OF Tune late l+(-3
IGCSE™ and O Level
Computer
Science
Oo gay olU Tapes V1 (laa)
6 HeBneRCambridge
IGCSE™ and Level
Computer
Science
Ofola aol ims) 1g)
& Reneevary ert hasbeen made a rce al copii holds: but ary have been inadvertent
Secale the Pabshes wil be leased to mal ne necesiry wrangenent at he ist
‘operat.
ough every fr has ben mae to ensure tat website adiesen ap crec at tne of
Sing to es Hoe Cueto
tess ofthe home page fora wabste in heURL window of you bows,
Hscntt cs pty ue paps hate natal renevabe an eyebl rsuits sd
Ide rom noog ews al manage vest and ear omed sears, The gi od
mrutacurng processes ate epee ta conform tothe ervcrmentt equator fe
ountyo orig
Overseas contact Hachette UX Dstrutio, Hey Hutchison Cee, Mion Rad det,
Deorstine OAT TH, Tempore ue (238 27827. Eml eduatfon@achette cok ses
reopen from 8 am to 5pm, Manda fia, You canals oe troug ot website
150K; 9701 aaa 8106
Hodsertavation
Clonal House
Vetere Embankment
Usen ee 002
eddeedustoncan
‘Alright reserved. Apart fom any use pemited unde UK copyright m,n art of this
pubaton maybe epredued or tant in ry former yay met, ecbor
Festal. ncudingphetoccoying are ecrdng, held within sy information storage
{dst tater, whet permasos wing om he paseo nie Lene om
‘he Copy icing Agency Lined tbr eto en ences (fr epogaph
Iepoauctin) maybe ootied om the Copyint ees gency Lined, co
Cover phorlanaipeto stack aobe con
“ypesee in Inia by gtr
equ eco fr hs ile sav fo the Beth bray.Contents
Introduction
Data representation
Data transmission
Hardware
Software
‘The internet and cyber security
Automated and emerging technologies
‘Cambridge CSE and Level Comper Since Cmpuer Systems Workbook
6
“1
60
n
84Introduction
Welcome to the Cambridge IGCSE™ and 0 Level Computer Science Computer Systems Workbook. This and
‘the companion Algorithms, Programming and Logic Workbook replace the previous Computer Science
Workbook and are designed to complement the second edition of the Student's Book and support the
Cambridge IGCSE, IGCSE (9-1) and 0 Level Computer Science syllabuses (0478/0984/2210).
‘The aim of this Workbook is to provide you with further opportunity to practise the skills and test the
knowledge and understanding you have acquired through using the first six chapters of the Combridge
TGCSE and 0 Level Computer Science Second Edition Student's Book. It is designed as a ‘write-in’ book
to supplement your learning of different topics as you work through each chapter of the Student's.
Book and can be used either for home study or in class. The Workbook is intended to be sufficiently
flexible to suit whatever you feel is the best approach according to your needs.
‘The chapters in this Workbook have the same names as those in the Student's Book and reflect the
theory topics in the Student’s Book.
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookData representation
1 Convert the denary number 165 into:
a binary
b hexadecimal
2 a Convert the following binary number into denary:
01110110
Convert the following hexadecimal number into denary:
SF
© Convert the Following binary number into hexadecimal:
101011000100
Cambridge CSE and 0 Level Computer Science Compe1 Data representation
Convert the following hexadecimal number into binary:
3eD
3. a How many mebibytes (MiB) of storage would be needed to store 800 photographs each
of which are 16 MiB in size?
Write your answer From part a in gibibytes (GiB).
is 65 and fora’ is 97
i 6s
ii 97
bb State the denary ASCII code for 'V' and Vv.
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook1 Data representation
© Write the two denary values in part b in 8-bit binary format:
Using your answers to part a and part b, suagest an easy way of finding the ASCIT
binary code for a lower-case letter (for example, 'm') if the ASCIL code for the upper-case
letter (for example, ‘Mis known,
5 Accomputer system uses binary codes for letters of the alphabet as follows:
Aw 10, Bw 11, Cw 12, 2, X= 33, Ym 34, Z= 35
Write the denary value for in binary using an 8-bit registe
bb To convert the binary code for "to the binary code for all the bits in the 8-bit
register in part a undergo a logic shift two places to the left,
i. Write dawn the contents of the 8-bit register after the bits, representing
moved two places to the left.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited
have been1 Data representation
ii Convert the binary value in part b i into denary:
€ State the denary values for the following two letters using the method described in
part b.
6 a Convert the denary number 4 4 8 0 1 into hexadecimal.
7 State three uses of the hexadecimal system.
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook1 Data representation
8 Six questions are shown on the left and eight numerical values are shown on the right.
Draw lines to connect each question to its correct numerical value (two of the numerical
values are not used).
Cambridge CSE andO Level Computer Since Compue Systems Workbook Photocopying prohibited1 Data representation
‘a Trace through the flowchart using the following two values as inpu
i 220
Number x ° output
Photocopying prohibited ‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook1 Data representation
73
Number a ° ourur
'b Explain the function of the flowchart in part a.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok1 Data representation
Wa i Convert 0.10111 10 into denary.
ii Convert your answer in part b i to denary.
‘a Write down the largest number that can be represented by the following binary register.
Give your answer in binary and denary form:
we ee
12
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook1 Data representation
b i Add together 01110111and 10011101, giving your answer as an 8-bit binary
number.
{i Comment on your answer to part bi.
12 An 8-bit binary register contains the following vat
ofofafarlr]arfofo
‘a Write down the denary value of the register.
The contents of the register undergo a logical shift one place to the right.
i Show the result of this right shit
fi Write down the denary value of your answer to part b i.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited1 Data representation
Ill The register in part b i now undergoes a further logical shift two places to the right.
Comment on your result.
‘€ The content of the original register (shown in part a) now undergoes a logical shift two places
tothe left.
i Show the contents of the register after this left shift operation.
ii State, with reasons, the effect of this shift on the denary value shown in part a.
1B. Convert the denary numbers, 37 and 19, into 8-bit binary numbers:
19:
Add together the two binary numbers in part a, and give your answer in binary.
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook1 Data representation
© Carry out a logical shift, two places to the left, on your result from part b.
Comment on your answer.
Garry out a logical shift, four places to the right, on your result from part b.
Comment on your answer.
4A computer system uses two's complement notation.
‘a Complete the headings for an &-bit binary number which uses two's complement:
wm we a 6 2d
Write down the most negative and fi the most positive numbers that can be stored in an
B-bit register which uses two's complement. Give your answers in both denary and binary
format.
i most negative:
denary value:
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited1 Data representation
i most positive:
denary value:
© Convert the following two denary numbers into 8-bit binary numbers which use the two's
complement format.
i +s7
Convert the following two binary numbers, written in two's complement format, into denary
i 11001110
Watii1110
ei Convert the denary number, +45, into binary, using the two's complement format.
Convert the denary number, ~45, into binary, using the two's complement format.
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook1 Data representation
lil Add together the binary numbers found in parts e i and e
in binary. Comment on the result.
leaving your answer
15a Acamera detector has an array of 4096 by 2048 pixels and uses a colour depth of 16.
Calculate the size of an image taken by this camera; give your answer in MiB.
bb An audio CO uses 40960 samples per second, with 16 bits being used per sample.
The music being sampled uses two channels to allow for stereo recordings.
Calculate the file size for a 1026 second recording. Give your answer in MiB.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited1 Data representation
‘16a Give three reasons why itis often necessary to reduce the size of a file.
1
b Explain the difference between lossy and lossless file compression.
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook1 Data representation
© 1 Give one example of the use of lossy file compression.
17 In terms of representing bitmap images, explain the following:
colour depth:
bb image resolution:
18 Explain the difference between ASCII code and Unicode.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited‘Data representation
19 Seven statements are shown on the left and eleven computing terms are shown on the right
in the diagram below.
Draw lines to connect each statement to the correct computer term.
20a Which one of the following is not a correct hexadecimal number?
‘A CODE
BAKS
© 10EA
D FACE
‘The number of bits used to represent a sound sample is known as:
A the sampling rate
B amplitude value
© Loudness of a sound sample
D sampling resolution
a Photocopying prohibited {Cambridge 150SE and 0 Leet Computer Scone Computer Stems Workbook1 Data representation
‘¢ The MP3 format remaves redundant sound from a file. Which one of the following best describes
the type of file reduction being used by the MP3 format?
A lossy files compression
B sound file damping
© image file compression
D Lossless file compression
Temporary files produced by a camera where no compression has been applied, are called:
A jpeg files
B png files
C aif files
D raw bitmap files
© Lossless file compression, which reduces the size of a string of adjacent, identical data, is
called:
A peg
B run-length encoding
© sampling resolution
D audio compression
21a Explain what is meant by run-Length encoding (RLE).
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited PPA]1 Data representation
i The above monochrome image is being designed.
Each white square is represented by 'W' and each dark square is represented by ‘0.
Show how run-length encoding (RLE) would be used to produce a condensed file
for the above image. Using the grid below, write down the data you would expect
to find in the RLE compressed format; the first two have been done for you.
Eiey Tt tT tT tt
fi Assuming that each square in the 8 x 8 grid requires one byte of storage, and each
character in the RLE code also requires one byte of storage (for example, '3' requires
‘Lbyte, 'W" requires 1 byte), calculate the file size reduction when using RLE.
22a Explain the following terms used in the electronic storage of sound:
i sampling resolution:
{Cambridge 150SE and 0 Leet Computer Scone Computer Stems Workbook1 Data representation
ii sampling rate:
Look at the sound wave below that has been sampled:
2
0
OF 234567 BOON DI IAIS TOI IBIII0
sample number
< 1 second * 1 score >
i From the graph, what is the sampling resolution?
fi From the graph, what is the sampling rate?
iil Using the x-axis, locate points 9 and 18 on the graph. Write down the 4-bit binary
values corresponding to the y-axis values of these two points.
point 9
point 18
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited1 Data representation
Discuss the benefits and dranbacks of increasing the sampling rate and sampling
resolution when representing sound in an electronic (binary) format.
23 Write down a series of steps that could be used to convert a denary number into a
hexadecimal number. Your steps should allow somebody to follow them clearly to give
the correct converted value,
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook1 Data representation
2ha State what is meant by a bit.
¢ Explain why the hexadecimal number system is used by computer technicians and programmers.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [PEData transmission
1a Explain the term data packet.
bb Data packets contain a header. Name three components that you would expect to find
ina header.
2
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook2Data transmission
Data packets also have a payload and a trailer. Explain these two terms.
payload:
trailer:
{Using the above diagram, explain how packet switching works when sending a
500 KiB file from computer \' to computer 8’.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited2.Data transmission
ii Using the diagram, explain why data packets need to be reassembled at
computer'B.
2 Packet switching is used to send packets of data over a network,
Give three benefits of using packet switching.
A ese aera eee ss ppc
Give three disadvantages of using packet switching.
Hi
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook2Data transmission
‘© Data packets can get lost due to ‘bouncing! around from router to router and never reaching
their destination.
Explain the problems caused by data packets "bouncing!
3 a Data transmission depends on data direction and how many bits of data can be sent at a
time. Complete the table below to show what type of data transmission is being
described in each case. Tick (7) two boxes for each description.
Deeripionstranemison axing pace [SMO] alFaunex(Rurduplox Seri [Fra
Data sent ane bit a atime down a single wire
inane direction only
Data sent 1é bts at atime down 16 wires in
both directions, but nota the same time
Data sent 16 ts at atime down 16 wires in
both directions simultaneously
Data sent bits ata time down 8 wires in one
direction only
Data gent one bitat atime dawn a angle wire
in both directions simultaneously
Data sent one bit at atime down a ingle wire
in bath directions, but nat atthe sametime
Five statements about serial and parallel data transmission are made in the table below.
By placing a tick (7) in the appropriate column, select which statements refer to serial
transmission and which statements refer to parallel transmission.
Statements Serial
allel)
‘Transmission method used by the memory bus inside a computer
Data canbe skewed (out af syne when travelling ever long distances
Least expensive ofthe two types dua to fewer hardware requirements
‘Moat appropriate data ie time- sensitive for example, when ive streaming where |
faster transmission rae ls eesential
‘Sulfers trom less risk of external interference
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited2.Data transmission
4 a Explain what happens when a device is plugged into a computer using one of the USB ports.
b Seven statements about USB connections are made in the table below. By ticking (/) the
appropriate box, indicate which statements are true and which statements are FALSE.
“Statements
True 3 [False 1
‘and computer
USB uses a protocol that allows for error-fre data transmission between device
USB can support any cable length between
device and computer
USB uses serial data transter
USB connections can transfer data using hal-duplex or fal-duplen
Its dificult to ad more USB ports toa computer using USB hubs
USB data transfer rates are much faster than for example, Ethernet connections
of power
‘There is no need for devices to have a power source because USB cable supplies SY
even parity check:
[A system uses even parity, Indicate whether the following bytes would fail or pass an
rfafalolajo]s
{Cambridge 150SE and 0 Leet Computer Scone Computer Stems Workbook2Data transmission
Explain why parity checks are used.
¢ Nine bytes of data were transmitted from one computer to another computer. Even parity was
used by both systems. An additional byte, called the parity byte was also sent at the end of
the transmission.
The following table shows the nine bytes and parity byte following transmission.
Parityb | sitz | sea | ote | sits | ste | ot7 | site
Byte 1 1 f 0 1 1 1 °
Byte2 1 a a a a 1 0 0
Byte 0 1 i 1 a a 1 0
Byte 0 1 1 1 1 0 1 1
Bytes 1 1 a o 0 1 1 e
Byte 6 0 1 1 0 1 1 2 1
Byte7 1 a 0 1 ° 0 0 e
Bytes a 1 1 1 1 1 0 1
Byte a a a o 1 0 0 1
Parityoyies| 0 0 1 1 1 1 ° e
i One of the bits has been transmitted incorrectly. Indicate which bit is incorrect by
giving its bit number and byte number:
bit number:
byte number:
ii Explain how you arrived at your answer to part ef.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited [ERY2.Data transmission
iil Write dawn the corrected byte.
iv Describe a situation where a parity check woulde't identify which bit had been
transmitted incorrectly.
¥ Name and briefly describe another method to check if data has heen transmitted correctly.
6 a Explain how the checksum system is used to identify any errors during data transmission.
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook2Data transmission
bb Explain how echo checks ate used to check data following data transmission.
‘€ Explain how automatic repeat requests (ARQs) work during data transmission,
7 Check digits are used to check data during data entry.
1 Give four types of error that check digits can identify.
9 ccs anseracennancoraerpnssiacan vn
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [ERY2.Data transmission
bb ISBN-13 is a type of check digit standard.
{The following algorithm generates a check digit for a 12-digit ISBN book code:
41 add all odd-numbered digits together
2 add all even-numbered digits together and then multiply the result by 3
3 add together the results for steps 1 and 2, and then divide the result by 10
4 take away the remainder of the division from 10, leaving the check digit
Showing your working, calculate the check digit forthe following 12-digit ISBN code:
9 781 471 86867
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook2Data transmission
ii The following algorithm checks that the check digit in a 13-digit code is correct:
1 add all odd-numbered digits together, including the check digit
2 add all even-numbered digits together and then multiply the result by 3
3 add together the results for steps 1 and 2, and then divide the result by 10
4 the check digit is correct if the remainder is zero
Showing your working, use the above algorithm to check whether or not the check digit in
the following ISBN-13 code is correct:
9 7a1 471 807218
8 For each of the following ten questions, choose which of the five options corresponds to the
‘correct response.
‘a. What is meant by the term ciphertext when used in encryption? Circle the correct answer.
‘A an encryption or decryption algorithm
B a message before it has been encrypted
© a type of session key
D another name for plaintext
E text following an encryption algorithm
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited2.Data transmission
b Which one of the following statements about asymmetric encryption is true? Circle the
correct answer.
A uses a public key only
B uses both a public key and a private key
© always uses 64-bit encryption
D the value of the private key is symmetrical
E uses private key only
¢ In encryption, which of the following is the term used to describe the message before it is
encrypted? Circle the correct answer.
A simpletext
B plaintext
© notext
D ciphertext
frsttext
d_ Which of the following is the biggest disadvantage of using symmetric encryption? Circle the
correct answer.
A itis very complex and time consuming
B itis rarely used anymore
© the value of the key reads the same in both directions
D it only works on computers with older operating systems
E there is a security problem when transmitting the encryption key
€ Which of the following is the correct name for a form of encryption in which both the sender
and the recipient use the same key to encrypt and decrypt? Circle the correct answer.
A symmetric key encryption
B asymmetric key encryption
© public key encryption
D same key encryption
E block cipher encryption
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook2Data transmission
Which of the following is the Final number in a code, calculated from all the numbers in the
code, whose purpose is to find errars in data entry? Circle the correct answer.
A parity check
B checksum
© cyclic redundancy check
D parity bit
E check digit
9. Which of the following is a form of error detection that makes use of a system of
acknowledgements and timeouts? Circle the correct answer.
A automatic repeat request
B echo check
© check digit
D parity bit
E cyclic redundancy check
hh Which of the following methods uses an extra bit added to a byte to ensure it contains an even
umber of 1s or odd number of 1s? Circle the correct answer.
A cyclic redundancy check
B parity check
© checksum
D check digit
E echo check
i. Which of the following uses a calculated value which is sent after a block of data: the receiving
computer also calculates the value from the block of data and compares the values? Circle the
correct answer.
A parity check
B check digit
© packet switching
D checksum
E automatic repeat request
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited a2.Data transmission
| Which of the following describes the check where the receiving computer sends back a copy of
the data to the sending computer to allow it to compare the data? Circle the correct answer.
A echo check
B automatic repeat request
© checksum
D parity check
E check digit
9 Some students sat a computer science exam. A number of their responses were incorrect,
Explain why the following eight responses given by the students are incorrect:
‘a ‘A data packet header contains the MAC address of the sending computer and the receiving
computer!
b ‘Half-duplex refers to the fact that four bits of data (half byte) can be sent from "A" to “B"
along four single wires.
€ ‘Because USB connections can be fitted in any way, they have become the industry standa
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook2Data transmission
Odd parity means 2 binary number has an odd value, for example, 01120001 (i.e. 113)
fe ‘Even parity means a binary number has an even number of zeros,
‘Check digits are used to make sure data has been transmitted without errors.
9 ‘A checksum is calculated by adding up all the 1-bits in a byte, and sending this value at
the end of the byte.
hh Asymmetric encryption makes use of the same key to encrypt and decrypt an encoded message!
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited2.Data transmission
‘10 Five statements are shown on the left and eight computer terms are shown on the right in the
following diagram.
Draw lines to connect each statement to the correct computer term.
Error checking method where data ie sent Synmetric encryption
to another device ands then sen back
to the sender: if the two sets of data are
differant then there hae been an errer during Encryption
Cipher text
‘Data is made unreadable ta anyone without
the necessary keys tounlock the encoded data
ha check
[A form of encryption which makes use of
public key and a private key to enerypt and
(decrypt ended messages Fall duplex
[Transmission error check that makes use
ct postive acknowledgernent and timeout
following data transmission
Type of data transmission where data can be
sent in both directions atthe same time
[Asymmetric encryption
Half-doptex
[Automatic repeat request
1
Use the following word/phrase list to complete the paragraph below. Each word or phrase
may be used once, more than once or not at all.
algorithm » decrypt matching pirs » private
> asymmetric eneryption |» document > matening pevate fi» public
> dphertest » encrypted > mathematically public key
hy eonfdentiat mm matching document | plaintext p_Symmetric encryption
makes use ofa . oo Key aNd & » Key. Suppose Asif and Karl
both work for the same company, and Asif wants to send a confidential to karl
Asif and Karl's computers both use the same to generate their OWN senna Of
keys; these keys are ..
his
send to Karl,
to Asif. Asif now uses Karl's
Asif then sends his .
Asif
and
psust
. document back to Karl. Karl uses his
linked, but cannot be derived from each other. Karl now sends
to encrypt the document he wishes to
.- key to unlock
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookHardware
1 The diagram shows a typical fetch-decode-execute cycle. However, five of the stages have been
omitted. Complete the fetch-decode-execute diagram using the following stages. Write the
number of the stage only in the diagram,
‘Cambridge CSE and Level Comper Since Cmpuer Systems WorkbookBHardware
‘Stage | Description of stage
1 | Adsress is then cpiee trom the program counter PC] tothe memory adéressregister [MAR] va the
‘dress bus
2__[ Contents of memory location contained in MAR ae then copied into MOR
3 Instructions decaded and then executed by sending out signals via the control bust the compuler
components
|The PC contains the adéress ofthe memory locaton of thenext instruction tobe fetched
[Value of the PCs incremented by 1 se know points tothe next instruction tobe fetched
2 a Name three types of bus used in the von Neumann architecture,
The contents at a number of addresses are shown below.
ars Contents
t t
Tw
TT THITaNTE
i. Show the contents of the MAR and MDR if we READ the contents of memory location 1 11 1
1110,
Show the contents of the MAR and MDR if we wish to write 11001101 into memory
location 10000100,
IFMAR contains 11111 10.0 and MOR contains 0.0 11110 0, complete the memory
contents diagram above.
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookSHardware
‘¢ Four registers are shown in the following table. For each register, give its full name and explain
its function in the fetch-decode-execute cycle.
Register | Fullname of resister Function of resister
oR
MAR
MOR
Pe
3. a Explain the meaning of the following terms, with reference to the CPU.
EG]ystem) clock cyelet recrnnnenre
i cache:
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [PRYBHardware
bb Discuss how changes to the clock speed and to the number of cares can affect the performance
of the CPU. Include any advantages and disadvantages, due to these changes, in your
discussion,
4 a i. Define what is meant by an embedded system.
li State four of the features you would expect to find in any embedded system.
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookSHardware
Describe three applications that use embedded systems.
1
'b Agames console is controlled by an embedded system in the form of a microcontroller. New
games are supplied on a memory stick or via an internet connection. Various devices, such
as a steering wheel, are connected to the console.
i Describe the inputs needed by the embedded system and describe what outputs you
would expect to be produced. You may find it helpful to draw a diagram of your system.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibitedBHardware
{i Updates to the internal software in the games console are required every six months.
Explain how the device software is updated without the need to send the games console
back to the manufacturer every six months.
‘LL
a 8
‘a Abarcode showing three digits, A, 8 and C, is shown above. Each dark bar represents a 1-value
and each light bar represents a O-value.
Give the 7-bit binary value for each of the three digits
A supermarket uses barcodes on all its items. When a customer goes to checkout, a number
of input and output devices may be used.
Name two input devices and two output devices. Give a different use for each named device.
input device 1:
output device 1:
use:
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookSHardware
output device 2:
use:
© Give two benefits to the supermarket manager and two benefits to customers of using
barcodes on all items.
Manager
1
Customer
6 Acamera uses an embedded system,
‘a Name three of the tasks controlled by the embedded system in the camera.
1
2
3
1b Name two applications where a digital camera could be used.
1
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [PJBHardware
7 Choose the most suitable input device for each of the following applications. A different
device must be given in each case.
‘Rpplication
‘Most suitable input device
Enloring text and numbers into word processor or spreadsheet
‘Selecting an option orien trom an on-serean men
inputting @ user's veie into a compuler ae part of voles recognition system
computer
‘Corweriing a hardcopy document into an electronic form tobe stored in @
Reading 2 OR code using a smartphone or tablet
Keying in digits from a barcode which didnot sean correctly
Reading date directly from the surroundings, uch as taking a temperature
8 Mobile phone touch screens can use three different types of touchscreen technology:
~ capacitive
= infrared
= resistive
{In the following table, give the advantages and disadvantages of all three types of
touchscreen technology, when compared to each other.
Touch screen technolosy
‘Advantages:
Disadvantages
capacitive
Infrared
Resistive
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookSHardware
9 a Give three advantages of using digital light projectors when compared to LCD projectors.
1
b Give two disadvantages of using digital light projectors when compared to LCD projectors.
1
10 Inkjet printers and laser printers are used in many offices.
‘Give one advantage and one disadvantage of each type of printer when compared to each other.
Inkjet printer
Advantage:
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibitedBHardware
Laser printer:
Advantage:
bb Three tasks are given below. For each task, name the most suitable type of printer and give a
reason for your choice.
i Printing 20 000 colour leaflets to advertise a new pizza shop.
Printer:
Reason for CHOICE! rnc SS add
li Printing a single high gloss photograph in colour
Printer:
Reason for choice:
iit Printing out physical replicas of coins for sale in a museum shop,
Printer:
Reason for choice:
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookSHardware
‘a Acar enthusiast has bought a car made in 1921. Unfortunately, none of the parts for the
car are still made.
Explain how 30 technology could be used to create any part for this car
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited PESTBHardware
‘12 Eight types of sensor are shown on the left and eight potential sensor applications on the right.
Draw lines to connect each sensor to an appropriate application. Only one application can be
assigned to each sensor.
13.A security system uses three different types of sensor to detect intruders.
‘a Name three types of sensor that could be used.
1
'b Describe how the sensors and microprocessor are used in the security system. The output
{is the operation of a siren and flashing lights if an intruder is detected,
{Cambridge 150SE and 0 Leet Computer Scone Computer Stems Workbook
a Photocopying pohSHardware
‘a Explain the differences between primary memory and secondary storage.
b In the following table, tick (7) which description refers to RAM and which refers to ROM.
RaMii_ [ROM
Descristion
‘Temporary memory device
Non-volatile memary
Data stored in this memory cannot be altered
Permanent memory device
‘Stores data and part of the operating system currenly muse
‘Can be inerea ded in wie fo mprove the operational speed oF computer
‘A model radio-controlled car contains RAM, ROM and also has a USB connection. The operation
of the car is controlled by a remate control which communicates using radio waves.
{State what data or information would be stored on the ROM chip.
Photocopying proniited [ERY
Cambridge CSE and O Level Computer Sconce Compuler ystems WorkbsokBHardware
it Explain why a USB port has also been included in the model car.
15 Backing storage makes use of magnetic, optical or solid-state technology.
Seven descriptions are given in the table below. Indicate with a tick (/) which statements
refer to magnetic, optical or solid-state technology.
Technology used
Description ‘Magnetic /) [optical (7) | Soudstate (7)
Makes use of fleating gate and control gate technology
Dick surfaces are made up of tracks and sectors: storage relies on
certain properties ofthe iron oxide coating
‘Devices using this technology have no moving parts
‘Datais storedin ‘pits and ands on a single spiral rack running
from the centre outwards
Disks use the properties of laser Uight tallow read and write operations
Datais stored by carroling the movement f electrons within NANO chips
This technology is afected by strong magnetic and radio fields
16 There are ten statements in the table below. Indicate, using a tick (/) whether each
statement is true or alse,
‘Statement
True Wi [False 71
Devices using magnetic media havea vey slow data tranefer rate
HDD platters can be made from ceramic, glass or aluminium coated iniron oxide
[HOD surfaces are split up int tracks and sectors
HODs use a more reliable technology than aelid-atate vices, auch aa SSDs
‘DVD-R are used toread and write data several ies
‘DVD and Blu-ray disks can both use dual-layer technology
‘SSDssutfer from ahigh degree cf tatency
Solid-state devices, known as flash drives, use NAND chip technology
‘SSD data access time ie approximately 100 times less than the data access time for HOD
‘Memory cards such asthe SD and XD cards usedin cameras] are examples of magnetic
media
EPR Photocopying robiited {Cambridge 150SE and 0 Leet Computer Scone Computer Stems WorkbookSHardware
‘17 Describe how virtual memory works. In your description, include the benefits and drawbacks of
virtual memory.
18a_Describe cloud (storage). Include in your description why this type of storage makes
use of data redundancy.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok
Photocopying prohibitedBHardware
bb Describe the differences between public clouds, private clouds and hybrid clouds.
© I Describe three benefits of using cloud storage.
1
Describe two drawbacks of using cloud storage.
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookSHardware
119 Five computer terms are shown on the left and five descriptions on the right.
Draw lines to connect each computer term to its correct description,
aaa
cere fanaa
Thrash point operations that execution of a process is halted
Eee aay
20a State which network terms are being described.
iA circuit board or chip that allows a device to connect to a network:
ii Type of address that uniquely identifies a device connected to a network:
Ill Address assigned by an ISP to a device each time it logs onto the internet:
iv Hardware device that allows data packets to be moved between different networks:
Hardware or software that sits between a computer and an external network; it monitors
traffic to and from the computer:
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok
Photocopying proniited fyBHardware
b i Explain what is meant by a dynamic IP address.
ii Describe two differences between a dynamic IP address and a static IP address.
1 Complete the diagram using the terms:
= computer
~ external network
= router
= switch
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookSHardware
ii Describe the function of a router in a network.
21 When devices connect to the internet they are given IP addresses supplied by an ISP. IP addresses
are necessary since the operation of the internet is based on a number of protocols.
a State what is meant by an ISP.
b State what is meant by a protocol.
© Two versions of IP addresses are called IPv4 and IPv6. Describe the differences between 1Pv4
and 1PV6,
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [ERYSoftware
1 Tick (7) the appropriate column, in the following table, to indicate whether the named
software is an example of system software or application software.
Software
System iv Applicat
Photo editing software
[Graphics manipulation oftware
Compiter
‘Spreadsheet software
Printer driver
OR code reader
Antivirus software
Se
2 a Give three of the general features of system software,
1
Give three of the general features of application software.
Cambridge I5CSE an eve Computer Scone Computer 5
ms Workbook4Soltware
Give three examples of utility programs.
1
3. Use the following list of words and phrases to complete the paragraph below.
Each word or phrase can be used once, more than once or not at all.
antovrus >» dak dstragmenter [> infected security system
> background > filecompression |» locked > smaller
Blocks > filemanagement |» quarantine tracks:
bootstrap head mevements |» screensavers » user
contiguous b heuristicchecking |» sectors tility
Running .. sevens SOFEWATE 9 tH crecernevnevene OM 2 COMputer Will constantly check
for virus attacks. Many sone tities check software for certain behaviour which would
indicate a possible virus; this is KNOWN 28 uo sone « Any possible files or programs which
are infected are put into ww until deleted by the an. w= or automatically
deleted.
AAs a hard disk drive (HOD) becomes full, used for data and files will become
scattered over different. cccreceee AND cs ‘on the disk surface. A.
will rearrange the of data and files into
sectors wherever possible, thus reducing the scattering of data. It also reduces the number of HDD
Many computers use which automatically launch when a computer has
nny $0 that a user is
been inactive for a period of time. They form part of the
automatically logged out after a certain period of time and the esseenne Will indicate that
the computer is now
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibitedSoftware
4 a Write down five of the functions of a typical operating system.
'b The interface between a computer and a user is either a command line interface (CLI) or
graphical user interface (GUI).
i Explain the terms CLI and GUI.
cu:
ii In the table below, six statements about interfaces are given. Tick (/) the appropriate
box to indicate whether each statement refers to a CLI or GUI interface.
Statement cua [oui
“The user isin direct communication with the computer
The user is limited to the cons show on the screen
The user needs to learna number of commands to carry cul any operation
‘Commands need tobe typed in using the correct formet and spelling
“There no need for the user to earn any commands to use the interface
The interface needs. complex operating system, such os Windows, to operate
which uses cansiderable amounts of memary
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook4Soltware
5 Explain the function of each of the following in an operating system.
‘a Multitasking management
b Management of user accounts
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [PRYSoftware
6 a i Explain what is meant by an interrupt.
ii Give three examples of what can cause an interrupt.
bi Explain what is meant by a buffer.
fi Explain why buffers are needed.
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook4Soltware
‘€ The flowchart shows the use of interrupts and buffers when printing out a document.
Some of the boxes in the flowchart are blank. Use each of the following statements to
complete the flowchart. In each case, only write the number of the correct statement
in the appropriate box.
1. Meanwhile, the processor is able to carry out other tasks while the (printer) buffer is being
emptied,
2 Has all the data been sent to the printer?
3 The current task is suspended while the interrupt is serviced.
4 The contents of the (printer) buffer are emptied to the printer and the data from the
document is printed.
5 When all the data has been printed, the (printer) buffer becomes empty; an interrupt signal
is then sent to the processor requesting its attention,
& Data from the document to be printed is sent to the (printer) buffer from the computer memory.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibitedSoftware
7 Memory management, security management and hardware management are three functions of an
‘operating system. The following table shows eight statements. By ticking (/) the appropriate
box, indicate which statements refer to memory, security or hardware management.
Management type
‘Statement Memory | Security W/V | Hardware (71
Keeps atrackof ll memory lecations
Ensures that antivirus software is regulary updated
Prevents competing applications using the same memary
locations atthe same ime
Ensures tht the appropriate device diver takes data from
smemory/fle and translates intaa format the device can
Understand
‘Management of devices to contra the use of queues and bufers
halding data temporarily
‘Receives and handles error messages andinterrupts from
devices connected to the computer
‘Manages RAM andallows data i be moved between RAM and
devices, suchas HOD or SSD
Maintains access rights for ll users of a computer system
8 a Explain the function of a device driver
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook4Soltware
€ Explain the role of a descriptor when a new device is plugged into a USB port of a
computer for the first time.
9 a State what is meant by firmware.
Give two examples of firmware used in computer devices.
1
Oa State three benefits of writing a program in a high-level programming language.
1
Explain why a programmer would choose to write a program in a low-level programming
language.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibitedSoftware
Steve is writing a program to use his laptop to control the lighting system in his
house. State, with reasons, which type of programming language would be most
suitable for him to use.
Type of language:
Reasons:
111 Use the following list of words and phrases to complete the paragraph below.
Each word or phrase can be used once, more than once or not at all
assembler machine code
comptes programmer
high-level programs
interpreters translates
language transtators
Programs written in a low-level are translated into by an
before they can be run on a computer. Programs written in a
are also translated {nt0 cnn before they can be run on a computer.
There are two types of for. languages sen and
‘Za Describe the purpose of a compiler,
Describe the purpose of an interpreter
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook4Soltware
© Describe the purpose of an assembler.
13, program is being developed in a high-level language. Both a compiler and an interpreter are
being used for translation.
‘a I State when it is appropriate to use the compiler.
State when it is appropriate to use the interpreter
b State two advantages of using an interpreter.
1
State two advantages of using a compiler.
1
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [PRYSoftware
‘ha Describe the purpose of an IDE.
Error diagnostics is a feature of an IDE. Identify three other features of an IDE,
State the purpose of error diagnostics in an IDE. Give an example of its use.
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookThe internet and cyber
security
1. a Explain the fundamental differences between the intemet and the world wide web (wom).
‘user typed in: https/www.hoddereducation.com/comp_science_sample
IWentity
ithe pretacl being used:
it the domain hot:
ii the domain type:
WW the file name:
Describe three of the features of web browsers.
Cambridge CSE and Level Computer Scice Comper
ying prohibited‘The internat and cyber security
2 Auser wishes to locate a website so they can download some documents. The following
sequence shows six steps in the location of the website and the download of the required
documents. However, the sequence of steps shown is not in the correct order.
By writing the numbers 1 to 6, put each step in its correct order.
Order [Description of stop
The DNS server | cannat find the required websitein ts database or cache and sends out a
request o ONS server?
‘The addreae le then gant back tothe user computer
‘The computer now Bets up a eammunicaion withthe website server and the required pages are
cownloases
User opens their web browser and types in the URL; the web browser asks DNS server I for the IP
drove
Users browser interprets HTML and displays the web pages onthe user's computer
DNS server? finds the URL and sends the IP address back to DNS server 1 which puts the IP
‘address and URL int its database and cache
3. a Explain what is meant by a session cookie.
Explain what is meant by a persistent cookie.
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookThe internet and cy
security
Give three uses of cookies.
4 a Indicate whether the following six statements about blockchaining are true or false by
placing a tick (/) in the correct box.
Blockchaining statement True WI [False(vi
ll digital currency systems use blackehaining
Blockchaining uses a decentralised database
The last block in a bloekchain is Known 2s the Genesis Blok
New hash values are only generated when data in ablock is altered
Tampering of dataina block by @ hacker would cause the hash value to change
Blocks ae policed’ by network users called miners
bb hen a new transaction in cryptocurrency takes place, a new block is created.
Name three values that would be created for this new block.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited5 The internat and cybar security
© Ablockchain has six blocks.
i Complete the diagram below to show how the six blocks are connected to form a
blockchain network. Use arrows to show any hash value links.
mewn
of block
a oo ce we - nn Connection
fash values
ji Describe what happens if block # was hacked and the hash value was changed to DD22.
d_ Explain the difference between digital currency and cryptocurrency.
a Photocopying prohibited ‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook‘The internet and cyber security
5 Eight security terms are shown on the left and eight descriptions are shown on the right in the
following diagram.
2
Ss
g
3
g
8
i
2
s
3
g
6 a Explain what is meant by the following three types of matware,
i Trojan horse:
Cambridge CSE andO Level Computer Since Compue Systems Workbook Photocopying prohibited a‘The internat and cyber security
i Adware:
iii Ransomware:
b 1 Explain what is meant by social engineering.
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook‘The internet and cyber security
ii The following table contains four methods used by social engineering to target a victim.
Complete the table by describing how each method is used. Include examples in your
description.
‘Threat used by
cybercriminals
Instant
messaging
How the threat isused linclude examples)
Searaware
Baring
Phone calle
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok
Photocopying prohibited‘The internat and cyber security
‘© Describe the steps taken by a cybercriminal when targeting their victim through social
engineering
7 a i Explain what is meant by anti-spyware.
ii Give three of the features of typical anti-spyware software.
1
‘Cambridge I5CSE an eve Computer Scone Computer Stems MorkbookThe internet and cy
security
Complete the table below to show the benefits and drawbacks of the three named
biometric techniques.
Benefits
Drawbacks
Fingerprint
forthumbprint
Retina sean
Voice
recognition
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok
Photocopying prohibited5 The internat and cybar security
‘© The diagram shows the use of voice control in a car. A microphone picks up the voice of the
driver and carries out their commands. For added security, the system only responds to people
authorised to drive the car.
Explain how the microphone and microprocessor are used to control the following functions
using verbal input from the driver:
= operation of the satelite navigation system
= media (radio, streaming and telephone)
= security (window and door control).
ma Ls
a Photocopying prohibited ‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook‘The internet and cyber security
8 a Bayan uses two-step verification when buying items from a website using his tablet.
There are six stages in the two-step verification process. The stages are listed in the
table below, but they are not written in the correct order. By writing the numbers 1 to 6,
put each of the stages in their correct order.
Order of stage | Description of stage.
User takes nate ofthe one-time authentication cage OTP)
‘User entersthe one-time authentication code into the tablet lagged onto webale
User enters their website username and password onthe tablet
User i authenticated and allowed access tothe website to make a purchase
‘One-time authentication code ie sent to users registered smartphone |
Brayan registers his smartphone number onthe website before using ito purchase any goods
bb Explain the benefits to a user of allowing automatic updates to software on, for example,
a smartphone.
9 One of the ways of checking the authenticity of emails and website links is to look out for
spelling mistakes in the URL. Describe four other ways that can be used to identify
potential fake emails and URL links. Include examples wherever possible in your answer.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited‘The internat and cyber security
1a Explain what is meant by SSI.
The table below shows what happens when a user wants to access a secure website and receive
and send data.
The statements are not in the correct order. By writing the numbers 1 to 5, put each
statement in its correct order.
Correcterder | statements
‘The web browser then requests thatthe web server identifies itself
ithe web browser can authenticate the SSL cerlifiate, it sends a messege back fo
the wab server to alow communication te begin
The users web browser sends a message requesting a connection with the required
website whichis securedbby SSL encrypion
‘Once the message is received, the webserver acknowledges the web browser and
the SSLencrypted two-way data transter can begin
‘The web server responds by sending 3 copy ofits SSL certificate tothe users web
browser
Give three examples of where SSL would be used.
1
{Cambridge 150SE and 0 Leet Computer Scone Computer Stems Workbook‘The internet and cyber security
‘Ma Explain why firewalls are used.
Give four of the tasks carried out by a firewall.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited aAutomated and emerging
technologies
1 Use the following set of words or phrases to complete the paragraph below. Each word or
phrase can be used once, more than once ot not at al.
attributes explanation system » objects
» inference repository
> inference engine rules base
> dialogue boxes > inference ules b> search engine
expert system knowledge base user interface
-» Fe a form of AI developed to mimic human knowledge and reasoning. They
use knowledge and to solve problems where a degree of human expertise
would be needed. Expert systems interact with the user by way of a . through
and command prompts. Once a conclusion is found, the can
be used to inform the user of the reasoning behind the conclusion. The main processing element
of an expert system is the .. ., which behaves like a search engine examining the
for data that matches the queries. The is the problem-solving
component which makes use of stored in the The knowledge
base is a collection of and their associated sownemameemnnnd itis often referred
toasa of facts
2 Eight descriptions and ten computer terms are shown in the diagram below.
Draw kines to connect each description to the correct computer term.
‘Devices that can move Between point and point without the need for aa
manualirput
[form of Alihat hasbeen developed mimic human knowledge and Koowtedge base
expertise
‘Robots that roam the internet, scanning websites:
for search purposes
deategeriaing them
‘Simulated ineligance in machines; balding af machines capable of
thinking lke 9 harman
‘repository of facts and expertise in the form af collection of objects
Expert system
and thei atrbutes ues
‘Cornbnaton of sofware and hardware designed and programmed towork Retoties
automatically without the need of any human Interaction
Machine learning
‘ulomatedsystem
Branch of computer science that brings together the design, construction
and operation o'inteligentelectramechanicat machines [recor
EPA rhotocopyin
[A suBSer of Alin which te algorithms are'Walned and can earn rom
their past experience and from examples
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook6 Automated and emerging technologies
3. Many examples of automated systems exist.
‘a Define what is meant by an automated system.
b One part of the automated system involves the use of sensors.
Explain what a sensor is.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [ETAutomated and emerging technologies
Give three general advantages of using automated systems.
€@ Give three general disadvantages of using automated systems.
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook6 Automated and emerging technologies
4 An example of an automated system is the control of the entry and exit to a private car park.
Cameras take a photograph of a car’s number plate on entry which is then checked before the
barrier is raised. At the exit, another camera captures the car's number plate, which is again
checked before raising the barrier.
Private car pa
‘a Name the software that is needed to convert the camera image of the car's number plate
into an electronic format that can be used in, for example, a database.
b Describe how sensors, cameras, actuators and a computer system can be used to control
entry to and exit from the car park. Your answer should include how a car number
plate meets the criteria for entry and any other Security or safety aspects.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [EUAutomated and emerging technologies
© 1 Describe the advantages of using an automated system to control entry and exit to the
car park.
ii One disadvantage is the possibility of illegal copying of number plates to ‘foot’
‘the system and allow unauthorised access to the car park.
Discuss how you might think this problem could be overcome.
5 a Acar is equiped with selt-parking technology. Explain the role of the following devices
in the self-parking technology
i cameras:
fi sensors:
iit actuators:
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook6 Automated and emerging technologies
Describe how embedded systems in a car prevent the driver exceeding a set speed and
also prevent the car getting too clase to the vehicle in front of it. Include the role of the
microprocessor and any named sensors in your answer.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [ERYAutomated and emerging technologies
6 a Name suitable sensors for each of the following automated systems. Describe the function of
your named sensor in each case.
90
Description of automated system
Suitable senseris)
Function of named sensors
Manulacture af a nen vaccine
ich requires the mixing of
Tour igus inthe ratio 1-234 a5
‘single batch, The our liguids
‘must be totally mixed andthe
temperature must be maintained
IEC. whieh i erica othe
process, When fully mixed, the
Solution turns an even yellow
colour
‘lighting display has been set
upinane raam ofan art gallery
{as part of the exhibition!
random sequence of different
coloured LED lights is under
mcroprocessorcontral. The
display only switches on when
vistors walk into the room; at
the same time, the raem lights
are dimmedto give the lighting
isplay ts most dramaticelfect
‘Rivain uses automatic twin-
‘doors. Both doors open
automaticaly when the tain
‘stops. Both doors close again
‘when no-one is sill bearding
fr leavingthe train, The doors
have a safety mechanism so
thata passenger cannot become
Wappes between the two closing
‘doors. The train ean only move off
when every door on the train has
Boon safely closed
Photocopying prohibited
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook6 Automated and emerging technologies
b The eight statements on the left-hand side of the following table are either true or false.
Tick (7) the appropriate box to indicate which statements are true and which are false.
‘Statomants [true vi [Fatse 71
‘Automated systems lead to less consistent result or less consistent products
‘Rutomated systems are mare expensive io set up than radivonal manual
systems
‘Automated systems could be quickly verwhelied bythe amount of data
presented tether
‘Automated systems are inherently less safe than manual systems
‘Automated systems generally require enhanced maintenance when compared
to manual systems
‘Rutemated systems allow proceszes toran a optimum candivena a all imes
Seftware failures, due to unforeseen conditions, are unlikely to impact on an
automated system
‘Rutemated systems wil react more guicl fo unusual process condiions than
‘8 manual system
7 a Complete the diagram of an expert system.
b Asection of a knowledge base is shown below.
Attribute 1 Attribute 2 | Attribute 3 Attribute 6
am [tbireteericnarst Tusmaroat [ravenna [upto dopatangers
Tran [eecre naar Usesrale [os whens [Up to«@0 passengers
Taniab [ese engine Uses rund [ethos | tot passengers.
i. What is the correct expert system name for the items in column 1?
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prohibited aAutomated and emerging technologies
ii The following set of questions was asked by the expert system. The user’s answers to each
question are shown. Using the knowledge base section shown above, what would be the
expected output?
Expert system question User response
Does ithavea hybrid engine? NO.
Does it use a road? ves
Does it have four wheels? ves
‘Can take more then passengers? NO
‘© Describe the steps in setting up an expert system.
8 a Explain what is meant by the following terms:
i artificial intelligence (AI):
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook6 Automated and emerging technologies
i machine learning:
bb Describe the differences between AI and machine learning.
9a Which one of the following is NOT a component of an expert system? Circle the correct answer.
A an inference engine
B rules base
© accelerometer
D knowledge base
E user interface
bb The practice of getting a machine to make decisions without being programmed to do so, via
data acquisition, is a feature of:
A robotics
B a search engine
© an inference engine
D an automated system
E machine learning
Circle the correct answer.
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying prowiited [ERYAutomated and emerging technologies
%
‘¢ The combination of software and hardware designed and programmed to work automatically
without the need for human interaction is known as:
A a chatbot
B an automated system
© an expert system
D machine learning
E robotics
Circle the correct answer.
The branch of computer science that brings together the design, construction and operation of
electromechanical devices is known as:
A robotics
B control technology
© computer programming
D automated systems
E electronics
Circle the correct answer.
‘@ Which one of the following is NOT an advantage to the management of using robots in an
industrial application? Circle the correct answer.
A they can work 26/7 without the need for breaks or holidays
B their work is more consistent
© they lead to higher productivity
D they can cause deskilling of the workforce
E they are less likely to make errors
‘Cambridge I5CSE an eve Computer Scone Computer Stems Morkbook6 Automated and emerging technologies
10 Autonomous vehicles are becoming increasingly common. Discuss the advantages and disadvantages of:
» autonomous trains
» autonomous cars and buses
Cambridge CSE and O Level Computer Sconce Compuler ystems Workbsok Photocopying proniited [ETIDevelop understanding of computer systems
the internet and emerging technologies with
further questions and activities.
Meee tional support fo
Caer
eee
Precint
Become accomplished computer scientists:
question
» Develop understanding and build confidence:
poi?
‘ousee
eer ar cla
PL ae Meera
Se reed eee tay
9781398318281
For over 25 years we have
been trusted by Cambridge
schools around the word to Provides earner support forthe Cambridge
provide quality support for IGeSe IGCSE (9-1) 2nd 0 Level Compute
teaching and learning. For Sclence syllabuses (0478/0984/2210} for
this reason we have bean selected by texaminaton from 20
Cambridge Assessment Intemational 7 as passed Cambridge nemationats rigorous
Education as an official publisher of Gates pene
endorsed material or their syllabuses. va
7 For Combidge schools worldwide
oped by subject experts
HODDER EDUCATION —
e:
[email protected] Fecwwe
w: hoddereducation.com