New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
computer science
cambridge igcse computer science coursebook
Cambridge IGCSE And O Level Computer Science 2nd Edition David Watson, Helen Williams - Solutions
Assuming the following stopping distances:Using figure 6.7 and the data in the table above, explain how the on-board computer would calculate if a car was too close to the vehicle in front and apply the brakes if necessary. [It is not necessary to show all the maths, it is sufficient to explain
This time the driver needs to reverse in between two other cars and park at 90 deg to the direction of travel.Describe what additional information is needed to allow the car to park between two cars within the parallel lines.What extra sensor device(s) might be needed to give this additional
A company manufactures fizzy drinks that are then labelled and bottled:The system is fully automatic. Sensors are used to ensure the correct amount of each ingredient is added. A stirrer is activated whenever ingredients are added. The bottling plant is again monitored by sensors to ensure the
7 An art gallery has a website that is used to display and sell art.a The gallery uses Secure Socket Layer (SSL) to provide a secure connection when selling art.Describe the process of SSL and how it provides a secure connection.b The art gallery also uses a firewall.Six statements are given about
6 HTML can be used to create the structure and the presentation of web pages.a Describe what is meant by HTML structure.b Gloria writes a paragraph as an answer to an examination question about accessing a website.Use the list given to complete Gloria's answer by inserting the correct four missing
5 a Describe four ways cybercriminals can use to trick a user into downloading malicious code onto their computers using social engineering.b There are four stages in the course of action when a cybercriminal targets an individual using social engineering. Describe each of the four stages in the
4 a John uses two step verification when purchasing some items from a website. There are five stages in the process. These stages are listed below but are not in the correct order.Place the five stages into their correct order.A-user takes note of the one-time authentication code B-user enters the
3 Six statements are shown on the left and six computer terms are shown on the right.By drawing lines, connect each statement correct term. set of rules that must be obeyed when transferring files and data across the internet software used to access, translate and display web pages on a user's
2 A company has several offices. It uses the Internet to transfer data between offices. The company also makes payments to staff and suppliers using online banking.The company are concerned about spyware and other security aspects of using the Internet.a Explain what is meant by spyware and how it
a i What is meant by a cookie?ii Describe the difference between a session cookie and a persistent cookie.iii Give three uses of persistent cookies.
3 a Describe three things you should look out for when deciding whether or not an email is a potential phishing scam.b Identify at least three potentials problems with this email from a company called Watson, Williams and Co: From: WW and Co To: customer 012305555 Sent: February 15th 2021 13:45
2 Describe how SSL and TLS certificates are used to ensure that secure sharing of data between a browser and website takes place.
1 Which computer terms (used in this chapter] are being described below?a a user is granted access only after successfully presenting two pieces of evidence to verify or identify who they are b uses a cache to speed up access to web pages from a website c controls that are used on social networks
2 Many cars now use veice control as a form of security before a car can be started and it is also used to give some key commands, such as start navigation system. Describe the benefits and drawbacks of such systems in cars.
1 in the biometric application example, retina scans were used to control entry to a secure research building.a Describe how the system might change if face recognition was used instead of retina scanners. The system is triggered automatically if a motion sensor detects the presence of a person.b
An airport uses a computer system to control security, flight bookings, passenger lists, administration and customer services.a Describe how it is possible to ensure the safety of the data on the system so that senior staff can see all the data, while customers can only access flight times
1 Which of the following are weak passwords and which are strong passwords?Explain your decision in each case.a 25-May-2000 b Pas5word c ChapTería06 d AbC N55!e 12345X
3 John works for a car company. He maintains the database that contains all the personal data of the people working for the car company. John was born on 28th February 1990 and has two pet cats called Felix and Max.a John needs to use a password and a user name to log onto the database. Why would
2 Explain the following three terms:- worm- ransomware- Trojan horse.
1 A company has offices in four different countries. Communication and data sharing between the offices is done via computers connecting over the internet.a Describe three data security issues the company might encounter during their day-to-day communications and data sharing.b For each issue
2 What are the main differences between digital currency and cryptocurrency?
1 a A blockchain has seven blocks. Draw a diagram to show how they are all connected to form a blockchain network.b Describe what would happen if block 4 was hacked to change the sum of money in the transaction.
4 Why do you think persistent cookies are sometimes referred to as tracking cookies? Give at least two pieces of evidence to support your answer.
3 The following table shows five features of the internet and the World Wide Web.Tick (✔) the appropriate box to indicate which feature refers to the internet and which feature refers to the World Wide Web: Feature it is possible to send and receive emails makes use of http protocols uses URLs to
2 a Give two differences between session cookies and persistent cookies.b Describe three uses of cookies.
1 A URL being entered is: http://www.urlexample.co.ie/sample_page Identify:a the domain name b the domain type the file name d which protocol is being used.
9 Pedro has written a program in a high-level language to do some calculations for a friend. His friend needs to use the program immediately on his laptop. Pedro does not know what software is available on the laptop. Also, his friend's internet connection is very slow. Explain which type of
An Integrated Development Environment contains these features:- Auto-completion- Auto-correction- Prettyprinting a Explain what is meant by the term IDE.b Describe each of the features given. Include a suitable example with each description.c Identify two other features that should be included in
Describe the differences between a compiler and an assembler.
a Describe the differences between a compiler and an interpreter.b Give one advantage and one disadvantage of using a compiler.c Give one advantage and one disadvantage of using an interpreter.
In this question you will be given a statement followed by four possible answers. Select which of the four answers you think is correct. a What is meant by the term buffer? A part of the RAM which is used to store the operating system in use Bunused areas on a hard disk drive Can area in memory
a Explain the differences between a Graphical User Interface (GUI) and a Command Line Interface (CLI).b Give one advantage and one disadvantage of using a GUI interface.c Give one advantage and one disadvantage of using a CLI interface.
a Describe the purpose of an operating system.b What is meant by virtual memory?c What is meant by disk thrashing and why does it occur?d What is meant by multitasking?e Describe what an interrupt is.
Which utility programs are being described below?a Software that runs in the background and checks for malware; suspect programs are quarantined and deleted if necessary b Software that rearranges data on a hard disk drive (HDD) to reduce the scattering of the data stored on the HDD c Software that
There are five types of software on the left and four items of hardware on the right.Draw lines to connect each software item to the hardware item where the software will reside; each hardware item may be used once, more than once or not at all. part of a program or 05 currently in use the actual
a Suki is writing a program in a high-level language. Describe three features of an IDE that she would find helpful.b Describe the difference between a compiler and an interpreter.c Explain why a programmer would choose to write a program in assembly Language.
1 Tick( the appropriate column in the following table to indicate whether the statement about the translator is True or False. An assembler translates a high-level language program. It is more difficult to write a program in a low-level language. Java is an assembly language. It is quicker to
The diagram shows five output devices and five descriptions. Draw a line between each output device and its description. Output device Inkjet printer LCD screen Description Flat panel display that uses the light modulating properties of liquid crystals. Flat panel display that uses an array of
Anna has a farm that grows fruit.She has a system that monitors the conditions for growing the fruit. Sensors are used in this system.a Explain what is meant by the term sensor.b State two sensors that could be used in this system and describe how they could be used.
7 A zoo has an information point.>>> Visitors use a menu to select information about animals.>> The menu includes 500 different animals.>>The information is provided only using high definition video with an audio track.a State one input device that could be used for the information point.b The
6 a Name two types of touchscreen technology used on mobile phones. For each named technology, describe how the position of where a finger touched the screen can be identified.b Organic LED (OLED) screens are now becoming increasingly common.i Briefly describe the technology behind OLED screens.ii
a Five statements about two types of RAM memory (DRAM and SRAM) are shown below.By drawing lines, link each statement to the correct type of RAM.b Describe three of the differences between RAM and ROM.c Compare the two optical storage devices: DVD and Blu-ray. Your answer should include:>>
4 a Describe the differences between a static IP address and a dynamic IP address. Include in your explanation, why both types of IP addressing are used.b What is meant by a MAC address? Describe the two different types of MAC address.
3 An air conditioning unit in a car is being controlled by a microprocessor and a number of sensors.a Describe the main differences between control and monitoring of a process.b Describe how the sensors and microprocessor would be used to control the air conditioning unit in the car. Name at least
2 a A company is developing a new games console. The console games will be stored on a ROM chip once the program to run the new game has been fully tested and developed.i Give two advantages of putting the game's program on a ROM chip.ii The manufacturers are also using RAM chips on the internal
1 a Many mobile phone and tablet manufacturers are moving to OLED screen technology. Give three reasons why this is happening.b A television manufacturer makes the following advertising claim:"Our OLED screens allow the user to enjoy over 1 million vivid colours in true-to-life vision"Comment on
Describe three differences between MAC addresses and IP addresses.
a Give two features of dynamic IP addresses.b Give two features of static IP addresses.c Explain why we need both types of IP address.
Explain each of the following terms:a Network interface card (NICI b MAC address c IP address d Router DHCP server.
a Use the following words to complete the paragraph below which describes how solid state memories work (each word may be used once, more than once or not at alll. Word list: control gate NAND electrons negative floating gate positive intersection transistor volatile matrix Solid state devices
4 a Give four differences between RAM and ROM chips.b Give an example of the use of each type of memory.
Five descriptions of computer terms are shown on the left and five terms are shown on the right. Draw lines to connect each description to the correct computer term. storage environment where the client and remote storage provider are different companies high rate of HDD read/write operations
a Explain what is meant by virtual memory.b Five programs are currently being run in a computer. Program 1 is using 10 GiB of RAM, program 2 is using 5GiB of RAM, program 3 is using 12 GiB of RAM and program & is using & GIB of RAM. The programs are at the stage where program 5 now needs to access
1 Name two types of memory used in a mobile phone. For each named memory. describe its purpose in the mobile phone.
Describe how ROM and RAM chips could be used in the following devices:a a microwave oven b a refrigerator c a remote-controlled model aeroplane, the movement of the aeroplane is controlled by a hand-held device.
The junction Figure 3.561 is controlled by traffic lights.Describe how sensors in the road and a microprocessor are used to control the traffic at the junction. The microprocessor is able to change the colour sequence of the lights. 000 A Figure 3.56
The diagram (Figure 3.55) below shows a nuclear reactor. Two of the sensors used in the control and monitoring of the reactor are:>> a temperature sensor to monitor the reactor temperature (if this exceeds 300°C then the water flow into the reactor is increased)>> a pressure sensor to
Look at Figure 3.54 and describe how the pH sensor would be used to control the acidity levels in the soil to optimise growing conditions in the greenhouse. > pre-set value Send signal to motors humidity to open windows Send signal to valves pre-set value Send signal to switch moisture on heater to
An air conditioning unit in a car is being controlled by a microprocessor and a number of sensors.a Describe the main differences between control and monitoring of a process.b Describe how the sensors and microprocessor would be used to control the air conditioning unit in the car. Name at least
Filipe has music stored on his computer's backing store. He wishes to listen to his music through a pair of loudspeakers. Describe how the music, which is digitally stored can be played through his two analogue loudspeakers.
a Explain the difference between LED screens and LCD-LED backlit screens.b Modern LCD screens use blue-white LEDs as backlighting. Cold cathode ray (fluorescent) tubes were used. Give three advantages of using LEDs.
The nine stages in printing a page using an inkjet printer are shown below. The nine stages are NOT in the correct order.By writing the letters A to 1, put each of the stages into the correct order.A-the data is then sent to the printer and it is stored in a temporary memory known as a printer
1 a Explain the main differences in operation of a laser printer compared to an inkjet printer.i Name one application of a laser printer and one application of an inkjet printer.ii For each of your named applications in bi, give a reason why the chosen printer is the most suitable.
a Describe one advantage of using QR codes rather than traditional bar codes.Explain how barcodes bring the advantage you have described.b A square QR code contains 40x40 tiny squares (pixels) where each tiny square represents a 0 or a 1. Calculate how many bytes of data can be stored on the QR
1 Using the data in Figure 3.14, design the barcodes for:a 900 340 [3 digits on the left; 3 digits on the right]b 1257 6648 [4 digits on the left: 4 digits on the right]c 05889 02918 [5 digits on the left; 5 digits on the right]
A car is fitted with the latest GPS navigation system. This device is controlled by an embedded system in the form of a microcontroller.a Describe the inputs needed by the embedded system and describe which outputs you would expect it to produce.b Since updates to the GPS device are required every
a Explain how it is possible to increase the performance of a CPU/microprocessor. In your explanation, include some of the risks associated with your suggestions to improve performance.b What is meant by the term instruction set?
Complete the following paragraph by using terms from this chapter:The CPU ------------------------ data and instructions required for an application and temporarily stores them in the ------------------------ until they can be processed. The ------------------------ is used to hold the address of
a Name three buses used in the von Neumann architecture.b Describe the function of each named bus.c Describe how bus width and clock speed can affect computer performance.
Maisey purchases a new router and attaches it to her computer.The connection she sets up uses duplex data transmission.a Five statements are given about duplex data transmission.Tick(✔) to show if the statement is True or False.b Maisey's computer uses an integrated circuit (IC) for data
A file server is used as a central data store for a network of computers.Rory sends data from his computer to a file server that is approximately 100 metres away. It is important that the data is transmitted accurately. Rory needs to be able to read data from and write data to the file server at
Six descriptions are shown on the left and ten computer terms on the shown below:By drawing lines, connect each description to the correct computer term (not all of the computer terms will be used). a method of error detection; a value is calculated from a block of data and is sent with the block
a Describe what is meant by symmetric encryption.b Describe what is meant by asymmetric encryption.c Explain why encryption is used when transmitting data over a network.
Six statements about check digits are given below, but they are not in the correct order. Put the statements into their correct sequence.i a human operator will be asked by the computer to re-enter the numerical code il the computer calculates the check digit based on the numerical code entered
Five statements about parity checking are given below, but they are not in the correct order. Put the statements into their correct sequence.i the sending computer sends the binary data including the parity bits il the sending and receiving computers agree the parity protocol (odd or even)iii the
Five statements about checksum error checking are given below, but they are not in the correct order. Put the statements into their correct sequence.i if the two checksum values don't match, the receiving computer requests the data to be re-transmitted il the sending computer sends a block of data
Four statements about automatic repeat requests (ARQs) are given below, but they are not in the correct order. Put the statements into their correct sequence.i the sending computer waits for a period of time to see if the receiving computer acknowledges receipt of the data ii after a set time
Eight descriptions are given in the following table. The table columns are labelled checksum, parity check and ARQ.Tick (✔) the appropriate column which correctly matches each description to the error-checking technique. For each description, it is possible to match 1, 2, 3 or none of the
Explain each of the following computer terms:i packet switching ii cyclic redundancy check iii data skewing iv universal serial bus v parity bit.
A company owns a number of vending machines. Data is sent from each of these machines at the end of the day. The data contains amount of money taken, products sold and any error conditions/reports.a The company uses both echo checking and automatic repeat requests (ARQs).i Describe how echo checks
Which of the following describes the check where the receiving computer sends back a copy of the data to the sending computer to allow it to compare the data?A echo check B automatic repeat request C checksum D parity check E check digit
Which of the following uses a calculated value which is sent after a block of data; the receiving computer also calculates the value from the block of data and compares the values?A parity check D checksum B check digit E automatic repeat request C packet switching
Which of the following methods uses an extra bit added to a byte to ensure it contains an even number of 1s or odd number of 1s?A cyclic redundancy check D check digit B parity check E echo check C checksum
Which of the following is a form of error detection that makes use of a system of acknowledgements and timeouts?A automatic repeat request D parity bit 8 echo check E cyclic redundancy check C check digit
What of the following is the final number in a code, which is calculated from all the numbers in the code; its purpose is to find errors in data entry?A parity check D parity bit B checksum E check digit C cyclic redundancy check
Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt and decrypt?A symmetric key encryption D same key encryption B asymmetric key encryption E block cipher encryption C public key encryption
Which of the following is the biggest disadvantage of using symmetric encryption?A it is very complex and time consuming B it is rarely used anymore C the value of the key reads the same in both directions D it only works on computers with older operating systems E there is a security problem when
In encryption, which of the following is the term used to describe the message before it is encrypted?A simpletext D ciphertext B plaintext E firsttext C notext
When carrying out asymmetric encryption, which of the following users would keep the private key?A the sender D all recipients of the message B the receiver E none of the above C both sender and receiver
What is meant by the term ciphertext when used in encryption?A an encryption or decryption algorithm B an encrypted message C a type of session key D another name for plaintext E text following an encryption algorithm
Explain why this method is much more secure than symmetric encryption.
At the moment Jane can only receive encrypted documents from Tom.Describe what would need to happen for Jane to be able to send encrypted documents back to Tom.
Find the check digits for the following numbers using both modulo-11 and ISBN 13 methods:i 213111000428 ii 909812123544
Using the algorithm for ISBN-13 calculate the check digit for:978151045759
The following block of data was received after transmission from a remote computer. Even parity was being used by both sender and receiver. One of the bytes has been changed during the transmission stage. Locate where this error is and suggest a corrected byte value. Parity bit Bit 2 Bit 3 Bit 4
The following block of data was received after transmission from a remote computer; odd parity was being used by both sender and receiver. One of the bits has been changed during the transmission stage. Locate where this error is and suggest a corrected byte value: Parity bit Bit2 Bit 3 Bit 4 Bit 5
In each case, in question 1, where an error occurred, can you work out which bit in the byte was changed during data transmission?Data from Questions 1 1 1 1 0 1 1 - - - 0 1 0 1 1 1 1 even parity being used even parity being used 0 0 1 1 1 0 0 0 even parity being used 1 1 1 1 0 1 0 0 1 1 0 1 1 0 1
Which of the following received bytes indicate an error has occurred following data transmission? 1 1 1 0 1 1 - - - 0 1 0 1 1 1 1 even parity being used even parity being used 0 0 1 1 1 0 0 0 even parity being used 1 1 1 1 0 1 0 0 1 1 0 1 1 0 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 1 0
Find the parity bits for each of the following bytes: 1 1 1 0 1 even parity being used 0 0 0 1 1 - 1 even parity being used 0 1 1 1 0 0 0 even parity being used - - 1 0 1 0 0 1 0 1 1 0 1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1 1 0 1 0 0 0 odd parity being used odd parity being used even parity being used
Ten statements are shown on the left in the table. Each of these statements is either True or False. For each statement, tick (✔) the appropriate column to indicate which statements are true and which are false. Statement Packets have a header which contains the IP address of the sender and the
Showing 100 - 200
of 1029
1
2
3
4
5
6
7
8
9
10
11
Step by Step Answers