primary and secondary storage.
4. What is meant by ‘clock speed’ in a CPU?
5. Define ‘cache memory’ and its purpose.
6. List three types of secondary storage and give an example of each.
7. What is the purpose of the ALU within the CPU?
8. Explain how virtual memory works.
9. Describe the fetch-decode-execute cycle.
10. What is an embedded system? Give two examples. ...
Section 2: Algorithms & Programming
1. Define an algorithm.
2. What is pseudocode and why is it useful?
3. Write a pseudocode algorithm for finding the largest number in a list.
4. Explain the purpose of a flowchart.
5. What is iteration in programming? Provide an example.
6. Differentiate between a ‘for’ loop and a ‘while’ loop.
7. Write a Python function to check if a number is prime.
8. What is a syntax error?
9. Explain what a subroutine is and its benefits.
10. Describe the concept of recursion with an example. ...
Section 3: Networking
1. Define an IP address and its purpose.
2. What is the difference between a LAN and a WAN?
3. Explain what a router does in a network.
4. What is a packet in networking?
5. Describe the purpose of the TCP/IP protocol.
6. What is network topology? Name two types.
7. Explain how a DNS server works.
8. What is the purpose of a MAC address?
9. Describe one advantage and one disadvantage of a mesh network.
10. What is bandwidth and why is it important? ...
Section 4: Cybersecurity
1. What is phishing and how can it be prevented?
2. Define malware and name two types.
3. Explain what a firewall does.
4. What is encryption and why is it important?
5. Describe two methods of authentication.
6. What is social engineering? Give an example.
7. Explain the term ‘denial-of-service attack’.
8. How can antivirus software protect a computer system?
9. What is a brute force attack?
10. List three good password practices. ...
Section 5: Data Representation
1. Convert the binary number 1101 to decimal.
2. What is ASCII and what is it used for?
3. Explain how images are represented in binary.
4. What is hexadecimal and why is it used?
5. Convert the hexadecimal number A9 to binary.
6. Explain the difference between lossy and lossless compression.
7. What is Unicode and how does it differ from ASCII?
8. Convert the binary number 101010 to hexadecimal.
9. How is sound represented in binary?
10. What is a pixel? Describe its role in digital images. ...