SlideShare a Scribd company logo
SIR ADNAN SALEEM
25
YEARS
W
orking for over
C
a
m
b
r
i
d
g
e
A
s
s
essment Internati
o
n
a
l
E
d
u
c
a
t
i
o
n
WITH
Cambridge
IGCSE™
andOLevel
Computer
Science
Computer Systems
David Watson
Helen Williams
318496 IGCSE and O Level Computer Science WB CV.indd 1 22/03/2021 13:32
318496_FM_IGCSE_OLCSSW_001-004.indd Page 1 02/04/21 3:10 PM sw-103 /130/HO01894/work/indd
Every effort has been made to trace all copyright holders, but if any have been inadvertently
overlooked, the Publishers will be pleased to make the necessary arrangements at the first
opportunity.
Although every effort has been made to ensure that website addresses are correct at time of
going to press, Hodder Education cannot be held responsible for the content of any website
mentioned in this book. It is sometimes possible to find a relocated web page by typing in the
address of the home page for a website in the URL window of your browser.
Hachette UK’s policy is to use papers that are natural, renewable and recyclable products and
made from wood grown in well-managed forests and other controlled sources. The logging and
manufacturing processes are expected to conform to the environmental regulations of the
country of origin.
Orders: please contact Hachette UK Distribution, Hely Hutchinson Centre, Milton Road, Didcot,
Oxfordshire, OX11 7HH. Telephone: +44 (0)1235 827827. Email education@hachette.co.uk Lines
are open from 9 a.m. to 5 p.m., Monday to Friday. You can also order through our website:
www.hoddereducation.com
ISBN: 978 1 3983 1849 6
© David Watson and Helen Williams 2021
First published in 2021 by
Hodder Education
An Hachette UK Company
Carmelite House
50 Victoria Embankment
London EC4Y 0DZ
www.hoddereducation.com
Impression number 10 9 8 7 6 5 4 3 2 1
Year 2025 2024 2023 2022 2021
All rights reserved. Apart from any use permitted under UK copyright law, no part of this
publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying and recording, or held within any information storage
and retrieval system, without permission in writing from the publisher or under licence from
the Copyright Licensing Agency Limited. Further details of such licences (for reprographic
reproduction) may be obtained from the Copyright Licensing Agency Limited, www.cla.co.uk
Cover © phonlamaiphoto - stock.adobe.com
Typeset in India by Aptara Inc.
Printed in the UK
A catalogue record for this title is available from the British Library.
318496_FM_IGCSE_OLCSSW_001-004.indd Page 2 31/03/21 1:57 PM sw-103 /130/HO01894/work/indd
3
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
Contents
Introduction 4
1 Data representation 5
2 Data transmission 26
3 Hardware 41
4 Software 60
5 The internet and cyber security 71
6 Automated and emerging technologies 84
318496_FM_IGCSE_OLCSSW_001-004.indd Page 3 31/03/21 1:57 PM sw-103 /130/HO01894/work/indd
4 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
Introduction
Welcome to the Cambridge IGCSETM and O Level Computer Science Computer Systems Workbook. This and
the companion Algorithms, Programming and Logic Workbook replace the previous Computer Science
Workbook and are designed to complement the second edition of the Student’s Book and support the
Cambridge IGCSE, IGCSE (9-1) and O Level Computer Science syllabuses (0478/0984/2210).
The aim of this Workbook is to provide you with further opportunity to practise the skills and test the
knowledge and understanding you have acquired through using the first six chapters of the Cambridge
IGCSE and O Level Computer Science Second Edition Student’s Book. It is designed as a ‘write-in’ book
to supplement your learning of different topics as you work through each chapter of the Student’s
Book and can be used either for home study or in class. The Workbook is intended to be sufficiently
flexible to suit whatever you feel is the best approach according to your needs.
The chapters in this Workbook have the same names as those in the Student’s Book and reflect the
theory topics in the Student’s Book.
318496_FM_IGCSE_OLCSSW_001-004.indd Page 4 31/03/21 1:57 PM sw-103 /130/HO01894/work/indd
5
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
1 Convert the denary number 165 into:
a binary
.............................................................................................................................................................................
.............................................................................................................................................................................
b hexadecimal
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
2 a Convert the following binary number into denary:
0 1 1 1 0 1 1 0
.............................................................................................................................................................................
.............................................................................................................................................................................
b Convert the following hexadecimal number into denary:
5F
.............................................................................................................................................................................
.............................................................................................................................................................................
c Convert the following binary number into hexadecimal:
1 0 1 0 1 1 0 0 0 1 0 0
.............................................................................................................................................................................
.............................................................................................................................................................................
Data representation
1
318496_01_IGCSE_OLCSSW_005-025.indd Page 5 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
6 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
d Convert the following hexadecimal number into binary:
3ED
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
3 a How many mebibytes (MiB) of storage would be needed to store 800 photographs each
of which are 16 MiB in size?
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Write your answer from part a in gibibytes (GiB).
.............................................................................................................................................................................
.............................................................................................................................................................................
4 The ASCII code for 'A' is 65 and for 'a' is 97.
a Write these denary values in 8-bit binary:
i 65
.......................................................................................................................................................................
.......................................................................................................................................................................
ii 97
.......................................................................................................................................................................
.......................................................................................................................................................................
b State the denary ASCII code for 'V' and 'v'.
i 'V'
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 6 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
7
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
ii 'v'
.......................................................................................................................................................................
.......................................................................................................................................................................
c Write the two denary values in part b in 8-bit binary format:
i 'V'
.......................................................................................................................................................................
.......................................................................................................................................................................
ii 'v'
.......................................................................................................................................................................
.......................................................................................................................................................................
d Using your answers to part a and part b, suggest an easy way of finding the ASCII
binary code for a lower-case letter (for example, 'm') if the ASCII code for the upper-case
letter (for example, 'M') is known.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
5 A computer system uses binary codes for letters of the alphabet as follows:
A = 10, B = 11, C = 12, … , X = 33, Y = 34, Z = 35
a Write the denary value for 'X' in binary using an 8-bit register:
b To convert the binary code for 'X' to the binary code for 'x', all the bits in the 8-bit
register in part a undergo a logic shift two places to the left.
i Write down the contents of the 8-bit register after the bits, representing 'X', have been
moved two places to the left.
318496_01_IGCSE_OLCSSW_005-025.indd Page 7 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
8 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
ii Convert the binary value in part b i into denary:
.......................................................................................................................................................................
.......................................................................................................................................................................
c State the denary values for the following two letters using the method described in
part b.
i r:
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
ii m:
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
6 a Convert the denary number 4 4 8 0 1 into hexadecimal.
.............................................................................................................................................................................
.............................................................................................................................................................................
b Convert the hexadecimal number in part a into a 16-bit binary number.
.............................................................................................................................................................................
.............................................................................................................................................................................
7 State three uses of the hexadecimal system.
1	 
............................................................................................................................................................................
	 
............................................................................................................................................................................
2	 
............................................................................................................................................................................
	 
............................................................................................................................................................................
3	 
............................................................................................................................................................................
	 
............................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 8 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
9
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
8 Six questions are shown on the left and eight numerical values are shown on the right.
Draw lines to connect each question to its correct numerical value (two of the numerical
values are not used).
What is the denary value of this hexadecimal digit?
E
What is the denary value of this binary number?
0 0 0 1 1 1 0 0
If the download speed for broadband is
8 mebibytes per second, how long would it take
to download a 96 mebibyte file (in seconds)?
If 2x = 1 tebibyte (TiB), what is the value of x?
What is the hexadecimal value of this denary
number?
50
How many bits are there in two bytes of data?
10
12
14
16
22
32
40
9
START
INPUT
number
X ← number
D ← 128
X ← X – D
is X  0?
OUTPUT
0
X ← X + D
D ← D/2
is D  1?
STOP
No
No
OUTPUT
1
Yes
Yes
28
318496_01_IGCSE_OLCSSW_005-025.indd Page 9 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
10 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
a Trace through the flowchart using the following two values as inputs:
i 220
Number X D OUTPUT
318496_01_IGCSE_OLCSSW_005-025.indd Page 10 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
11
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
ii 73
Number X D OUTPUT
b Explain the function of the flowchart in part a.
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 11 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
12 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
10 a i Convert 0 1 0 1 1 1 1 0 into denary.
.......................................................................................................................................................................
.......................................................................................................................................................................
ii Convert 0 0 1 1 1 1 0 1 into denary.
.......................................................................................................................................................................
.......................................................................................................................................................................
b i Add together 0 1 0 1 1 1 1 0 and 0 0 1 1 1 1 0 1, giving your answer in binary.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
ii Convert your answer in part b i to denary.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
11 a Write down the largest number that can be represented by the following binary register.
Give your answer in binary and denary form:
128 64 32 16 8 4 2 1
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 12 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
13
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
b i Add together 0 1 1 1 0 1 1 1 and 1 0 0 1 1 1 0 1, giving your answer as an 8-bit binary
number.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
ii Comment on your answer to part b i.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
12 An 8-bit binary register contains the following value:
0 0 1 1 1 1 0 0
a Write down the denary value of the register.
.............................................................................................................................................................................
.............................................................................................................................................................................
b The contents of the register undergo a logical shift one place to the right.
i Show the result of this right shift:
ii Write down the denary value of your answer to part b i.
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 13 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
14 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
iii The register in part b i now undergoes a further logical shift two places to the right.
Comment on your result.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
c The content of the original register (shown in part a) now undergoes a logical shift two places
to the left.
i Show the contents of the register after this left shift operation.
ii State, with reasons, the effect of this shift on the denary value shown in part a.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
13 a Convert the denary numbers, 37 and 19, into 8-bit binary numbers:
37: ......................................................................................................................................................................
19: .....................................................................................................................................................................
b Add together the two binary numbers in part a, and give your answer in binary.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 14 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
15
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
c Carry out a logical shift, two places to the left, on your result from part b.
Comment on your answer.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
d Carry out a logical shift, four places to the right, on your result from part b.
Comment on your answer.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
14 A computer system uses two’s complement notation.
a Complete the headings for an 8-bit binary number which uses two’s complement:
64 32 16 8 4 2 1
.......................................
b Write down i the most negative and ii the most positive numbers that can be stored in an
8-bit register which uses two’s complement. Give your answers in both denary and binary
format.
i most negative:
denary value:
........................................................................................................................................................................
........................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 15 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
16 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
ii most positive:
denary value:
........................................................................................................................................................................
	 
.......................................................................................................................................................................
c Convert the following two denary numbers into 8-bit binary numbers which use the two’s
complement format.
i +47
ii −59
d Convert the following two binary numbers, written in two’s complement format, into denary.
i 1 1 0 0 1 1 1 0
.......................................................................................................................................................................
.......................................................................................................................................................................
ii 1 1 1 1 1 1 1 0
.......................................................................................................................................................................
.......................................................................................................................................................................
e i Convert the denary number, +45, into binary, using the two’s complement format.
.......................................................................................................................................................................
ii Convert the denary number, −45, into binary, using the two’s complement format.
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 16 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
17
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
iii Add together the binary numbers found in parts e i and e ii, leaving your answer
in binary. Comment on the result.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
15 a A camera detector has an array of 4096 by 2048 pixels and uses a colour depth of 16.
Calculate the size of an image taken by this camera; give your answer in MiB.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b An audio CD uses 40960 samples per second, with 16 bits being used per sample.
The music being sampled uses two channels to allow for stereo recordings.
Calculate the file size for a 1024 second recording. Give your answer in MiB.
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 17 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
18 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
16 a Give three reasons why it is often necessary to reduce the size of a file.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
.......................................................................................................................................................................
b Explain the difference between lossy and lossless file compression.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 18 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
19
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
c i Give one example of the use of lossy file compression.
.......................................................................................................................................................................
.......................................................................................................................................................................
ii Give one example of the use of lossless file compression.
.......................................................................................................................................................................
.......................................................................................................................................................................
17 In terms of representing bitmap images, explain the following:
a colour depth: ...................................................................................................................................................
	 
............................................................................................................................................................................
	 
............................................................................................................................................................................
	 
............................................................................................................................................................................
b image resolution: ............................................................................................................................................
	 
............................................................................................................................................................................
	 
............................................................................................................................................................................
	 
............................................................................................................................................................................
18 Explain the difference between ASCII code and Unicode.
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 19 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
20 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
19 Seven statements are shown on the left and eleven computing terms are shown on the right
in the diagram below.
Draw lines to connect each statement to the correct computer term.
In a binary number, this is the right-most binary digit
Method used by a computer to allow the representation
of negative numbers as well as positive numbers
Result of adding two binary numbers that exceeds the
maximum size of a number which can be stored
The moving of bits to the left or to the right in a
register, which represents multiplication by 2x or
division by 2x (where x represents the number of
places the bits are moved left or right)
A 7-bit code used to represent letters, numbers and
characters found on a standard keyboard plus 32
control codes
Number of sound samples taken per second when
representing sound digitally in a computer
The smallest element of a picture
Overflow error
Resolution
Unicode
American standard code for information
interchange
Pixel
Two’s complement
Sampling rate
Logical shift
Least significant bit
Error code
Colour depth
20a Which one of the following is not a correct hexadecimal number?
A C0DE
B AX1S
C 1DEA
D FACE
b The number of bits used to represent a sound sample is known as:
A the sampling rate
B amplitude value
C loudness of a sound sample
D sampling resolution
318496_01_IGCSE_OLCSSW_005-025.indd Page 20 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
21
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
c The MP3 format removes redundant sound from a file. Which one of the following best describes
the type of file reduction being used by the MP3 format?
A lossy files compression
B sound file damping
C image file compression
D lossless file compression
d Temporary files produced by a camera where no compression has been applied, are called:
A jpeg files
B png files
C gif files
D raw bitmap files
e Lossless file compression, which reduces the size of a string of adjacent, identical data, is
called:
A jpeg
B run-length encoding
C sampling resolution
D audio compression
21 a Explain what is meant by run-length encoding (RLE).
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 21 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
22 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
b
i The above monochrome image is being designed.
Each white square is represented by 'W' and each dark square is represented by 'D'.
Show how run-length encoding (RLE) would be used to produce a condensed file
for the above image. Using the grid below, write down the data you would expect
to find in the RLE compressed format; the first two have been done for you.
3W 2D
ii Assuming that each square in the 8 × 8 grid requires one byte of storage, and each
character in the RLE code also requires one byte of storage (for example, '3' requires
1 byte, 'W' requires 1 byte), calculate the file size reduction when using RLE.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
22a Explain the following terms used in the electronic storage of sound:
i sampling resolution:
	 
.......................................................................................................................................................................
	 
.......................................................................................................................................................................
	 
.......................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 22 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
23
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
ii sampling rate:
	 
.......................................................................................................................................................................
	 
.......................................................................................................................................................................
	 
.......................................................................................................................................................................
b Look at the sound wave below that has been sampled:
0
0 1 2
1
2
3
5
6
7
8
9
10
11
12
13
14
4
15
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 20
18 19
Sample number
--------------1 second-------------- × --------------1 second--------------
i From the graph, what is the sampling resolution?
.......................................................................................................................................................................
.......................................................................................................................................................................
ii From the graph, what is the sampling rate?
.......................................................................................................................................................................
.......................................................................................................................................................................
iii Using the x-axis, locate points 9 and 18 on the graph. Write down the 4-bit binary
values corresponding to the y-axis values of these two points.
point 9:
point 18:
318496_01_IGCSE_OLCSSW_005-025.indd Page 23 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
24 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
c Discuss the benefits and drawbacks of increasing the sampling rate and sampling
resolution when representing sound in an electronic (binary) format.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
23 Write down a series of steps that could be used to convert a denary number into a
hexadecimal number. Your steps should allow somebody to follow them clearly to give
the correct converted value.
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 24 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
1 Data representation
25
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
24a State what is meant by a bit.
.............................................................................................................................................................................
b Give two reasons why computers use binary numbers rather than decimal numbers.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
c Explain why the hexadecimal number system is used by computer technicians and programmers.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_01_IGCSE_OLCSSW_005-025.indd Page 25 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
26 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
1 a Explain the term data packet.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Data packets contain a header. Name three components that you would expect to find
in a header.
1	 
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
3	 
.......................................................................................................................................................................
Data transmission
2
318496_02_IGCSE_OLCSSW_026-040.indd Page 26 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
27
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
c Data packets also have a payload and a trailer. Explain these two terms.
payload: ............................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
trailer: ...............................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
d
R1
R3
R4
R9
R8
R6
R5
R7
R2
R10
Computer A
Router A
Computer B
Router B
i Using the above diagram, explain how packet switching works when sending a
500KiB file from computer 'A' to computer 'B'.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_02_IGCSE_OLCSSW_026-040.indd Page 27 02/04/21 3:13 PM sw-103 /130/HO01894/work/indd
2 Data transmission
28 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
ii Using the diagram, explain why data packets need to be reassembled at
computer 'B'.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
2 Packet switching is used to send packets of data over a network.
a Give three benefits of using packet switching.
1	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
3	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
b Give three disadvantages of using packet switching.
1	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_02_IGCSE_OLCSSW_026-040.indd Page 28 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
29
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
3	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
c Data packets can get lost due to 'bouncing' around from router to router and never reaching
their destination.
Explain the problems caused by data packets 'bouncing'.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
3 a Data transmission depends on data direction and how many bits of data can be sent at a
time. Complete the table below to show what type of data transmission is being
described in each case. Tick (✓) two boxes for each description.
Description of transmission taking place
Simplex
(✓)
Half-duplex
(✓)
Full-duplex
(✓)
Serial
(✓)
Parallel
(✓)
Data sent one bit at a time down a single wire
in one direction only
Data sent 16 bits at a time down 16 wires in
both directions, but not at the same time
Data sent 16 bits at a time down 16 wires in
both directions simultaneously
Data sent 8 bits at a time down 8 wires in one
direction only
Data sent one bit at a time down a single wire
in both directions simultaneously
Data sent one bit at a time down a single wire
in both directions, but not at the same time
b Five statements about serial and parallel data transmission are made in the table below.
By placing a tick (✓) in the appropriate column, select which statements refer to serial
transmission and which statements refer to parallel transmission.
Statements Serial (✓) Parallel (✓)
Transmission method used by the memory bus inside a computer
Data can be skewed (out of synch) when travelling over long distances
Least expensive of the two types due to fewer hardware requirements
Most appropriate if data is time-sensitive; for example, when live streaming where
faster transmission rate is essential
Suffers from less risk of external interference
318496_02_IGCSE_OLCSSW_026-040.indd Page 29 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
30 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
4 a Explain what happens when a device is plugged into a computer using one of the USB ports.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Seven statements about USB connections are made in the table below. By ticking (✓) the
appropriate box, indicate which statements are true and which statements are FALSE.
Statements True (✓) False (✓)
USB uses a protocol that allows for error-free data transmission between device
and computer
USB can support any cable length between device and computer
USB uses serial data transfer
USB connections can transfer data using half-duplex or full-duplex
It is difficult to add more USB ports to a computer using USB hubs
USB data transfer rates are much faster than, for example, Ethernet connections
There is no need for devices to have a power source because USB cable supplies 5V
of power
5 a A system uses even parity. Indicate whether the following bytes would fail or pass an
even parity check:
1 1 0 0 0 0 1 1
.............................................................................................................................................................................
1 0 1 1 0 1 1 0
.............................................................................................................................................................................
0 0 0 1 1 1 1 1
.............................................................................................................................................................................
318496_02_IGCSE_OLCSSW_026-040.indd Page 30 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
31
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
b Explain why parity checks are used.
.............................................................................................................................................................................
.............................................................................................................................................................................
c Nine bytes of data were transmitted from one computer to another computer. Even parity was
used by both systems. An additional byte, called the parity byte was also sent at the end of
the transmission.
The following table shows the nine bytes and parity byte following transmission.
Parity bit Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8
Byte 1 1 1 1 0 1 1 1 0
Byte 2 1 0 0 0 0 1 0 0
Byte 3 0 1 1 1 0 0 1 0
Byte 4 0 1 1 1 1 0 1 1
Byte 5 1 1 0 0 0 1 1 0
Byte 6 0 1 1 0 1 1 0 1
Byte 7 1 0 0 1 0 0 0 0
Byte 8 0 1 1 1 1 1 0 1
Byte 9 0 0 0 0 1 0 0 1
Parity byte: 0 0 1 1 1 1 0 0
i One of the bits has been transmitted incorrectly. Indicate which bit is incorrect by
giving its bit number and byte number:
bit number: .................................................................................................................................................
byte number: ..............................................................................................................................................
ii Explain how you arrived at your answer to part c i.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_02_IGCSE_OLCSSW_026-040.indd Page 31 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
32 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
iii Write down the corrected byte.
.......................................................................................................................................................................
iv Describe a situation where a parity check wouldn’t identify which bit had been
transmitted incorrectly.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
v Name and briefly describe another method to check if data has been transmitted correctly.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
6 a Explain how the checksum system is used to identify any errors during data transmission.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_02_IGCSE_OLCSSW_026-040.indd Page 32 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
33
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
b Explain how echo checks are used to check data following data transmission.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
c Explain how automatic repeat requests (ARQs) work during data transmission.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
7 Check digits are used to check data during data entry.
a Give four types of error that check digits can identify.
1	 
.......................................................................................................................................................................
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
.......................................................................................................................................................................
3	 
.......................................................................................................................................................................
.......................................................................................................................................................................
4	 
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_02_IGCSE_OLCSSW_026-040.indd Page 33 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
34 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
b ISBN-13 is a type of check digit standard.
i The following algorithm generates a check digit for a 12-digit ISBN book code:
1 add all odd-numbered digits together
2 add all even-numbered digits together and then multiply the result by 3
3 add together the results for steps 1 and 2, and then divide the result by 10
4 take away the remainder of the division from 10, leaving the check digit
Showing your working, calculate the check digit for the following 12-digit ISBN code:
9 781 471 86867
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
318496_02_IGCSE_OLCSSW_026-040.indd Page 34 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
35
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
ii The following algorithm checks that the check digit in a 13-digit code is correct:
1 add all odd-numbered digits together, including the check digit
2 add all even-numbered digits together and then multiply the result by 3
3 add together the results for steps 1 and 2, and then divide the result by 10
4 the check digit is correct if the remainder is zero
Showing your working, use the above algorithm to check whether or not the check digit in
the following ISBN-13 code is correct:
9 781 471 80721 8
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
8 For each of the following ten questions, choose which of the five options corresponds to the
correct response.
a What is meant by the term ciphertext when used in encryption? Circle the correct answer.
A an encryption or decryption algorithm
B a message before it has been encrypted
C a type of session key
D another name for plaintext
E text following an encryption algorithm
318496_02_IGCSE_OLCSSW_026-040.indd Page 35 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
36 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
b Which one of the following statements about asymmetric encryption is true? Circle the
correct answer.
A uses a public key only
B uses both a public key and a private key
C always uses 64-bit encryption
D the value of the private key is symmetrical
E uses private key only
c In encryption, which of the following is the term used to describe the message before it is
encrypted? Circle the correct answer.
A simpletext
B plaintext
C notext
D ciphertext
E firsttext
d Which of the following is the biggest disadvantage of using symmetric encryption? Circle the
correct answer.
A it is very complex and time consuming
B it is rarely used anymore
C the value of the key reads the same in both directions
D it only works on computers with older operating systems
E there is a security problem when transmitting the encryption key
e Which of the following is the correct name for a form of encryption in which both the sender
and the recipient use the same key to encrypt and decrypt? Circle the correct answer.
A symmetric key encryption
B asymmetric key encryption
C public key encryption
D same key encryption
E block cipher encryption
318496_02_IGCSE_OLCSSW_026-040.indd Page 36 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
37
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
f Which of the following is the final number in a code, calculated from all the numbers in the
code, whose purpose is to find errors in data entry? Circle the correct answer.
A parity check
B checksum
C cyclic redundancy check
D parity bit
E check digit
g Which of the following is a form of error detection that makes use of a system of
acknowledgements and timeouts? Circle the correct answer.
A automatic repeat request
B echo check
C check digit
D parity bit
E cyclic redundancy check
h Which of the following methods uses an extra bit added to a byte to ensure it contains an even
number of 1s or odd number of 1s? Circle the correct answer.
A cyclic redundancy check
B parity check
C checksum
D check digit
E echo check
i Which of the following uses a calculated value which is sent after a block of data: the receiving
computer also calculates the value from the block of data and compares the values? Circle the
correct answer.
A parity check
B check digit
C packet switching
D checksum
E automatic repeat request
318496_02_IGCSE_OLCSSW_026-040.indd Page 37 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
38 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
j Which of the following describes the check where the receiving computer sends back a copy of
the data to the sending computer to allow it to compare the data? Circle the correct answer.
A echo check
B automatic repeat request
C checksum
D parity check
E check digit
9 Some students sat a computer science exam. A number of their responses were incorrect.
Explain why the following eight responses given by the students are incorrect:
a 'A data packet header contains the MAC address of the sending computer and the receiving
computer.'
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b 'Half-duplex refers to the fact that four bits of data (half a byte) can be sent from A to B
along four single wires.'
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
c 'Because USB connections can be fitted in any way, they have become the industry standard.'
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_02_IGCSE_OLCSSW_026-040.indd Page 38 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
39
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
d 'Odd parity means a binary number has an odd value, for example, 01110001 (i.e. 113).'
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
e 'Even parity means a binary number has an even number of zeros.'
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
f 'Check digits are used to make sure data has been transmitted without errors.'
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
g 'A checksum is calculated by adding up all the 1-bits in a byte, and sending this value at
the end of the byte.'
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
h 'Asymmetric encryption makes use of the same key to encrypt and decrypt an encoded message.'
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_02_IGCSE_OLCSSW_026-040.indd Page 39 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
2 Data transmission
40 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
10 Five statements are shown on the left and eight computer terms are shown on the right in the
following diagram.
Draw lines to connect each statement to the correct computer term.
Error checking method where data is sent
to another device and is then sent back
to the sender; if the two sets of data are
different then there has been an error during
transmission
Data is made unreadable to anyone without
the necessary keys to unlock the encoded data
A form of encryption which makes use of a
public key and a private key to encrypt and
decrypt coded messages
Transmission error check that makes use
of positive acknowledgement and timeout
following data transmission
Type of data transmission where data can be
sent in both directions at the same time
Symmetric encryption
Encryption
Cipher text
Echo check
Full-duplex
Asymmetric encryption
Half-duplex
Automatic repeat request
11 Use the following word/phrase list to complete the paragraph below. Each word or phrase
may be used once, more than once or not at all.
» algorithm
» asymmetric encryption
» cipher text
» confidential
» decrypt
» document
» encrypted
» matching document
» matching pairs
» matching private
» mathematically
» plain text
» private
» public
» public key
» symmetric encryption
............................ makes use of a ............................ key and a ............................ key. Suppose Asif and Karl
both work for the same company, and Asif wants to send a confidential ............................ to Karl.
Asif and Karl’s computers both use the same ............................ to generate their own ............................ of
keys; these keys are ............................ linked, but cannot be derived from each other. Karl now sends
his ............................ to Asif. Asif now uses Karl’s ............................ to encrypt the document he wishes to
send to Karl.
Asif then sends his ............................ document back to Karl. Karl uses his ............................ key to unlock
Asif’s ............................ and ............................ it.
318496_02_IGCSE_OLCSSW_026-040.indd Page 40 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
41
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
1 The diagram shows a typical fetch-decode-execute cycle. However, five of the stages have been
omitted. Complete the fetch-decode-execute diagram using the following stages. Write the
number of the stage only in the diagram.
START
END
Yes
No
No
Any
instructions?
Yes
Any more
instructions
to service?
Continue
process The contents
(instruction) of
the MDR are then
copied and placed
into the Current
Instruction
Register (CIR)
Hardware
3
318496_03_IGCSE_OLCSSW_041-059.indd Page 41 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
42 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
Stage Description of stage
1 Address is then copied from the program counter (PC) to the memory address register (MAR) via the
address bus
2 Contents of memory location contained in MAR are then copied into MDR
3 Instruction is decoded and then executed by sending out signals via the control bus to the computer
components
4 The PC contains the address of the memory location of the next instruction to be fetched
5 Value of the PC is incremented by 1 so it now points to the next instruction to be fetched
2 a Name three types of bus used in the von Neumann architecture.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b The contents at a number of addresses are shown below.
Address Contents
1000 0000 0111 1100
1000 0001 1000 0011
1000 0010 1111 1101
1000 0011 0111 1110
1000 0100 1100 1101
1111 1100
1111 1101 0110 0011
1111 1110 1010 0111
1111 1111 1111 0011
i Show the contents of the MAR and MDR if we READ the contents of memory location 1 1 1 1
1 1 1 0.
MAR:
MDR:
ii Show the contents of the MAR and MDR if we wish to write 1 1 0 0 1 1 0 1 into memory
location 1 0 0 0 0 1 0 0.
MAR:
MDR:
iii If MAR contains 1 1 1 1 1 1 0 0 and MDR contains 0 0 1 1 1 1 0 0, complete the memory
contents diagram above.
318496_03_IGCSE_OLCSSW_041-059.indd Page 42 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
43
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
c Four registers are shown in the following table. For each register, give its full name and explain
its function in the fetch-decode-execute cycle.
Register Full name of register Function of register
CIR
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
MAR
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
MDR
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
PC
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
......................................................................
3 a Explain the meaning of the following terms, with reference to the CPU.
i (system) clock cycle: ................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
ii cache: ..........................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 43 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
44 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
b Discuss how changes to the clock speed and to the number of cores can affect the performance
of the CPU. Include any advantages and disadvantages, due to these changes, in your
discussion.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
4 a i Define what is meant by an embedded system.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
ii State four of the features you would expect to find in any embedded system.
1	 
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
2	 
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
3	 
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 44 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
45
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
4	 
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
iii Describe three applications that use embedded systems.
1	 
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
2	 
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
3	 
..................................................................................................................................................................
..................................................................................................................................................................
..................................................................................................................................................................
b A games console is controlled by an embedded system in the form of a microcontroller. New
games are supplied on a memory stick or via an internet connection. Various devices, such
as a steering wheel, are connected to the console.
i Describe the inputs needed by the embedded system and describe what outputs you
would expect to be produced. You may find it helpful to draw a diagram of your system.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 45 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
46 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
ii Updates to the internal software in the games console are required every six months.
Explain how the device software is updated without the need to send the games console
back to the manufacturer every six months.
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
........................................................................................................................................................................
5
A B C
a A barcode showing three digits, A, B and C, is shown above. Each dark bar represents a 1-value
and each light bar represents a 0-value.
Give the 7-bit binary value for each of the three digits.
A	 
.......................................................................................................................................................................
B	 
.......................................................................................................................................................................
C	 
.......................................................................................................................................................................
b A supermarket uses barcodes on all its items. When a customer goes to checkout, a number
of input and output devices may be used.
Name two input devices and two output devices. Give a different use for each named device.
input device 1: ...............................................................................................................................................
use: ....................................................................................................................................................................
	 
............................................................................................................................................................................
input device 2: ...............................................................................................................................................
use: ....................................................................................................................................................................
	 
............................................................................................................................................................................
output device 1: ............................................................................................................................................
use: ....................................................................................................................................................................
	 
............................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 46 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
47
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
output device 2: ............................................................................................................................................
use: ....................................................................................................................................................................
	 
............................................................................................................................................................................
c Give two benefits to the supermarket manager and two benefits to customers of using
barcodes on all items.
Manager
1	 
.......................................................................................................................................................................
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
.......................................................................................................................................................................
Customer
1	 
.......................................................................................................................................................................
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
.......................................................................................................................................................................
6 A camera uses an embedded system.
a Name three of the tasks controlled by the embedded system in the camera.
1	 
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
3	 
.......................................................................................................................................................................
b Name two applications where a digital camera could be used.
1	 
.......................................................................................................................................................................
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 47 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
48 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
7 Choose the most suitable input device for each of the following applications. A different
device must be given in each case.
Application Most suitable input device
Entering text and numbers into a word processor or spreadsheet
Selecting an option or icon from an on-screen menu
Inputting a user’s voice into a computer as part of a voice recognition system
Converting a hard copy document into an electronic form to be stored in a
computer
Reading a QR code using a smartphone or tablet
Keying in digits from a barcode which did not scan correctly
Reading data directly from the surroundings, such as taking a temperature
8 Mobile phone touch screens can use three different types of touchscreen technology:
– capacitive
– infrared
– resistive
In the following table, give the advantages and disadvantages of all three types of
touchscreen technology, when compared to each other.
Touch screen technology Advantages Disadvantages
Capacitive
............................................................
............................................................
............................................................
............................................................
............................................................
............................................................
............................................................
............................................................
Infrared
............................................................
............................................................
............................................................
............................................................
............................................................
............................................................
............................................................
............................................................
Resistive
............................................................
............................................................
............................................................
............................................................
............................................................
............................................................
............................................................
............................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 48 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
49
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
9 a Give three advantages of using digital light projectors when compared to LCD projectors.
1	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
3	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
b Give two disadvantages of using digital light projectors when compared to LCD projectors.
1	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
10 Inkjet printers and laser printers are used in many offices.
a Give one advantage and one disadvantage of each type of printer when compared to each other.
Inkjet printer:
Advantage: .......................................................................................................................................................
����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
Disadvantage: ..................................................................................................................................................
����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
318496_03_IGCSE_OLCSSW_041-059.indd Page 49 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
50 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
Laser printer:
Advantage:.........................................................................................................................................................
����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
Disadvantage: ..................................................................................................................................................
����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
b Three tasks are given below. For each task, name the most suitable type of printer and give a
reason for your choice.
i Printing 20 000 colour leaflets to advertise a new pizza shop.
Printer: ........................................................................................................................................................
Reason for choice: .....................................................................................................................................
����������������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������������
ii Printing a single high gloss photograph in colour.
Printer: ........................................................................................................................................................
Reason for choice: .....................................................................................................................................
����������������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������������
iii Printing out physical replicas of coins for sale in a museum shop.
Printer: ........................................................................................................................................................
Reason for choice: .....................................................................................................................................
����������������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������������
318496_03_IGCSE_OLCSSW_041-059.indd Page 50 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
51
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
11 a A car enthusiast has bought a car made in 1921. Unfortunately, none of the parts for the
car are still made.
Explain how 3D technology could be used to create any part for this car.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Describe three other uses of 3D printers.
1	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
3	 
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 51 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
52 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
12 Eight types of sensor are shown on the left and eight potential sensor applications on the right.
Draw lines to connect each sensor to an appropriate application. Only one application can be
assigned to each sensor.
Level sensor
Moisture sensor
Light sensor
Infrared (active) sensor
Pressure sensor
Acoustic sensor
Magnetic field sensor
Accelerometer
Control/monitor the amount of water in the
soil in a greenhouse
Used by a mobile phone to change between
portrait and landscape modes
Monitor the amount of fuel in a car’s petrol
tank
Turn on the windscreen wipers automatically
when rain is detected
Used in the anti-lock braking systems in an
aeroplane under-carriage
Switch vehicle headlights on or off
automatically
Measuring the weight of a lorry or van at a
weigh station
Pick up the noise of breaking glass in a
security system
13 A security system uses three different types of sensor to detect intruders.
a Name three types of sensor that could be used.
1	 
.......................................................................................................................................................................
2	 
.......................................................................................................................................................................
3	 
.......................................................................................................................................................................
b Describe how the sensors and microprocessor are used in the security system. The output
is the operation of a siren and flashing lights if an intruder is detected.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 52 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
53
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
14 a Explain the differences between primary memory and secondary storage.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b In the following table, tick (✓) which description refers to RAM and which refers to ROM.
Description RAM (✓) ROM (✓)
Temporary memory device
Non-volatile memory
Data stored in this memory cannot be altered
Permanent memory device
Stores data and part of the operating system currently in use
Can be increased in size to improve the operational speed of a computer
c A model radio-controlled car contains RAM, ROM and also has a USB connection. The operation
of the car is controlled by a remote control which communicates using radio waves.
i State what data or information would be stored on the ROM chip.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
ii State what data or information would be stored on the RAM chip.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 53 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
54 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
iii Explain why a USB port has also been included in the model car.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
15 Backing storage makes use of magnetic, optical or solid-state technology.
Seven descriptions are given in the table below. Indicate with a tick (✓) which statements
refer to magnetic, optical or solid-state technology.
Technology used
Description Magnetic (✓) Optical (✓) Solid state (✓)
Makes use of floating gate and control gate technology
Disk surfaces are made up of tracks and sectors; storage relies on
certain properties of the iron oxide coating
Devices using this technology have no moving parts
Data is stored in 'pits' and 'lands' on a single spiral track running
from the centre outwards
Disks use the properties of laser light to allow read and write operations
Data is stored by controlling the movement of electrons within NAND chips
This technology is affected by strong magnetic and radio fields
16 There are ten statements in the table below. Indicate, using a tick (✓) whether each
statement is true or false.
Statement True (✓) False (✓)
Devices using magnetic media have a very slow data transfer rate
HDD platters can be made from ceramic, glass or aluminium coated in iron oxide
HDD surfaces are split up into tracks and sectors
HDDs use a more reliable technology than solid-state devices, such as SSDs
DVD-Rs are used to read and write data several times
DVD and Blu-ray disks can both use dual-layer technology
SSDs suffer from a high degree of latency
Solid-state devices, known as flash drives, use NAND chip technology
SSD data access time is approximately 100 times less than the data access time for HDDs
Memory cards (such as the SD and XD cards used in cameras) are examples of magnetic
media
318496_03_IGCSE_OLCSSW_041-059.indd Page 54 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
55
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
17 Describe how virtual memory works. In your description, include the benefits and drawbacks of
virtual memory.
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
18 a Describe cloud (storage). Include in your description why this type of storage makes
use of data redundancy.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 55 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
56 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
b Describe the differences between public clouds, private clouds and hybrid clouds.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
c i Describe three benefits of using cloud storage.
1	 
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
2	 
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
3	 
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
ii Describe two drawbacks of using cloud storage.
1	 
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
2	 
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 56 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
57
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
19 Five computer terms are shown on the left and five descriptions on the right.
Draw lines to connect each computer term to its correct description.
Thrashing
Swap space
Thrash point
Public cloud
Storage environment where the client and
remote storage provider are different companies
High rate of HDD read/write operations causing
a large number of head movements
Space on HDD or SSD reserved for data used in
virtual memory management
Where an HDD is so busy doing read/write
operations that execution of a process is halted
Method of data storage where data is stored on
hundreds of off-site servers
Cloud storage
20a State which network terms are being described.
i A circuit board or chip that allows a device to connect to a network:
........................................................................................................................................................................
ii Type of address that uniquely identifies a device connected to a network:
........................................................................................................................................................................
iii Address assigned by an ISP to a device each time it logs onto the internet:
........................................................................................................................................................................
iv Hardware device that allows data packets to be moved between different networks:
........................................................................................................................................................................
v Hardware or software that sits between a computer and an external network; it monitors
traffic to and from the computer:
........................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 57 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
58 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
b i Explain what is meant by a dynamic IP address.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
ii Describe two differences between a dynamic IP address and a static IP address.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
c
1 4
3
1 2
1
i Complete the diagram using the terms:
– computer
– external network
– router
– switch
1	 
.................................................................................................................................................................
2	 
.................................................................................................................................................................
3	 
.................................................................................................................................................................
4	 
.................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 58 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
3 Hardware
59
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
ii Describe the function of a router in a network.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
21 When devices connect to the internet they are given IP addresses supplied by an ISP. IP addresses
are necessary since the operation of the internet is based on a number of protocols.
a State what is meant by an ISP.
.............................................................................................................................................................................
b State what is meant by a protocol.
.............................................................................................................................................................................
.............................................................................................................................................................................
c Two versions of IP addresses are called IPv4 and IPv6. Describe the differences between IPv4
and IPv6.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_03_IGCSE_OLCSSW_041-059.indd Page 59 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
60 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
1 Tick (✓) the appropriate column, in the following table, to indicate whether the named
software is an example of system software or application software.
Software System (✓) Application (✓)
Photo editing software
Graphics manipulation software
Compiler
Spreadsheet software
Printer driver
QR code reader
Anti-virus software
Screensaver
2 a Give three of the general features of system software.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
b Give three of the general features of application software.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
Software
4
318496_04_IGCSE_OLCSSW_060-070.indd Page 60 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
61
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
4 Software
c Give three examples of utility programs.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3 Use the following list of words and phrases to complete the paragraph below.
Each word or phrase can be used once, more than once or not at all.
» anti-virus
» background
» blocks
» bootstrap
» contiguous
» disk defragmenter
» file compression
» file management
» head movements
» heuristic checking
» infected
» locked
» quarantine
» screensavers
» sectors
» security system
» smaller
» tracks
» user
» utility
Running .................................. software in the .................................. on a computer will constantly check
for virus attacks. Many .................................. utilities check software for certain behaviour which would
indicate a possible virus; this is known as .................................. . Any possible files or programs which
are infected are put into .................................. until deleted by the .................................. or automatically
deleted.
As a hard disk drive (HDD) becomes full, .................................... used for data and files will become
scattered over different .................................... and .................................... on the disk surface. A ........
............................ will rearrange the .................................... of data and files into ....................................
sectors wherever possible, thus reducing the scattering of data. It also reduces the number of HDD
.................................... .
Many computers use .................................... which automatically launch when a computer has
been inactive for a period of time. They form part of the ...................................., so that a user is
automatically logged out after a certain period of time and the .................................... will indicate that
the computer is now .................................... .
318496_04_IGCSE_OLCSSW_060-070.indd Page 61 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
62 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
4 Software
4 a Write down five of the functions of a typical operating system.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  ..................................................................................................................................................................... z
4	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
5	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
b The interface between a computer and a user is either a command line interface (CLI) or
graphical user interface (GUI).
i Explain the terms CLI and GUI.
CLI: ��������������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������������������
GUI: �������������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������������������
ii In the table below, six statements about interfaces are given. Tick (✓) the appropriate
box to indicate whether each statement refers to a CLI or GUI interface.
Statement CLI (✓) GUI (✓)
The user is in direct communication with the computer
The user is limited to the icons shown on the screen
The user needs to learn a number of commands to carry out any operation
Commands need to be typed in using the correct format and spelling
There is no need for the user to learn any commands to use the interface
The interface needs a complex operating system, such as Windows, to operate,
which uses considerable amounts of memory
318496_04_IGCSE_OLCSSW_060-070.indd Page 62 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
63
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
4 Software
5 Explain the function of each of the following in an operating system.
a Multitasking management
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Management of user accounts
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
c Security management
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_04_IGCSE_OLCSSW_060-070.indd Page 63 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
64 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
4 Software
6 a i Explain what is meant by an interrupt.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
ii Give three examples of what can cause an interrupt.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
b i Explain what is meant by a buffer.
.......................................................................................................................................................................
.......................................................................................................................................................................
ii Explain why buffers are needed.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_04_IGCSE_OLCSSW_060-070.indd Page 64 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
65
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
4 Software
c The flowchart shows the use of interrupts and buffers when printing out a document.
Some of the boxes in the flowchart are blank. Use each of the following statements to
complete the flowchart. In each case, only write the number of the correct statement
in the appropriate box.
1 Meanwhile, the processor is able to carry out other tasks while the (printer) buffer is being
emptied.
2 Has all the data been sent to the printer?
3 The current task is suspended while the interrupt is serviced.
4 The contents of the (printer) buffer are emptied to the printer and the data from the
document is printed.
5 When all the data has been printed, the (printer) buffer becomes empty; an interrupt signal
is then sent to the processor requesting its attention.
6 Data from the document to be printed is sent to the (printer) buffer from the computer memory.
Yes
Yes
No
No
The processor
continues with
its tasks
This interrupt
signal is then
transmitted,
requesting more
data to be sent
to the printer
Any data
to send to
printer?
318496_04_IGCSE_OLCSSW_060-070.indd Page 65 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
66 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
4 Software
7 Memory management, security management and hardware management are three functions of an
operating system. The following table shows eight statements. By ticking (✓) the appropriate
box, indicate which statements refer to memory, security or hardware management.
Management type
Statement Memory (✓) Security (✓) Hardware (✓)
Keeps a track of all memory locations
Ensures that anti-virus software is regularly updated
Prevents competing applications using the same memory
locations at the same time
Ensures that the appropriate device driver takes data from
memory/file and translates it into a format the device can
understand
Management of devices to control the use of queues and buffers
holding data temporarily
Receives and handles error messages and interrupts from
devices connected to the computer
Manages RAM and allows data to be moved between RAM and
devices, such as HDD or SSD
Maintains access rights for all users of a computer system
8 a Explain the function of a device driver.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Explain the use of descriptors in a device driver.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_04_IGCSE_OLCSSW_060-070.indd Page 66 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
67
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
4 Software
c Explain the role of a descriptor when a new device is plugged into a USB port of a
computer for the first time.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
9 a State what is meant by firmware.
.............................................................................................................................................................................
b Give two examples of firmware used in computer devices.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
10 a State three benefits of writing a program in a high-level programming language.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
b Explain why a programmer would choose to write a program in a low-level programming
language.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_04_IGCSE_OLCSSW_060-070.indd Page 67 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
68 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
4 Software
c Steve is writing a program to use his laptop to control the lighting system in his
house. State, with reasons, which type of programming language would be most
suitable for him to use.
Type of language: �������������������������������������������������������������������������������������������������������������������������������������������
Reasons: �����������������������������������������������������������������������������������������������������������������������������������������������������������
.............................................................................................................................................................................
.............................................................................................................................................................................
11 Use the following list of words and phrases to complete the paragraph below.
Each word or phrase can be used once, more than once or not at all.
assembler
compilers
high-level
interpreters
language
machine code
programmer
programs
translates
translators
Programs written in a low-level .................................... are translated into .................................... by an ..........
.......................... before they can be run on a computer. Programs written in a ....................................
.................................... are also translated into .................................... before they can be run on a computer.
There are two types of .................................... for .................................... languages .................................... and
.................................... .
12 a Describe the purpose of a compiler.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Describe the purpose of an interpreter.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_04_IGCSE_OLCSSW_060-070.indd Page 68 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
69
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
4 Software
c Describe the purpose of an assembler.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
13 A program is being developed in a high-level language. Both a compiler and an interpreter are
being used for translation.
a i State when it is appropriate to use the compiler.
........................................................................................................................................................................
........................................................................................................................................................................
ii State when it is appropriate to use the interpreter.
........................................................................................................................................................................
........................................................................................................................................................................
b State two advantages of using an interpreter.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
c State two advantages of using a compiler.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
318496_04_IGCSE_OLCSSW_060-070.indd Page 69 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
70 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
4 Software
14 a Describe the purpose of an IDE.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Error diagnostics is a feature of an IDE. Identify three other features of an IDE.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
c State the purpose of error diagnostics in an IDE. Give an example of its use.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_04_IGCSE_OLCSSW_060-070.indd Page 70 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
71
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
1 a Explain the fundamental differences between the internet and the world wide web (www).
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
A user typed in: https://www.hoddereducation.com/comp_science_sample
Identify:
i the protocol being used: �������������������������������������������������������������������������������������������������������������������������
ii the domain host: ��������������������������������������������������������������������������������������������������������������������������������������
iii the domain type: ��������������������������������������������������������������������������������������������������������������������������������������
iv the file name: ��������������������������������������������������������������������������������������������������������������������������������������������
c Describe three of the features of web browsers.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
The internet and cyber
security
5
318496_05_IGCSE_OLCSSW_071-083.indd Page 71 31/03/21 2:05 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
72 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
2 A user wishes to locate a website so they can download some documents. The following
sequence shows six steps in the location of the website and the download of the required
documents. However, the sequence of steps shown is not in the correct order.
By writing the numbers 1 to 6, put each step in its correct order.
Order Description of step
The DNS server 1 cannot find the required website in its database or cache and sends out a
request to DNS server 2
The IP address is then sent back to the user’s computer
The computer now sets up a communication with the website server and the required pages are
downloaded
User opens their web browser and types in the URL; the web browser asks DNS server 1 for the IP
address
User’s browser interprets HTML and displays the web pages on the user’s computer
DNS server 2 finds the URL and sends the IP address back to DNS server 1 which puts the IP
address and URL into its database and cache
3 a Explain what is meant by a session cookie.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Explain what is meant by a persistent cookie.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 72 31/03/21 2:05 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
73
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
c Give three uses of cookies.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
4 a Indicate whether the following six statements about blockchaining are true or false by
placing a tick (✓) in the correct box.
Blockchaining statement True (✓) False (✓)
All digital currency systems use blockchaining
Blockchaining uses a decentralised database
The last block in a blockchain is known as the 'genesis block'
New hash values are only generated when data in a block is altered
Tampering of data in a block by a hacker would cause the hash value to change
Blocks are 'policed' by network users called 'miners'
b When a new transaction in cryptocurrency takes place, a new block is created.
Name three values that would be created for this new block.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 73 31/03/21 2:05 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
74 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
c A blockchain has six blocks.
i Complete the diagram below to show how the six blocks are connected to form a
blockchain network. Use arrows to show any hash value links.
1
A4BF
2
6AB1
3
34EE
4
FF12
5
AA00
6
BBB1 Hash value
of block
Connection
hash values
ii Describe what happens if block '4' was hacked and the hash value was changed to DD22.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
d Explain the difference between digital currency and cryptocurrency.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 74 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
75
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
5 Eight security terms are shown on the left and eight descriptions are shown on the right in the
following diagram.
Draw lines to connect each security term to its correct description.
Brute force attack
Virus
Denial of service attack
Hacking
Worm
Phishing
Pharming
Social engineering
Legitimate-looking emails sent out to users; once a link is
clicked on, the user’s web browser is sent to a fake website
Attempt at preventing users from accessing a website
by flooding it with useless spam traffic which causes the
website to become overloaded
A process that attempts to crack a password by
systematically trying out all combinations of letters,
numbers and symbols to find the password
When a cybercriminal creates a situation that can lead to
a potential victim dropping their guard and getting them to
break normal security procedures
Malicious code installed on a user’s computer or on a
website; code redirects user’s browser to a fake website
without user’s knowledge
Program code that replicates with the intention of deleting
or corrupting files; they need an active host to initiate the
attack
Malware that self-replicates; they do not need to target an
active host program to initiate an attack
Act of gaining illegal access to a computer system without
the owner’s permission or knowledge
6 a Explain what is meant by the following three types of malware.
i Trojan horse:
����������������������������������������������������������������������������������������������������������������������������������������������������������������������
318496_05_IGCSE_OLCSSW_071-083.indd Page 75 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
76 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
ii Adware:
����������������������������������������������������������������������������������������������������������������������������������������������������������������������
iii Ransomware:
����������������������������������������������������������������������������������������������������������������������������������������������������������������������
b i Explain what is meant by social engineering.
.......................................................................................................................................................................
����������������������������������������������������������������������������������������������������������������������������������������������������������������������
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 76 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
77
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
ii The following table contains four methods used by social engineering to target a victim.
Complete the table by describing how each method is used. Include examples in your
description.
Threat used by
cybercriminals How the threat is used (include examples)
Instant
messaging ......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
Scareware
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
Baiting
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
Phone calls
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 77 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
78 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
c Describe the steps taken by a cybercriminal when targeting their victim through social
engineering.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
7 a i Explain what is meant by anti-spyware.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
ii Give three of the features of typical anti-spyware software.
1   �����������������������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������������������������
2 �����������������������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������������������������
3   �����������������������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������������������������
�����������������������������������������������������������������������������������������������������������������������������������������������������������������
318496_05_IGCSE_OLCSSW_071-083.indd Page 78 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
79
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
b Complete the table below to show the benefits and drawbacks of the three named
biometric techniques.
Biometric
technique Benefits Drawbacks
Fingerprint
or thumbprint
scans
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
Retina scans
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
Voice
recognition ...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
...................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 79 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
80 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
c The diagram shows the use of voice control in a car. A microphone picks up the voice of the
driver and carries out their commands. For added security, the system only responds to people
authorised to drive the car.
Explain how the microphone and microprocessor are used to control the following functions
using verbal input from the driver:
– operation of the satellite navigation system
– media (radio, streaming and telephone)
– security (window and door control).
Microphone
ADC
ADC
Microprocessor
and voice control
software
Sat nav
system
Media
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 80 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
81
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
8 a Brayan uses two-step verification when buying items from a website using his tablet.
There are six stages in the two-step verification process. The stages are listed in the
table below, but they are not written in the correct order. By writing the numbers 1 to 6,
put each of the stages in their correct order.
Order of stage Description of stage
User takes note of the one-time authentication code (OTP)
User enters the one-time authentication code into the tablet logged on to website
User enters their website username and password on the tablet
User is authenticated and allowed access to the website to make a purchase
One-time authentication code is sent to user’s registered smartphone
Brayan registers his smartphone number on the website before using it to purchase any goods
b Explain the benefits to a user of allowing automatic updates to software on, for example,
a smartphone.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
9 One of the ways of checking the authenticity of emails and website links is to look out for
spelling mistakes in the URL. Describe four other ways that can be used to identify
potential fake emails and URL links. Include examples wherever possible in your answer.
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 81 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
82 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
10 a Explain what is meant by SSL.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b The table below shows what happens when a user wants to access a secure website and receive
and send data.
The statements are not in the correct order. By writing the numbers 1 to 5, put each
statement in its correct order.
Correct order Statements
The web browser then requests that the web server identifies itself
If the web browser can authenticate the SSL certificate, it sends a message back to
the web server to allow communication to begin
The user’s web browser sends a message requesting a connection with the required
website which is secured by SSL encryption
Once the message is received, the web server acknowledges the web browser, and
the SSL-encrypted two-way data transfer can begin
The web server responds by sending a copy of its SSL certificate to the users web
browser
c Give three examples of where SSL would be used.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 82 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
5 The internet and cyber security
83
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
11 a Explain why firewalls are used.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Give four of the tasks carried out by a firewall.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
4	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
318496_05_IGCSE_OLCSSW_071-083.indd Page 83 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
84 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
1 Use the following set of words or phrases to complete the paragraph below. Each word or
phrase can be used once, more than once or not at all.
» attributes
» conclusions
» database
» dialogue boxes
» expert system
» explanation system
» inference
» inference engine
» inference rules
» knowledge base
» objects
» repository
» rules base
» search engine
» user interface
................................... are a form of AI developed to mimic human knowledge and reasoning. They
use knowledge and ................................... to solve problems where a degree of human expertise
would be needed. Expert systems interact with the user by way of a ................................... through
............................ and command prompts. Once a conclusion is found, the ................................... can
be used to inform the user of the reasoning behind the conclusion. The main processing element
of an expert system is the ..................................., which behaves like a search engine examining the
................................... for data that matches the queries. The ................................... is the problem-solving
component which makes use of ................................... stored in the .................................. . The knowledge
base is a collection of ................................... and their associated ...................................; it is often referred
to as a ................................... of facts.
2 Eight descriptions and ten computer terms are shown in the diagram below.
Draw lines to connect each description to the correct computer term.
Devices that can move between point 'A' and point 'B' without the need for
manual input
A form of AI that has been developed to mimic human knowledge and
expertise
Robots that roam the internet, scanning websites and categorising them
for search purposes
Simulated intelligence in machines; building of machines capable of
thinking like a human
A repository of facts and expertise in the form of a collection of objects
and their attributes
Combination of software and hardware designed and programmed to work
automatically without the need of any human interaction
A subset of AI in which the algorithms are 'trained' and can learn from
their past experience and from examples
Branch of computer science that brings together the design, construction
and operation of 'intelligent' electromechanical machines
Rules base
Knowledge base
Autonomous
Chat bot
Artificial intelligence
Expert system
Robotics
Machine learning
Automated system
Web crawler
Automated and emerging
technologies
6
318496_06_IGCSE_OLCSSW_084-096.indd Page 84 31/03/21 2:07 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
85
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
3 Many examples of automated systems exist.
a Define what is meant by an automated system.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b One part of the automated system involves the use of sensors.
Explain what a sensor is.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
c Name three areas where automated systems are used.
1	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
2	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
3	 
.......................................................................................................................................................................
	  .......................................................................................................................................................................
	  .......................................................................................................................................................................
318496_06_IGCSE_OLCSSW_084-096.indd Page 85 31/03/21 2:07 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
86 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
d Give three general advantages of using automated systems.
1..........................................................................................................................................................................
..........................................................................................................................................................................
..........................................................................................................................................................................
2..........................................................................................................................................................................
..........................................................................................................................................................................
..........................................................................................................................................................................
3..........................................................................................................................................................................
..........................................................................................................................................................................
..........................................................................................................................................................................

e Give three general disadvantages of using automated systems.
1..........................................................................................................................................................................
..........................................................................................................................................................................
..........................................................................................................................................................................
2..........................................................................................................................................................................
..........................................................................................................................................................................
..........................................................................................................................................................................
3..........................................................................................................................................................................
..........................................................................................................................................................................
..........................................................................................................................................................................
318496_06_IGCSE_OLCSSW_084-096.indd Page 86 31/03/21 2:07 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
87
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
4 An example of an automated system is the control of the entry and exit to a private car park.
Cameras take a photograph of a car’s number plate on entry which is then checked before the
barrier is raised. At the exit, another camera captures the car’s number plate, which is again
checked before raising the barrier.
Private car park
Camera Barrier Camera Barrier
a Name the software that is needed to convert the camera image of the car’s number plate
into an electronic format that can be used in, for example, a database.
.............................................................................................................................................................................
b Describe how sensors, cameras, actuators and a computer system can be used to control
entry to and exit from the car park. Your answer should include how a car number
plate meets the criteria for entry and any other security or safety aspects.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_06_IGCSE_OLCSSW_084-096.indd Page 87 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
88 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
c i Describe the advantages of using an automated system to control entry and exit to the
car park.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
ii One disadvantage is the possibility of illegal copying of number plates to 'fool'
the system and allow unauthorised access to the car park.
Discuss how you might think this problem could be overcome.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
5 a A car is equipped with self-parking technology. Explain the role of the following devices
in the self-parking technology:
i cameras:
����������������������������������������������������������������������������������������������������������������������������������������������������������������������
ii sensors:
����������������������������������������������������������������������������������������������������������������������������������������������������������������������
iii actuators:
����������������������������������������������������������������������������������������������������������������������������������������������������������������������
318496_06_IGCSE_OLCSSW_084-096.indd Page 88 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
89
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
b Describe how embedded systems in a car prevent the driver exceeding a set speed and
also prevent the car getting too close to the vehicle in front of it. Include the role of the
microprocessor and any named sensors in your answer.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_06_IGCSE_OLCSSW_084-096.indd Page 89 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
90 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
6 a Name suitable sensors for each of the following automated systems. Describe the function of
your named sensor in each case.
Description of automated system Suitable sensor(s) Function of named sensors
Manufacture of a new vaccine
which requires the mixing of
four liquids in the ratio 1:2:3:4 as
a single batch. The four liquids
must be totally mixed and the
temperature must be maintained
at 35°C, which is critical to the
process. When fully mixed, the
solution turns an even yellow
colour.
.........................................
.........................................
.........................................
.........................................
.........................................
.........................................
....................................................................
....................................................................
....................................................................
....................................................................
....................................................................
....................................................................
A lighting display has been set
up in one room of an art gallery
(as part of the exhibition). A
random sequence of different
coloured LED lights is under
microprocessor control. The
display only switches on when
visitors walk into the room; at
the same time, the room lights
are dimmed to give the lighting
display its most dramatic effect.
.........................................
.........................................
.........................................
.........................................
.........................................
.........................................
....................................................................
....................................................................
....................................................................
....................................................................
....................................................................
....................................................................
A train uses automatic twin-
doors. Both doors open
automatically when the train
stops. Both doors close again
when no-one is still boarding
or leaving the train. The doors
have a safety mechanism so
that a passenger cannot become
trapped between the two closing
doors. The train can only move off
when every door on the train has
been safely closed.
.........................................
.........................................
.........................................
.........................................
.........................................
.........................................
..................................................................
..................................................................
..................................................................
..................................................................
..................................................................
..................................................................
318496_06_IGCSE_OLCSSW_084-096.indd Page 90 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
91
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
b The eight statements on the left-hand side of the following table are either true or false.
Tick (✓) the appropriate box to indicate which statements are true and which are false.
Statements True (✓) False (✓)
Automated systems lead to less consistent results or less consistent products
Automated systems are more expensive to set up than traditional manual
systems
Automated systems could be quickly overwhelmed by the amount of data
presented to them
Automated systems are inherently less safe than manual systems
Automated systems generally require enhanced maintenance when compared
to manual systems
Automated systems allow processes to run at optimum conditions at all times
Software failures, due to unforeseen conditions, are unlikely to impact on an
automated system
Automated systems will react more quickly to unusual process conditions than
a manual system
7 a Complete the diagram of an expert system.
1 ������������������������������������������������������������������������������������������������������������������������������������������������������������������������
2 ������������������������������������������������������������������������������������������������������������������������������������������������������������������������
3 ������������������������������������������������������������������������������������������������������������������������������������������������������������������������
b A section of a knowledge base is shown below.
Attribute 1 Attribute 2 Attribute 3 Attribute 4
Bus
Hybrid electric/petrol
engine
Uses a road Has 4 wheels Up to 80 passengers
Train Electric motors Uses rails Has 40 wheels Up to 400 passengers
Taxi cab Diesel engine Uses a road Has 4 wheels Up to 4 passengers
i What is the correct expert system name for the items in column 1?
.......................................................................................................................................................................
Explanation
system Rules
base
1
2
3
318496_06_IGCSE_OLCSSW_084-096.indd Page 91 02/04/21 11:57 AM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
92 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
ii The following set of questions was asked by the expert system. The user’s answers to each
question are shown. Using the knowledge base section shown above, what would be the
expected output?
Expert system question User response
Does it have a hybrid engine? NO
Does it use a road? YES
Does it have four wheels? YES
Can it take more than 5 passengers? NO
.......................................................................................................................................................................
c Describe the steps in setting up an expert system.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
8 a Explain what is meant by the following terms:
i artificial intelligence (AI):
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
318496_06_IGCSE_OLCSSW_084-096.indd Page 92 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
93
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
ii machine learning:
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
b Describe the differences between AI and machine learning.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
9 a Which one of the following is NOT a component of an expert system? Circle the correct answer.
A an inference engine
B rules base
C accelerometer
D knowledge base
E user interface
b The practice of getting a machine to make decisions without being programmed to do so, via
data acquisition, is a feature of:
A robotics
B a search engine
C an inference engine
D an automated system
E machine learning
Circle the correct answer.
318496_06_IGCSE_OLCSSW_084-096.indd Page 93 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
94 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook
c The combination of software and hardware designed and programmed to work automatically
without the need for human interaction is known as:
A a chatbot
B an automated system
C an expert system
D machine learning
E robotics
Circle the correct answer.
d The branch of computer science that brings together the design, construction and operation of
electromechanical devices is known as:
A robotics
B control technology
C computer programming
D automated systems
E electronics
Circle the correct answer.
e Which one of the following is NOT an advantage to the management of using robots in an
industrial application? Circle the correct answer.
A they can work 24/7 without the need for breaks or holidays
B their work is more consistent
C they lead to higher productivity
D they can cause deskilling of the workforce
E they are less likely to make errors
318496_06_IGCSE_OLCSSW_084-096.indd Page 94 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
6 Automated and emerging technologies
95
Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited
10 Autonomous vehicles are becoming increasingly common. Discuss the advantages and disadvantages of:
» autonomous trains
» autonomous cars and buses
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
318496_06_IGCSE_OLCSSW_084-096.indd Page 95 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
Develop understanding of computer systems,
the internet and emerging technologies with
further questions and activities.
This Workbook provides additional support for
the computer systems section of Cambridge
IGCSE™ and O Level Computer Science
Student’s Book Second Edition.
» Become accomplished computer scientists:
the workbook provides a series of questions
designed to test and develop knowledge
of how computer systems and associated
technologies work.
» Develop understanding and build confidence:
provides additional practice for use at home or
in class throughout the course.
Use with Cambridge IGCSE™
and O Level Computer Science
Student’s Book Second Edition
9781398318281
This resource is endorsed by
Cambridge Assessment International Education
✓ Provides learner support for the Cambridge
IGCSE, IGCSE (9-1) and O Level Computer
Science syllabuses (0478/0984/2210) for
examination from 2023
✓ Has passed Cambridge International’s rigorous
quality-assurance process
✓ Developed by subject experts
✓ For Cambridge schools worldwide
For over 25 years we have
been trusted by Cambridge
schools around the world to
provide quality support for
teaching and learning. For
this reason we have been selected by
Cambridge Assessment International
Education as an official publisher of
endorsed material for their syllabuses.
25
YEARS
W
orking for over
C
a
m
b
r
i
d
g
e
A
s
s
essment Internati
o
n
a
l
E
d
u
c
a
t
i
o
n
WITH
318496 IGCSE and O Level Computer Science WB CV.indd 2
318496 IGCSE and O Level Computer Science WB CV.indd 2 07/04/2021 16:31
07/04/2021 16:31

More Related Content

PDF
CAMBRIDGE IGCSE COMPUTER SCIENCE
PDF
CAMBRIDGE IGCSE COMPUTER SCIENCE WORKBOOK
PDF
IGCSE & O Level Computer Workbook for P1 by Inqilab Patel
PDF
2 problem solving and programming workbook by inqilab patel
PDF
0478_w18_ms_11.pdf
PDF
557087-2022-syllabus.pdf
PDF
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
PDF
Binary-systems_ANSWERS.1.1.1 cambridge o level
CAMBRIDGE IGCSE COMPUTER SCIENCE
CAMBRIDGE IGCSE COMPUTER SCIENCE WORKBOOK
IGCSE & O Level Computer Workbook for P1 by Inqilab Patel
2 problem solving and programming workbook by inqilab patel
0478_w18_ms_11.pdf
557087-2022-syllabus.pdf
Computer paper 3 may june 2008 9691 cambridge General Certificate of educatio...
Binary-systems_ANSWERS.1.1.1 cambridge o level

Similar to CS Workbook P1dfdfdfdfdfdfdfddfdffff.pdf (20)

PDF
IGCSE & O Level Computer Workbook for P2 by Inqilab Patel
DOCX
0417_Scheme_of_Work_(for_examination_from_2023) (1).docx
PPTX
Computing-Presentatiodsdssdn-MYM-Edit.pptx
PDF
Unit P1 - Programming.pdf
PPTX
Computer Science: The best fun there is? @ Fareham Byte
PDF
Das patrac sandpythonwithpracticalcbse11
PDF
Cambridge O-Level Computer Science-2210
PDF
Computer paper 3 may june 2004 9691 cambridge General Certificate of educatio...
PPTX
Online Computer Courses in Mauritius.pptx
PDF
O'levels Computer Science 2210 Syllaybus 2015
PDF
I PUC Syllabus new updated 2024-2025.pdf
PPT
11 syllabus
PPT
11 Python CBSE Syllabus
PPTX
technology111110000000000000000000000000000000000000000000
PDF
June 08 P3
PPT
How to prepare and clear for NTA UGC Paper 2 Computer Science and its applica...
ODS
AKS Computing Schemes of Work 201314
DOC
B sc semester i
PDF
0417_Scheme_of_Work_for_examination_from_2017.pdf
PDF
June 10 P31
IGCSE & O Level Computer Workbook for P2 by Inqilab Patel
0417_Scheme_of_Work_(for_examination_from_2023) (1).docx
Computing-Presentatiodsdssdn-MYM-Edit.pptx
Unit P1 - Programming.pdf
Computer Science: The best fun there is? @ Fareham Byte
Das patrac sandpythonwithpracticalcbse11
Cambridge O-Level Computer Science-2210
Computer paper 3 may june 2004 9691 cambridge General Certificate of educatio...
Online Computer Courses in Mauritius.pptx
O'levels Computer Science 2210 Syllaybus 2015
I PUC Syllabus new updated 2024-2025.pdf
11 syllabus
11 Python CBSE Syllabus
technology111110000000000000000000000000000000000000000000
June 08 P3
How to prepare and clear for NTA UGC Paper 2 Computer Science and its applica...
AKS Computing Schemes of Work 201314
B sc semester i
0417_Scheme_of_Work_for_examination_from_2017.pdf
June 10 P31
Ad

Recently uploaded (20)

PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Empowerment Technology for Senior High School Guide
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Lesson notes of climatology university.
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Classroom Observation Tools for Teachers
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
advance database management system book.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
Indian roads congress 037 - 2012 Flexible pavement
Empowerment Technology for Senior High School Guide
IGGE1 Understanding the Self1234567891011
Lesson notes of climatology university.
Orientation - ARALprogram of Deped to the Parents.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Classroom Observation Tools for Teachers
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Computing-Curriculum for Schools in Ghana
Weekly quiz Compilation Jan -July 25.pdf
Unit 4 Skeletal System.ppt.pptxopresentatiom
Final Presentation General Medicine 03-08-2024.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
advance database management system book.pdf
History, Philosophy and sociology of education (1).pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
LDMMIA Reiki Yoga Finals Review Spring Summer
Ad

CS Workbook P1dfdfdfdfdfdfdfddfdffff.pdf

  • 2. 25 YEARS W orking for over C a m b r i d g e A s s essment Internati o n a l E d u c a t i o n WITH Cambridge IGCSE™ andOLevel Computer Science Computer Systems David Watson Helen Williams 318496 IGCSE and O Level Computer Science WB CV.indd 1 22/03/2021 13:32 318496_FM_IGCSE_OLCSSW_001-004.indd Page 1 02/04/21 3:10 PM sw-103 /130/HO01894/work/indd
  • 3. Every effort has been made to trace all copyright holders, but if any have been inadvertently overlooked, the Publishers will be pleased to make the necessary arrangements at the first opportunity. Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder Education cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible to find a relocated web page by typing in the address of the home page for a website in the URL window of your browser. Hachette UK’s policy is to use papers that are natural, renewable and recyclable products and made from wood grown in well-managed forests and other controlled sources. The logging and manufacturing processes are expected to conform to the environmental regulations of the country of origin. Orders: please contact Hachette UK Distribution, Hely Hutchinson Centre, Milton Road, Didcot, Oxfordshire, OX11 7HH. Telephone: +44 (0)1235 827827. Email education@hachette.co.uk Lines are open from 9 a.m. to 5 p.m., Monday to Friday. You can also order through our website: www.hoddereducation.com ISBN: 978 1 3983 1849 6 © David Watson and Helen Williams 2021 First published in 2021 by Hodder Education An Hachette UK Company Carmelite House 50 Victoria Embankment London EC4Y 0DZ www.hoddereducation.com Impression number 10 9 8 7 6 5 4 3 2 1 Year 2025 2024 2023 2022 2021 All rights reserved. Apart from any use permitted under UK copyright law, no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or held within any information storage and retrieval system, without permission in writing from the publisher or under licence from the Copyright Licensing Agency Limited. Further details of such licences (for reprographic reproduction) may be obtained from the Copyright Licensing Agency Limited, www.cla.co.uk Cover © phonlamaiphoto - stock.adobe.com Typeset in India by Aptara Inc. Printed in the UK A catalogue record for this title is available from the British Library. 318496_FM_IGCSE_OLCSSW_001-004.indd Page 2 31/03/21 1:57 PM sw-103 /130/HO01894/work/indd
  • 4. 3 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited Contents Introduction 4 1 Data representation 5 2 Data transmission 26 3 Hardware 41 4 Software 60 5 The internet and cyber security 71 6 Automated and emerging technologies 84 318496_FM_IGCSE_OLCSSW_001-004.indd Page 3 31/03/21 1:57 PM sw-103 /130/HO01894/work/indd
  • 5. 4 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Introduction Welcome to the Cambridge IGCSETM and O Level Computer Science Computer Systems Workbook. This and the companion Algorithms, Programming and Logic Workbook replace the previous Computer Science Workbook and are designed to complement the second edition of the Student’s Book and support the Cambridge IGCSE, IGCSE (9-1) and O Level Computer Science syllabuses (0478/0984/2210). The aim of this Workbook is to provide you with further opportunity to practise the skills and test the knowledge and understanding you have acquired through using the first six chapters of the Cambridge IGCSE and O Level Computer Science Second Edition Student’s Book. It is designed as a ‘write-in’ book to supplement your learning of different topics as you work through each chapter of the Student’s Book and can be used either for home study or in class. The Workbook is intended to be sufficiently flexible to suit whatever you feel is the best approach according to your needs. The chapters in this Workbook have the same names as those in the Student’s Book and reflect the theory topics in the Student’s Book. 318496_FM_IGCSE_OLCSSW_001-004.indd Page 4 31/03/21 1:57 PM sw-103 /130/HO01894/work/indd
  • 6. 5 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 1 Convert the denary number 165 into: a binary ............................................................................................................................................................................. ............................................................................................................................................................................. b hexadecimal ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 2 a Convert the following binary number into denary: 0 1 1 1 0 1 1 0 ............................................................................................................................................................................. ............................................................................................................................................................................. b Convert the following hexadecimal number into denary: 5F ............................................................................................................................................................................. ............................................................................................................................................................................. c Convert the following binary number into hexadecimal: 1 0 1 0 1 1 0 0 0 1 0 0 ............................................................................................................................................................................. ............................................................................................................................................................................. Data representation 1 318496_01_IGCSE_OLCSSW_005-025.indd Page 5 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 7. 1 Data representation 6 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook d Convert the following hexadecimal number into binary: 3ED ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 3 a How many mebibytes (MiB) of storage would be needed to store 800 photographs each of which are 16 MiB in size? ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Write your answer from part a in gibibytes (GiB). ............................................................................................................................................................................. ............................................................................................................................................................................. 4 The ASCII code for 'A' is 65 and for 'a' is 97. a Write these denary values in 8-bit binary: i 65 ....................................................................................................................................................................... ....................................................................................................................................................................... ii 97 ....................................................................................................................................................................... ....................................................................................................................................................................... b State the denary ASCII code for 'V' and 'v'. i 'V' ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_01_IGCSE_OLCSSW_005-025.indd Page 6 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 8. 1 Data representation 7 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited ii 'v' ....................................................................................................................................................................... ....................................................................................................................................................................... c Write the two denary values in part b in 8-bit binary format: i 'V' ....................................................................................................................................................................... ....................................................................................................................................................................... ii 'v' ....................................................................................................................................................................... ....................................................................................................................................................................... d Using your answers to part a and part b, suggest an easy way of finding the ASCII binary code for a lower-case letter (for example, 'm') if the ASCII code for the upper-case letter (for example, 'M') is known. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 5 A computer system uses binary codes for letters of the alphabet as follows: A = 10, B = 11, C = 12, … , X = 33, Y = 34, Z = 35 a Write the denary value for 'X' in binary using an 8-bit register: b To convert the binary code for 'X' to the binary code for 'x', all the bits in the 8-bit register in part a undergo a logic shift two places to the left. i Write down the contents of the 8-bit register after the bits, representing 'X', have been moved two places to the left. 318496_01_IGCSE_OLCSSW_005-025.indd Page 7 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 9. 1 Data representation 8 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook ii Convert the binary value in part b i into denary: ....................................................................................................................................................................... ....................................................................................................................................................................... c State the denary values for the following two letters using the method described in part b. i r: ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ii m: ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 6 a Convert the denary number 4 4 8 0 1 into hexadecimal. ............................................................................................................................................................................. ............................................................................................................................................................................. b Convert the hexadecimal number in part a into a 16-bit binary number. ............................................................................................................................................................................. ............................................................................................................................................................................. 7 State three uses of the hexadecimal system. 1   ............................................................................................................................................................................   ............................................................................................................................................................................ 2   ............................................................................................................................................................................   ............................................................................................................................................................................ 3   ............................................................................................................................................................................   ............................................................................................................................................................................ 318496_01_IGCSE_OLCSSW_005-025.indd Page 8 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 10. 1 Data representation 9 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 8 Six questions are shown on the left and eight numerical values are shown on the right. Draw lines to connect each question to its correct numerical value (two of the numerical values are not used). What is the denary value of this hexadecimal digit? E What is the denary value of this binary number? 0 0 0 1 1 1 0 0 If the download speed for broadband is 8 mebibytes per second, how long would it take to download a 96 mebibyte file (in seconds)? If 2x = 1 tebibyte (TiB), what is the value of x? What is the hexadecimal value of this denary number? 50 How many bits are there in two bytes of data? 10 12 14 16 22 32 40 9 START INPUT number X ← number D ← 128 X ← X – D is X 0? OUTPUT 0 X ← X + D D ← D/2 is D 1? STOP No No OUTPUT 1 Yes Yes 28 318496_01_IGCSE_OLCSSW_005-025.indd Page 9 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 11. 1 Data representation 10 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook a Trace through the flowchart using the following two values as inputs: i 220 Number X D OUTPUT 318496_01_IGCSE_OLCSSW_005-025.indd Page 10 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 12. 1 Data representation 11 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited ii 73 Number X D OUTPUT b Explain the function of the flowchart in part a. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_01_IGCSE_OLCSSW_005-025.indd Page 11 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 13. 1 Data representation 12 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 10 a i Convert 0 1 0 1 1 1 1 0 into denary. ....................................................................................................................................................................... ....................................................................................................................................................................... ii Convert 0 0 1 1 1 1 0 1 into denary. ....................................................................................................................................................................... ....................................................................................................................................................................... b i Add together 0 1 0 1 1 1 1 0 and 0 0 1 1 1 1 0 1, giving your answer in binary. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ii Convert your answer in part b i to denary. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 11 a Write down the largest number that can be represented by the following binary register. Give your answer in binary and denary form: 128 64 32 16 8 4 2 1 ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_01_IGCSE_OLCSSW_005-025.indd Page 12 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 14. 1 Data representation 13 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited b i Add together 0 1 1 1 0 1 1 1 and 1 0 0 1 1 1 0 1, giving your answer as an 8-bit binary number. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ii Comment on your answer to part b i. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 12 An 8-bit binary register contains the following value: 0 0 1 1 1 1 0 0 a Write down the denary value of the register. ............................................................................................................................................................................. ............................................................................................................................................................................. b The contents of the register undergo a logical shift one place to the right. i Show the result of this right shift: ii Write down the denary value of your answer to part b i. ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_01_IGCSE_OLCSSW_005-025.indd Page 13 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 15. 1 Data representation 14 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook iii The register in part b i now undergoes a further logical shift two places to the right. Comment on your result. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... c The content of the original register (shown in part a) now undergoes a logical shift two places to the left. i Show the contents of the register after this left shift operation. ii State, with reasons, the effect of this shift on the denary value shown in part a. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 13 a Convert the denary numbers, 37 and 19, into 8-bit binary numbers: 37: ...................................................................................................................................................................... 19: ..................................................................................................................................................................... b Add together the two binary numbers in part a, and give your answer in binary. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_01_IGCSE_OLCSSW_005-025.indd Page 14 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 16. 1 Data representation 15 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited c Carry out a logical shift, two places to the left, on your result from part b. Comment on your answer. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. d Carry out a logical shift, four places to the right, on your result from part b. Comment on your answer. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 14 A computer system uses two’s complement notation. a Complete the headings for an 8-bit binary number which uses two’s complement: 64 32 16 8 4 2 1 ....................................... b Write down i the most negative and ii the most positive numbers that can be stored in an 8-bit register which uses two’s complement. Give your answers in both denary and binary format. i most negative: denary value: ........................................................................................................................................................................ ........................................................................................................................................................................ 318496_01_IGCSE_OLCSSW_005-025.indd Page 15 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 17. 1 Data representation 16 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook ii most positive: denary value: ........................................................................................................................................................................   ....................................................................................................................................................................... c Convert the following two denary numbers into 8-bit binary numbers which use the two’s complement format. i +47 ii −59 d Convert the following two binary numbers, written in two’s complement format, into denary. i 1 1 0 0 1 1 1 0 ....................................................................................................................................................................... ....................................................................................................................................................................... ii 1 1 1 1 1 1 1 0 ....................................................................................................................................................................... ....................................................................................................................................................................... e i Convert the denary number, +45, into binary, using the two’s complement format. ....................................................................................................................................................................... ii Convert the denary number, −45, into binary, using the two’s complement format. ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_01_IGCSE_OLCSSW_005-025.indd Page 16 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 18. 1 Data representation 17 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited iii Add together the binary numbers found in parts e i and e ii, leaving your answer in binary. Comment on the result. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 15 a A camera detector has an array of 4096 by 2048 pixels and uses a colour depth of 16. Calculate the size of an image taken by this camera; give your answer in MiB. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b An audio CD uses 40960 samples per second, with 16 bits being used per sample. The music being sampled uses two channels to allow for stereo recordings. Calculate the file size for a 1024 second recording. Give your answer in MiB. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_01_IGCSE_OLCSSW_005-025.indd Page 17 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 19. 1 Data representation 18 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 16 a Give three reasons why it is often necessary to reduce the size of a file. 1   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... ....................................................................................................................................................................... b Explain the difference between lossy and lossless file compression. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_01_IGCSE_OLCSSW_005-025.indd Page 18 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 20. 1 Data representation 19 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited c i Give one example of the use of lossy file compression. ....................................................................................................................................................................... ....................................................................................................................................................................... ii Give one example of the use of lossless file compression. ....................................................................................................................................................................... ....................................................................................................................................................................... 17 In terms of representing bitmap images, explain the following: a colour depth: ...................................................................................................................................................   ............................................................................................................................................................................   ............................................................................................................................................................................   ............................................................................................................................................................................ b image resolution: ............................................................................................................................................   ............................................................................................................................................................................   ............................................................................................................................................................................   ............................................................................................................................................................................ 18 Explain the difference between ASCII code and Unicode. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. 318496_01_IGCSE_OLCSSW_005-025.indd Page 19 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 21. 1 Data representation 20 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 19 Seven statements are shown on the left and eleven computing terms are shown on the right in the diagram below. Draw lines to connect each statement to the correct computer term. In a binary number, this is the right-most binary digit Method used by a computer to allow the representation of negative numbers as well as positive numbers Result of adding two binary numbers that exceeds the maximum size of a number which can be stored The moving of bits to the left or to the right in a register, which represents multiplication by 2x or division by 2x (where x represents the number of places the bits are moved left or right) A 7-bit code used to represent letters, numbers and characters found on a standard keyboard plus 32 control codes Number of sound samples taken per second when representing sound digitally in a computer The smallest element of a picture Overflow error Resolution Unicode American standard code for information interchange Pixel Two’s complement Sampling rate Logical shift Least significant bit Error code Colour depth 20a Which one of the following is not a correct hexadecimal number? A C0DE B AX1S C 1DEA D FACE b The number of bits used to represent a sound sample is known as: A the sampling rate B amplitude value C loudness of a sound sample D sampling resolution 318496_01_IGCSE_OLCSSW_005-025.indd Page 20 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 22. 1 Data representation 21 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited c The MP3 format removes redundant sound from a file. Which one of the following best describes the type of file reduction being used by the MP3 format? A lossy files compression B sound file damping C image file compression D lossless file compression d Temporary files produced by a camera where no compression has been applied, are called: A jpeg files B png files C gif files D raw bitmap files e Lossless file compression, which reduces the size of a string of adjacent, identical data, is called: A jpeg B run-length encoding C sampling resolution D audio compression 21 a Explain what is meant by run-length encoding (RLE). ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_01_IGCSE_OLCSSW_005-025.indd Page 21 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 23. 1 Data representation 22 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook b i The above monochrome image is being designed. Each white square is represented by 'W' and each dark square is represented by 'D'. Show how run-length encoding (RLE) would be used to produce a condensed file for the above image. Using the grid below, write down the data you would expect to find in the RLE compressed format; the first two have been done for you. 3W 2D ii Assuming that each square in the 8 × 8 grid requires one byte of storage, and each character in the RLE code also requires one byte of storage (for example, '3' requires 1 byte, 'W' requires 1 byte), calculate the file size reduction when using RLE. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 22a Explain the following terms used in the electronic storage of sound: i sampling resolution:   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... 318496_01_IGCSE_OLCSSW_005-025.indd Page 22 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 24. 1 Data representation 23 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited ii sampling rate:   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... b Look at the sound wave below that has been sampled: 0 0 1 2 1 2 3 5 6 7 8 9 10 11 12 13 14 4 15 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 20 18 19 Sample number --------------1 second-------------- × --------------1 second-------------- i From the graph, what is the sampling resolution? ....................................................................................................................................................................... ....................................................................................................................................................................... ii From the graph, what is the sampling rate? ....................................................................................................................................................................... ....................................................................................................................................................................... iii Using the x-axis, locate points 9 and 18 on the graph. Write down the 4-bit binary values corresponding to the y-axis values of these two points. point 9: point 18: 318496_01_IGCSE_OLCSSW_005-025.indd Page 23 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 25. 1 Data representation 24 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook c Discuss the benefits and drawbacks of increasing the sampling rate and sampling resolution when representing sound in an electronic (binary) format. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 23 Write down a series of steps that could be used to convert a denary number into a hexadecimal number. Your steps should allow somebody to follow them clearly to give the correct converted value. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. 318496_01_IGCSE_OLCSSW_005-025.indd Page 24 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 26. 1 Data representation 25 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 24a State what is meant by a bit. ............................................................................................................................................................................. b Give two reasons why computers use binary numbers rather than decimal numbers. 1   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... c Explain why the hexadecimal number system is used by computer technicians and programmers. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_01_IGCSE_OLCSSW_005-025.indd Page 25 31/03/21 2:01 PM sw-103 /130/HO01894/work/indd
  • 27. 26 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 1 a Explain the term data packet. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Data packets contain a header. Name three components that you would expect to find in a header. 1   ....................................................................................................................................................................... 2   ....................................................................................................................................................................... 3   ....................................................................................................................................................................... Data transmission 2 318496_02_IGCSE_OLCSSW_026-040.indd Page 26 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 28. 2 Data transmission 27 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited c Data packets also have a payload and a trailer. Explain these two terms. payload: ............................................................................................................................................................ ............................................................................................................................................................................. ............................................................................................................................................................................. trailer: ............................................................................................................................................................... ............................................................................................................................................................................. ............................................................................................................................................................................. d R1 R3 R4 R9 R8 R6 R5 R7 R2 R10 Computer A Router A Computer B Router B i Using the above diagram, explain how packet switching works when sending a 500KiB file from computer 'A' to computer 'B'. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_02_IGCSE_OLCSSW_026-040.indd Page 27 02/04/21 3:13 PM sw-103 /130/HO01894/work/indd
  • 29. 2 Data transmission 28 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook ii Using the diagram, explain why data packets need to be reassembled at computer 'B'. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 2 Packet switching is used to send packets of data over a network. a Give three benefits of using packet switching. 1   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 2   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 3   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... b Give three disadvantages of using packet switching. 1   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 2   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_02_IGCSE_OLCSSW_026-040.indd Page 28 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 30. 2 Data transmission 29 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 3   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... c Data packets can get lost due to 'bouncing' around from router to router and never reaching their destination. Explain the problems caused by data packets 'bouncing'. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 3 a Data transmission depends on data direction and how many bits of data can be sent at a time. Complete the table below to show what type of data transmission is being described in each case. Tick (✓) two boxes for each description. Description of transmission taking place Simplex (✓) Half-duplex (✓) Full-duplex (✓) Serial (✓) Parallel (✓) Data sent one bit at a time down a single wire in one direction only Data sent 16 bits at a time down 16 wires in both directions, but not at the same time Data sent 16 bits at a time down 16 wires in both directions simultaneously Data sent 8 bits at a time down 8 wires in one direction only Data sent one bit at a time down a single wire in both directions simultaneously Data sent one bit at a time down a single wire in both directions, but not at the same time b Five statements about serial and parallel data transmission are made in the table below. By placing a tick (✓) in the appropriate column, select which statements refer to serial transmission and which statements refer to parallel transmission. Statements Serial (✓) Parallel (✓) Transmission method used by the memory bus inside a computer Data can be skewed (out of synch) when travelling over long distances Least expensive of the two types due to fewer hardware requirements Most appropriate if data is time-sensitive; for example, when live streaming where faster transmission rate is essential Suffers from less risk of external interference 318496_02_IGCSE_OLCSSW_026-040.indd Page 29 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 31. 2 Data transmission 30 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 4 a Explain what happens when a device is plugged into a computer using one of the USB ports. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Seven statements about USB connections are made in the table below. By ticking (✓) the appropriate box, indicate which statements are true and which statements are FALSE. Statements True (✓) False (✓) USB uses a protocol that allows for error-free data transmission between device and computer USB can support any cable length between device and computer USB uses serial data transfer USB connections can transfer data using half-duplex or full-duplex It is difficult to add more USB ports to a computer using USB hubs USB data transfer rates are much faster than, for example, Ethernet connections There is no need for devices to have a power source because USB cable supplies 5V of power 5 a A system uses even parity. Indicate whether the following bytes would fail or pass an even parity check: 1 1 0 0 0 0 1 1 ............................................................................................................................................................................. 1 0 1 1 0 1 1 0 ............................................................................................................................................................................. 0 0 0 1 1 1 1 1 ............................................................................................................................................................................. 318496_02_IGCSE_OLCSSW_026-040.indd Page 30 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 32. 2 Data transmission 31 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited b Explain why parity checks are used. ............................................................................................................................................................................. ............................................................................................................................................................................. c Nine bytes of data were transmitted from one computer to another computer. Even parity was used by both systems. An additional byte, called the parity byte was also sent at the end of the transmission. The following table shows the nine bytes and parity byte following transmission. Parity bit Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8 Byte 1 1 1 1 0 1 1 1 0 Byte 2 1 0 0 0 0 1 0 0 Byte 3 0 1 1 1 0 0 1 0 Byte 4 0 1 1 1 1 0 1 1 Byte 5 1 1 0 0 0 1 1 0 Byte 6 0 1 1 0 1 1 0 1 Byte 7 1 0 0 1 0 0 0 0 Byte 8 0 1 1 1 1 1 0 1 Byte 9 0 0 0 0 1 0 0 1 Parity byte: 0 0 1 1 1 1 0 0 i One of the bits has been transmitted incorrectly. Indicate which bit is incorrect by giving its bit number and byte number: bit number: ................................................................................................................................................. byte number: .............................................................................................................................................. ii Explain how you arrived at your answer to part c i. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_02_IGCSE_OLCSSW_026-040.indd Page 31 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 33. 2 Data transmission 32 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook iii Write down the corrected byte. ....................................................................................................................................................................... iv Describe a situation where a parity check wouldn’t identify which bit had been transmitted incorrectly. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... v Name and briefly describe another method to check if data has been transmitted correctly. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 6 a Explain how the checksum system is used to identify any errors during data transmission. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_02_IGCSE_OLCSSW_026-040.indd Page 32 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 34. 2 Data transmission 33 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited b Explain how echo checks are used to check data following data transmission. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. c Explain how automatic repeat requests (ARQs) work during data transmission. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 7 Check digits are used to check data during data entry. a Give four types of error that check digits can identify. 1   ....................................................................................................................................................................... ....................................................................................................................................................................... 2   ....................................................................................................................................................................... ....................................................................................................................................................................... 3   ....................................................................................................................................................................... ....................................................................................................................................................................... 4   ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_02_IGCSE_OLCSSW_026-040.indd Page 33 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 35. 2 Data transmission 34 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook b ISBN-13 is a type of check digit standard. i The following algorithm generates a check digit for a 12-digit ISBN book code: 1 add all odd-numbered digits together 2 add all even-numbered digits together and then multiply the result by 3 3 add together the results for steps 1 and 2, and then divide the result by 10 4 take away the remainder of the division from 10, leaving the check digit Showing your working, calculate the check digit for the following 12-digit ISBN code: 9 781 471 86867 ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ 318496_02_IGCSE_OLCSSW_026-040.indd Page 34 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 36. 2 Data transmission 35 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited ii The following algorithm checks that the check digit in a 13-digit code is correct: 1 add all odd-numbered digits together, including the check digit 2 add all even-numbered digits together and then multiply the result by 3 3 add together the results for steps 1 and 2, and then divide the result by 10 4 the check digit is correct if the remainder is zero Showing your working, use the above algorithm to check whether or not the check digit in the following ISBN-13 code is correct: 9 781 471 80721 8 ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ 8 For each of the following ten questions, choose which of the five options corresponds to the correct response. a What is meant by the term ciphertext when used in encryption? Circle the correct answer. A an encryption or decryption algorithm B a message before it has been encrypted C a type of session key D another name for plaintext E text following an encryption algorithm 318496_02_IGCSE_OLCSSW_026-040.indd Page 35 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 37. 2 Data transmission 36 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook b Which one of the following statements about asymmetric encryption is true? Circle the correct answer. A uses a public key only B uses both a public key and a private key C always uses 64-bit encryption D the value of the private key is symmetrical E uses private key only c In encryption, which of the following is the term used to describe the message before it is encrypted? Circle the correct answer. A simpletext B plaintext C notext D ciphertext E firsttext d Which of the following is the biggest disadvantage of using symmetric encryption? Circle the correct answer. A it is very complex and time consuming B it is rarely used anymore C the value of the key reads the same in both directions D it only works on computers with older operating systems E there is a security problem when transmitting the encryption key e Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt and decrypt? Circle the correct answer. A symmetric key encryption B asymmetric key encryption C public key encryption D same key encryption E block cipher encryption 318496_02_IGCSE_OLCSSW_026-040.indd Page 36 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 38. 2 Data transmission 37 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited f Which of the following is the final number in a code, calculated from all the numbers in the code, whose purpose is to find errors in data entry? Circle the correct answer. A parity check B checksum C cyclic redundancy check D parity bit E check digit g Which of the following is a form of error detection that makes use of a system of acknowledgements and timeouts? Circle the correct answer. A automatic repeat request B echo check C check digit D parity bit E cyclic redundancy check h Which of the following methods uses an extra bit added to a byte to ensure it contains an even number of 1s or odd number of 1s? Circle the correct answer. A cyclic redundancy check B parity check C checksum D check digit E echo check i Which of the following uses a calculated value which is sent after a block of data: the receiving computer also calculates the value from the block of data and compares the values? Circle the correct answer. A parity check B check digit C packet switching D checksum E automatic repeat request 318496_02_IGCSE_OLCSSW_026-040.indd Page 37 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 39. 2 Data transmission 38 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook j Which of the following describes the check where the receiving computer sends back a copy of the data to the sending computer to allow it to compare the data? Circle the correct answer. A echo check B automatic repeat request C checksum D parity check E check digit 9 Some students sat a computer science exam. A number of their responses were incorrect. Explain why the following eight responses given by the students are incorrect: a 'A data packet header contains the MAC address of the sending computer and the receiving computer.' ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b 'Half-duplex refers to the fact that four bits of data (half a byte) can be sent from A to B along four single wires.' ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. c 'Because USB connections can be fitted in any way, they have become the industry standard.' ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_02_IGCSE_OLCSSW_026-040.indd Page 38 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 40. 2 Data transmission 39 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited d 'Odd parity means a binary number has an odd value, for example, 01110001 (i.e. 113).' ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. e 'Even parity means a binary number has an even number of zeros.' ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. f 'Check digits are used to make sure data has been transmitted without errors.' ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. g 'A checksum is calculated by adding up all the 1-bits in a byte, and sending this value at the end of the byte.' ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. h 'Asymmetric encryption makes use of the same key to encrypt and decrypt an encoded message.' ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_02_IGCSE_OLCSSW_026-040.indd Page 39 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 41. 2 Data transmission 40 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 10 Five statements are shown on the left and eight computer terms are shown on the right in the following diagram. Draw lines to connect each statement to the correct computer term. Error checking method where data is sent to another device and is then sent back to the sender; if the two sets of data are different then there has been an error during transmission Data is made unreadable to anyone without the necessary keys to unlock the encoded data A form of encryption which makes use of a public key and a private key to encrypt and decrypt coded messages Transmission error check that makes use of positive acknowledgement and timeout following data transmission Type of data transmission where data can be sent in both directions at the same time Symmetric encryption Encryption Cipher text Echo check Full-duplex Asymmetric encryption Half-duplex Automatic repeat request 11 Use the following word/phrase list to complete the paragraph below. Each word or phrase may be used once, more than once or not at all. » algorithm » asymmetric encryption » cipher text » confidential » decrypt » document » encrypted » matching document » matching pairs » matching private » mathematically » plain text » private » public » public key » symmetric encryption ............................ makes use of a ............................ key and a ............................ key. Suppose Asif and Karl both work for the same company, and Asif wants to send a confidential ............................ to Karl. Asif and Karl’s computers both use the same ............................ to generate their own ............................ of keys; these keys are ............................ linked, but cannot be derived from each other. Karl now sends his ............................ to Asif. Asif now uses Karl’s ............................ to encrypt the document he wishes to send to Karl. Asif then sends his ............................ document back to Karl. Karl uses his ............................ key to unlock Asif’s ............................ and ............................ it. 318496_02_IGCSE_OLCSSW_026-040.indd Page 40 31/03/21 2:02 PM sw-103 /130/HO01894/work/indd
  • 42. 41 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 1 The diagram shows a typical fetch-decode-execute cycle. However, five of the stages have been omitted. Complete the fetch-decode-execute diagram using the following stages. Write the number of the stage only in the diagram. START END Yes No No Any instructions? Yes Any more instructions to service? Continue process The contents (instruction) of the MDR are then copied and placed into the Current Instruction Register (CIR) Hardware 3 318496_03_IGCSE_OLCSSW_041-059.indd Page 41 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 43. 3 Hardware 42 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Stage Description of stage 1 Address is then copied from the program counter (PC) to the memory address register (MAR) via the address bus 2 Contents of memory location contained in MAR are then copied into MDR 3 Instruction is decoded and then executed by sending out signals via the control bus to the computer components 4 The PC contains the address of the memory location of the next instruction to be fetched 5 Value of the PC is incremented by 1 so it now points to the next instruction to be fetched 2 a Name three types of bus used in the von Neumann architecture. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b The contents at a number of addresses are shown below. Address Contents 1000 0000 0111 1100 1000 0001 1000 0011 1000 0010 1111 1101 1000 0011 0111 1110 1000 0100 1100 1101 1111 1100 1111 1101 0110 0011 1111 1110 1010 0111 1111 1111 1111 0011 i Show the contents of the MAR and MDR if we READ the contents of memory location 1 1 1 1 1 1 1 0. MAR: MDR: ii Show the contents of the MAR and MDR if we wish to write 1 1 0 0 1 1 0 1 into memory location 1 0 0 0 0 1 0 0. MAR: MDR: iii If MAR contains 1 1 1 1 1 1 0 0 and MDR contains 0 0 1 1 1 1 0 0, complete the memory contents diagram above. 318496_03_IGCSE_OLCSSW_041-059.indd Page 42 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 44. 3 Hardware 43 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited c Four registers are shown in the following table. For each register, give its full name and explain its function in the fetch-decode-execute cycle. Register Full name of register Function of register CIR ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... MAR ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... MDR ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... PC ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... 3 a Explain the meaning of the following terms, with reference to the CPU. i (system) clock cycle: ................................................................................................................................ ............................................................................................................................................................................. ............................................................................................................................................................................. ii cache: .......................................................................................................................................................... ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_03_IGCSE_OLCSSW_041-059.indd Page 43 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 45. 3 Hardware 44 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook b Discuss how changes to the clock speed and to the number of cores can affect the performance of the CPU. Include any advantages and disadvantages, due to these changes, in your discussion. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 4 a i Define what is meant by an embedded system. ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ii State four of the features you would expect to find in any embedded system. 1   .................................................................................................................................................................. .................................................................................................................................................................. .................................................................................................................................................................. 2   .................................................................................................................................................................. .................................................................................................................................................................. .................................................................................................................................................................. 3   .................................................................................................................................................................. .................................................................................................................................................................. .................................................................................................................................................................. 318496_03_IGCSE_OLCSSW_041-059.indd Page 44 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 46. 3 Hardware 45 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 4   .................................................................................................................................................................. .................................................................................................................................................................. .................................................................................................................................................................. iii Describe three applications that use embedded systems. 1   .................................................................................................................................................................. .................................................................................................................................................................. .................................................................................................................................................................. 2   .................................................................................................................................................................. .................................................................................................................................................................. .................................................................................................................................................................. 3   .................................................................................................................................................................. .................................................................................................................................................................. .................................................................................................................................................................. b A games console is controlled by an embedded system in the form of a microcontroller. New games are supplied on a memory stick or via an internet connection. Various devices, such as a steering wheel, are connected to the console. i Describe the inputs needed by the embedded system and describe what outputs you would expect to be produced. You may find it helpful to draw a diagram of your system. ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ 318496_03_IGCSE_OLCSSW_041-059.indd Page 45 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 47. 3 Hardware 46 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook ii Updates to the internal software in the games console are required every six months. Explain how the device software is updated without the need to send the games console back to the manufacturer every six months. ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ ........................................................................................................................................................................ 5 A B C a A barcode showing three digits, A, B and C, is shown above. Each dark bar represents a 1-value and each light bar represents a 0-value. Give the 7-bit binary value for each of the three digits. A   ....................................................................................................................................................................... B   ....................................................................................................................................................................... C   ....................................................................................................................................................................... b A supermarket uses barcodes on all its items. When a customer goes to checkout, a number of input and output devices may be used. Name two input devices and two output devices. Give a different use for each named device. input device 1: ............................................................................................................................................... use: ....................................................................................................................................................................   ............................................................................................................................................................................ input device 2: ............................................................................................................................................... use: ....................................................................................................................................................................   ............................................................................................................................................................................ output device 1: ............................................................................................................................................ use: ....................................................................................................................................................................   ............................................................................................................................................................................ 318496_03_IGCSE_OLCSSW_041-059.indd Page 46 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 48. 3 Hardware 47 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited output device 2: ............................................................................................................................................ use: ....................................................................................................................................................................   ............................................................................................................................................................................ c Give two benefits to the supermarket manager and two benefits to customers of using barcodes on all items. Manager 1   ....................................................................................................................................................................... ....................................................................................................................................................................... 2   ....................................................................................................................................................................... ....................................................................................................................................................................... Customer 1   ....................................................................................................................................................................... ....................................................................................................................................................................... 2   ....................................................................................................................................................................... ....................................................................................................................................................................... 6 A camera uses an embedded system. a Name three of the tasks controlled by the embedded system in the camera. 1   ....................................................................................................................................................................... 2   ....................................................................................................................................................................... 3   ....................................................................................................................................................................... b Name two applications where a digital camera could be used. 1   ....................................................................................................................................................................... ....................................................................................................................................................................... 2   ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_03_IGCSE_OLCSSW_041-059.indd Page 47 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 49. 3 Hardware 48 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 7 Choose the most suitable input device for each of the following applications. A different device must be given in each case. Application Most suitable input device Entering text and numbers into a word processor or spreadsheet Selecting an option or icon from an on-screen menu Inputting a user’s voice into a computer as part of a voice recognition system Converting a hard copy document into an electronic form to be stored in a computer Reading a QR code using a smartphone or tablet Keying in digits from a barcode which did not scan correctly Reading data directly from the surroundings, such as taking a temperature 8 Mobile phone touch screens can use three different types of touchscreen technology: – capacitive – infrared – resistive In the following table, give the advantages and disadvantages of all three types of touchscreen technology, when compared to each other. Touch screen technology Advantages Disadvantages Capacitive ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ Infrared ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ Resistive ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ ............................................................ 318496_03_IGCSE_OLCSSW_041-059.indd Page 48 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 50. 3 Hardware 49 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 9 a Give three advantages of using digital light projectors when compared to LCD projectors. 1   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 2   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 3   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... b Give two disadvantages of using digital light projectors when compared to LCD projectors. 1   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 2   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 10 Inkjet printers and laser printers are used in many offices. a Give one advantage and one disadvantage of each type of printer when compared to each other. Inkjet printer: Advantage: ....................................................................................................................................................... ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������� Disadvantage: .................................................................................................................................................. ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������� 318496_03_IGCSE_OLCSSW_041-059.indd Page 49 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 51. 3 Hardware 50 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Laser printer: Advantage:......................................................................................................................................................... ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������� Disadvantage: .................................................................................................................................................. ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������� b Three tasks are given below. For each task, name the most suitable type of printer and give a reason for your choice. i Printing 20 000 colour leaflets to advertise a new pizza shop. Printer: ........................................................................................................................................................ Reason for choice: ..................................................................................................................................... ���������������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������������� ii Printing a single high gloss photograph in colour. Printer: ........................................................................................................................................................ Reason for choice: ..................................................................................................................................... ���������������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������������� iii Printing out physical replicas of coins for sale in a museum shop. Printer: ........................................................................................................................................................ Reason for choice: ..................................................................................................................................... ���������������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������������� 318496_03_IGCSE_OLCSSW_041-059.indd Page 50 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 52. 3 Hardware 51 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 11 a A car enthusiast has bought a car made in 1921. Unfortunately, none of the parts for the car are still made. Explain how 3D technology could be used to create any part for this car. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Describe three other uses of 3D printers. 1   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 2   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 3   ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_03_IGCSE_OLCSSW_041-059.indd Page 51 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 53. 3 Hardware 52 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 12 Eight types of sensor are shown on the left and eight potential sensor applications on the right. Draw lines to connect each sensor to an appropriate application. Only one application can be assigned to each sensor. Level sensor Moisture sensor Light sensor Infrared (active) sensor Pressure sensor Acoustic sensor Magnetic field sensor Accelerometer Control/monitor the amount of water in the soil in a greenhouse Used by a mobile phone to change between portrait and landscape modes Monitor the amount of fuel in a car’s petrol tank Turn on the windscreen wipers automatically when rain is detected Used in the anti-lock braking systems in an aeroplane under-carriage Switch vehicle headlights on or off automatically Measuring the weight of a lorry or van at a weigh station Pick up the noise of breaking glass in a security system 13 A security system uses three different types of sensor to detect intruders. a Name three types of sensor that could be used. 1   ....................................................................................................................................................................... 2   ....................................................................................................................................................................... 3   ....................................................................................................................................................................... b Describe how the sensors and microprocessor are used in the security system. The output is the operation of a siren and flashing lights if an intruder is detected. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_03_IGCSE_OLCSSW_041-059.indd Page 52 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 54. 3 Hardware 53 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 14 a Explain the differences between primary memory and secondary storage. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b In the following table, tick (✓) which description refers to RAM and which refers to ROM. Description RAM (✓) ROM (✓) Temporary memory device Non-volatile memory Data stored in this memory cannot be altered Permanent memory device Stores data and part of the operating system currently in use Can be increased in size to improve the operational speed of a computer c A model radio-controlled car contains RAM, ROM and also has a USB connection. The operation of the car is controlled by a remote control which communicates using radio waves. i State what data or information would be stored on the ROM chip. ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ii State what data or information would be stored on the RAM chip. ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ 318496_03_IGCSE_OLCSSW_041-059.indd Page 53 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 55. 3 Hardware 54 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook iii Explain why a USB port has also been included in the model car. ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ 15 Backing storage makes use of magnetic, optical or solid-state technology. Seven descriptions are given in the table below. Indicate with a tick (✓) which statements refer to magnetic, optical or solid-state technology. Technology used Description Magnetic (✓) Optical (✓) Solid state (✓) Makes use of floating gate and control gate technology Disk surfaces are made up of tracks and sectors; storage relies on certain properties of the iron oxide coating Devices using this technology have no moving parts Data is stored in 'pits' and 'lands' on a single spiral track running from the centre outwards Disks use the properties of laser light to allow read and write operations Data is stored by controlling the movement of electrons within NAND chips This technology is affected by strong magnetic and radio fields 16 There are ten statements in the table below. Indicate, using a tick (✓) whether each statement is true or false. Statement True (✓) False (✓) Devices using magnetic media have a very slow data transfer rate HDD platters can be made from ceramic, glass or aluminium coated in iron oxide HDD surfaces are split up into tracks and sectors HDDs use a more reliable technology than solid-state devices, such as SSDs DVD-Rs are used to read and write data several times DVD and Blu-ray disks can both use dual-layer technology SSDs suffer from a high degree of latency Solid-state devices, known as flash drives, use NAND chip technology SSD data access time is approximately 100 times less than the data access time for HDDs Memory cards (such as the SD and XD cards used in cameras) are examples of magnetic media 318496_03_IGCSE_OLCSSW_041-059.indd Page 54 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 56. 3 Hardware 55 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 17 Describe how virtual memory works. In your description, include the benefits and drawbacks of virtual memory. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. 18 a Describe cloud (storage). Include in your description why this type of storage makes use of data redundancy. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_03_IGCSE_OLCSSW_041-059.indd Page 55 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 57. 3 Hardware 56 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook b Describe the differences between public clouds, private clouds and hybrid clouds. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. c i Describe three benefits of using cloud storage. 1   ................................................................................................................................................................. ................................................................................................................................................................. ................................................................................................................................................................. 2   ................................................................................................................................................................. ................................................................................................................................................................. ................................................................................................................................................................. 3   ................................................................................................................................................................. ................................................................................................................................................................. ................................................................................................................................................................. ii Describe two drawbacks of using cloud storage. 1   ................................................................................................................................................................. ................................................................................................................................................................. ................................................................................................................................................................. 2   ................................................................................................................................................................. ................................................................................................................................................................. ................................................................................................................................................................. 318496_03_IGCSE_OLCSSW_041-059.indd Page 56 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 58. 3 Hardware 57 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 19 Five computer terms are shown on the left and five descriptions on the right. Draw lines to connect each computer term to its correct description. Thrashing Swap space Thrash point Public cloud Storage environment where the client and remote storage provider are different companies High rate of HDD read/write operations causing a large number of head movements Space on HDD or SSD reserved for data used in virtual memory management Where an HDD is so busy doing read/write operations that execution of a process is halted Method of data storage where data is stored on hundreds of off-site servers Cloud storage 20a State which network terms are being described. i A circuit board or chip that allows a device to connect to a network: ........................................................................................................................................................................ ii Type of address that uniquely identifies a device connected to a network: ........................................................................................................................................................................ iii Address assigned by an ISP to a device each time it logs onto the internet: ........................................................................................................................................................................ iv Hardware device that allows data packets to be moved between different networks: ........................................................................................................................................................................ v Hardware or software that sits between a computer and an external network; it monitors traffic to and from the computer: ........................................................................................................................................................................ 318496_03_IGCSE_OLCSSW_041-059.indd Page 57 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 59. 3 Hardware 58 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook b i Explain what is meant by a dynamic IP address. ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ii Describe two differences between a dynamic IP address and a static IP address. ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ c 1 4 3 1 2 1 i Complete the diagram using the terms: – computer – external network – router – switch 1   ................................................................................................................................................................. 2   ................................................................................................................................................................. 3   ................................................................................................................................................................. 4   ................................................................................................................................................................. 318496_03_IGCSE_OLCSSW_041-059.indd Page 58 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 60. 3 Hardware 59 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited ii Describe the function of a router in a network. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 21 When devices connect to the internet they are given IP addresses supplied by an ISP. IP addresses are necessary since the operation of the internet is based on a number of protocols. a State what is meant by an ISP. ............................................................................................................................................................................. b State what is meant by a protocol. ............................................................................................................................................................................. ............................................................................................................................................................................. c Two versions of IP addresses are called IPv4 and IPv6. Describe the differences between IPv4 and IPv6. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_03_IGCSE_OLCSSW_041-059.indd Page 59 31/03/21 2:04 PM sw-103 /130/HO01894/work/indd
  • 61. 60 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 1 Tick (✓) the appropriate column, in the following table, to indicate whether the named software is an example of system software or application software. Software System (✓) Application (✓) Photo editing software Graphics manipulation software Compiler Spreadsheet software Printer driver QR code reader Anti-virus software Screensaver 2 a Give three of the general features of system software. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... b Give three of the general features of application software. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... Software 4 318496_04_IGCSE_OLCSSW_060-070.indd Page 60 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 62. 61 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 4 Software c Give three examples of utility programs. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... 3 Use the following list of words and phrases to complete the paragraph below. Each word or phrase can be used once, more than once or not at all. » anti-virus » background » blocks » bootstrap » contiguous » disk defragmenter » file compression » file management » head movements » heuristic checking » infected » locked » quarantine » screensavers » sectors » security system » smaller » tracks » user » utility Running .................................. software in the .................................. on a computer will constantly check for virus attacks. Many .................................. utilities check software for certain behaviour which would indicate a possible virus; this is known as .................................. . Any possible files or programs which are infected are put into .................................. until deleted by the .................................. or automatically deleted. As a hard disk drive (HDD) becomes full, .................................... used for data and files will become scattered over different .................................... and .................................... on the disk surface. A ........ ............................ will rearrange the .................................... of data and files into .................................... sectors wherever possible, thus reducing the scattering of data. It also reduces the number of HDD .................................... . Many computers use .................................... which automatically launch when a computer has been inactive for a period of time. They form part of the ...................................., so that a user is automatically logged out after a certain period of time and the .................................... will indicate that the computer is now .................................... . 318496_04_IGCSE_OLCSSW_060-070.indd Page 61 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 63. 62 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 4 Software 4 a Write down five of the functions of a typical operating system. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ..................................................................................................................................................................... z 4   .......................................................................................................................................................................   ....................................................................................................................................................................... 5   .......................................................................................................................................................................   ....................................................................................................................................................................... b The interface between a computer and a user is either a command line interface (CLI) or graphical user interface (GUI). i Explain the terms CLI and GUI. CLI: �������������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� GUI: ������������������������������������������������������������������������������������������������������������������������������������������������������������� ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� ii In the table below, six statements about interfaces are given. Tick (✓) the appropriate box to indicate whether each statement refers to a CLI or GUI interface. Statement CLI (✓) GUI (✓) The user is in direct communication with the computer The user is limited to the icons shown on the screen The user needs to learn a number of commands to carry out any operation Commands need to be typed in using the correct format and spelling There is no need for the user to learn any commands to use the interface The interface needs a complex operating system, such as Windows, to operate, which uses considerable amounts of memory 318496_04_IGCSE_OLCSSW_060-070.indd Page 62 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 64. 63 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 4 Software 5 Explain the function of each of the following in an operating system. a Multitasking management ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Management of user accounts ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. c Security management ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_04_IGCSE_OLCSSW_060-070.indd Page 63 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 65. 64 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 4 Software 6 a i Explain what is meant by an interrupt. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ii Give three examples of what can cause an interrupt. 1   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... b i Explain what is meant by a buffer. ....................................................................................................................................................................... ....................................................................................................................................................................... ii Explain why buffers are needed. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_04_IGCSE_OLCSSW_060-070.indd Page 64 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 66. 65 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 4 Software c The flowchart shows the use of interrupts and buffers when printing out a document. Some of the boxes in the flowchart are blank. Use each of the following statements to complete the flowchart. In each case, only write the number of the correct statement in the appropriate box. 1 Meanwhile, the processor is able to carry out other tasks while the (printer) buffer is being emptied. 2 Has all the data been sent to the printer? 3 The current task is suspended while the interrupt is serviced. 4 The contents of the (printer) buffer are emptied to the printer and the data from the document is printed. 5 When all the data has been printed, the (printer) buffer becomes empty; an interrupt signal is then sent to the processor requesting its attention. 6 Data from the document to be printed is sent to the (printer) buffer from the computer memory. Yes Yes No No The processor continues with its tasks This interrupt signal is then transmitted, requesting more data to be sent to the printer Any data to send to printer? 318496_04_IGCSE_OLCSSW_060-070.indd Page 65 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 67. 66 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 4 Software 7 Memory management, security management and hardware management are three functions of an operating system. The following table shows eight statements. By ticking (✓) the appropriate box, indicate which statements refer to memory, security or hardware management. Management type Statement Memory (✓) Security (✓) Hardware (✓) Keeps a track of all memory locations Ensures that anti-virus software is regularly updated Prevents competing applications using the same memory locations at the same time Ensures that the appropriate device driver takes data from memory/file and translates it into a format the device can understand Management of devices to control the use of queues and buffers holding data temporarily Receives and handles error messages and interrupts from devices connected to the computer Manages RAM and allows data to be moved between RAM and devices, such as HDD or SSD Maintains access rights for all users of a computer system 8 a Explain the function of a device driver. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Explain the use of descriptors in a device driver. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_04_IGCSE_OLCSSW_060-070.indd Page 66 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 68. 67 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 4 Software c Explain the role of a descriptor when a new device is plugged into a USB port of a computer for the first time. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 9 a State what is meant by firmware. ............................................................................................................................................................................. b Give two examples of firmware used in computer devices. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 10 a State three benefits of writing a program in a high-level programming language. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... b Explain why a programmer would choose to write a program in a low-level programming language. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_04_IGCSE_OLCSSW_060-070.indd Page 67 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 69. 68 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 4 Software c Steve is writing a program to use his laptop to control the lighting system in his house. State, with reasons, which type of programming language would be most suitable for him to use. Type of language: ������������������������������������������������������������������������������������������������������������������������������������������� Reasons: ����������������������������������������������������������������������������������������������������������������������������������������������������������� ............................................................................................................................................................................. ............................................................................................................................................................................. 11 Use the following list of words and phrases to complete the paragraph below. Each word or phrase can be used once, more than once or not at all. assembler compilers high-level interpreters language machine code programmer programs translates translators Programs written in a low-level .................................... are translated into .................................... by an .......... .......................... before they can be run on a computer. Programs written in a .................................... .................................... are also translated into .................................... before they can be run on a computer. There are two types of .................................... for .................................... languages .................................... and .................................... . 12 a Describe the purpose of a compiler. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Describe the purpose of an interpreter. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_04_IGCSE_OLCSSW_060-070.indd Page 68 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 70. 69 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 4 Software c Describe the purpose of an assembler. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 13 A program is being developed in a high-level language. Both a compiler and an interpreter are being used for translation. a i State when it is appropriate to use the compiler. ........................................................................................................................................................................ ........................................................................................................................................................................ ii State when it is appropriate to use the interpreter. ........................................................................................................................................................................ ........................................................................................................................................................................ b State two advantages of using an interpreter. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... c State two advantages of using a compiler. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 318496_04_IGCSE_OLCSSW_060-070.indd Page 69 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 71. 70 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 4 Software 14 a Describe the purpose of an IDE. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Error diagnostics is a feature of an IDE. Identify three other features of an IDE. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... c State the purpose of error diagnostics in an IDE. Give an example of its use. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_04_IGCSE_OLCSSW_060-070.indd Page 70 31/03/21 2:03 PM sw-103 /130/HO01894/work/indd
  • 72. 71 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 1 a Explain the fundamental differences between the internet and the world wide web (www). ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. A user typed in: https://www.hoddereducation.com/comp_science_sample Identify: i the protocol being used: ������������������������������������������������������������������������������������������������������������������������� ii the domain host: �������������������������������������������������������������������������������������������������������������������������������������� iii the domain type: �������������������������������������������������������������������������������������������������������������������������������������� iv the file name: �������������������������������������������������������������������������������������������������������������������������������������������� c Describe three of the features of web browsers. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... The internet and cyber security 5 318496_05_IGCSE_OLCSSW_071-083.indd Page 71 31/03/21 2:05 PM sw-103 /130/HO01894/work/indd
  • 73. 5 The internet and cyber security 72 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 2 A user wishes to locate a website so they can download some documents. The following sequence shows six steps in the location of the website and the download of the required documents. However, the sequence of steps shown is not in the correct order. By writing the numbers 1 to 6, put each step in its correct order. Order Description of step The DNS server 1 cannot find the required website in its database or cache and sends out a request to DNS server 2 The IP address is then sent back to the user’s computer The computer now sets up a communication with the website server and the required pages are downloaded User opens their web browser and types in the URL; the web browser asks DNS server 1 for the IP address User’s browser interprets HTML and displays the web pages on the user’s computer DNS server 2 finds the URL and sends the IP address back to DNS server 1 which puts the IP address and URL into its database and cache 3 a Explain what is meant by a session cookie. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Explain what is meant by a persistent cookie. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_05_IGCSE_OLCSSW_071-083.indd Page 72 31/03/21 2:05 PM sw-103 /130/HO01894/work/indd
  • 74. 5 The internet and cyber security 73 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited c Give three uses of cookies. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... 4 a Indicate whether the following six statements about blockchaining are true or false by placing a tick (✓) in the correct box. Blockchaining statement True (✓) False (✓) All digital currency systems use blockchaining Blockchaining uses a decentralised database The last block in a blockchain is known as the 'genesis block' New hash values are only generated when data in a block is altered Tampering of data in a block by a hacker would cause the hash value to change Blocks are 'policed' by network users called 'miners' b When a new transaction in cryptocurrency takes place, a new block is created. Name three values that would be created for this new block. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... 318496_05_IGCSE_OLCSSW_071-083.indd Page 73 31/03/21 2:05 PM sw-103 /130/HO01894/work/indd
  • 75. 5 The internet and cyber security 74 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook c A blockchain has six blocks. i Complete the diagram below to show how the six blocks are connected to form a blockchain network. Use arrows to show any hash value links. 1 A4BF 2 6AB1 3 34EE 4 FF12 5 AA00 6 BBB1 Hash value of block Connection hash values ii Describe what happens if block '4' was hacked and the hash value was changed to DD22. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... d Explain the difference between digital currency and cryptocurrency. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_05_IGCSE_OLCSSW_071-083.indd Page 74 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 76. 5 The internet and cyber security 75 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 5 Eight security terms are shown on the left and eight descriptions are shown on the right in the following diagram. Draw lines to connect each security term to its correct description. Brute force attack Virus Denial of service attack Hacking Worm Phishing Pharming Social engineering Legitimate-looking emails sent out to users; once a link is clicked on, the user’s web browser is sent to a fake website Attempt at preventing users from accessing a website by flooding it with useless spam traffic which causes the website to become overloaded A process that attempts to crack a password by systematically trying out all combinations of letters, numbers and symbols to find the password When a cybercriminal creates a situation that can lead to a potential victim dropping their guard and getting them to break normal security procedures Malicious code installed on a user’s computer or on a website; code redirects user’s browser to a fake website without user’s knowledge Program code that replicates with the intention of deleting or corrupting files; they need an active host to initiate the attack Malware that self-replicates; they do not need to target an active host program to initiate an attack Act of gaining illegal access to a computer system without the owner’s permission or knowledge 6 a Explain what is meant by the following three types of malware. i Trojan horse: ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� 318496_05_IGCSE_OLCSSW_071-083.indd Page 75 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 77. 5 The internet and cyber security 76 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook ii Adware: ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� iii Ransomware: ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� b i Explain what is meant by social engineering. ....................................................................................................................................................................... ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_05_IGCSE_OLCSSW_071-083.indd Page 76 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 78. 5 The internet and cyber security 77 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited ii The following table contains four methods used by social engineering to target a victim. Complete the table by describing how each method is used. Include examples in your description. Threat used by cybercriminals How the threat is used (include examples) Instant messaging ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... Scareware ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... Baiting ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... Phone calls ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... ...................................................................................................................................... 318496_05_IGCSE_OLCSSW_071-083.indd Page 77 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 79. 5 The internet and cyber security 78 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook c Describe the steps taken by a cybercriminal when targeting their victim through social engineering. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 7 a i Explain what is meant by anti-spyware. ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ii Give three of the features of typical anti-spyware software. 1 ����������������������������������������������������������������������������������������������������������������������������������������������������������������� ����������������������������������������������������������������������������������������������������������������������������������������������������������������� ����������������������������������������������������������������������������������������������������������������������������������������������������������������� ����������������������������������������������������������������������������������������������������������������������������������������������������������������� 2 ����������������������������������������������������������������������������������������������������������������������������������������������������������������� ����������������������������������������������������������������������������������������������������������������������������������������������������������������� ����������������������������������������������������������������������������������������������������������������������������������������������������������������� ����������������������������������������������������������������������������������������������������������������������������������������������������������������� 3 ����������������������������������������������������������������������������������������������������������������������������������������������������������������� ����������������������������������������������������������������������������������������������������������������������������������������������������������������� ����������������������������������������������������������������������������������������������������������������������������������������������������������������� ����������������������������������������������������������������������������������������������������������������������������������������������������������������� 318496_05_IGCSE_OLCSSW_071-083.indd Page 78 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 80. 5 The internet and cyber security 79 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited b Complete the table below to show the benefits and drawbacks of the three named biometric techniques. Biometric technique Benefits Drawbacks Fingerprint or thumbprint scans ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... Retina scans ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... Voice recognition ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... ................................................................... 318496_05_IGCSE_OLCSSW_071-083.indd Page 79 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 81. 5 The internet and cyber security 80 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook c The diagram shows the use of voice control in a car. A microphone picks up the voice of the driver and carries out their commands. For added security, the system only responds to people authorised to drive the car. Explain how the microphone and microprocessor are used to control the following functions using verbal input from the driver: – operation of the satellite navigation system – media (radio, streaming and telephone) – security (window and door control). Microphone ADC ADC Microprocessor and voice control software Sat nav system Media ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_05_IGCSE_OLCSSW_071-083.indd Page 80 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 82. 5 The internet and cyber security 81 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 8 a Brayan uses two-step verification when buying items from a website using his tablet. There are six stages in the two-step verification process. The stages are listed in the table below, but they are not written in the correct order. By writing the numbers 1 to 6, put each of the stages in their correct order. Order of stage Description of stage User takes note of the one-time authentication code (OTP) User enters the one-time authentication code into the tablet logged on to website User enters their website username and password on the tablet User is authenticated and allowed access to the website to make a purchase One-time authentication code is sent to user’s registered smartphone Brayan registers his smartphone number on the website before using it to purchase any goods b Explain the benefits to a user of allowing automatic updates to software on, for example, a smartphone. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 9 One of the ways of checking the authenticity of emails and website links is to look out for spelling mistakes in the URL. Describe four other ways that can be used to identify potential fake emails and URL links. Include examples wherever possible in your answer. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. 318496_05_IGCSE_OLCSSW_071-083.indd Page 81 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 83. 5 The internet and cyber security 82 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. .................................................................................................................................................................................. 10 a Explain what is meant by SSL. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b The table below shows what happens when a user wants to access a secure website and receive and send data. The statements are not in the correct order. By writing the numbers 1 to 5, put each statement in its correct order. Correct order Statements The web browser then requests that the web server identifies itself If the web browser can authenticate the SSL certificate, it sends a message back to the web server to allow communication to begin The user’s web browser sends a message requesting a connection with the required website which is secured by SSL encryption Once the message is received, the web server acknowledges the web browser, and the SSL-encrypted two-way data transfer can begin The web server responds by sending a copy of its SSL certificate to the users web browser c Give three examples of where SSL would be used. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... 318496_05_IGCSE_OLCSSW_071-083.indd Page 82 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 84. 5 The internet and cyber security 83 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 11 a Explain why firewalls are used. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b Give four of the tasks carried out by a firewall. 1   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   ....................................................................................................................................................................... 4   .......................................................................................................................................................................   ....................................................................................................................................................................... 318496_05_IGCSE_OLCSSW_071-083.indd Page 83 31/03/21 2:06 PM sw-103 /130/HO01894/work/indd
  • 85. 84 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 1 Use the following set of words or phrases to complete the paragraph below. Each word or phrase can be used once, more than once or not at all. » attributes » conclusions » database » dialogue boxes » expert system » explanation system » inference » inference engine » inference rules » knowledge base » objects » repository » rules base » search engine » user interface ................................... are a form of AI developed to mimic human knowledge and reasoning. They use knowledge and ................................... to solve problems where a degree of human expertise would be needed. Expert systems interact with the user by way of a ................................... through ............................ and command prompts. Once a conclusion is found, the ................................... can be used to inform the user of the reasoning behind the conclusion. The main processing element of an expert system is the ..................................., which behaves like a search engine examining the ................................... for data that matches the queries. The ................................... is the problem-solving component which makes use of ................................... stored in the .................................. . The knowledge base is a collection of ................................... and their associated ...................................; it is often referred to as a ................................... of facts. 2 Eight descriptions and ten computer terms are shown in the diagram below. Draw lines to connect each description to the correct computer term. Devices that can move between point 'A' and point 'B' without the need for manual input A form of AI that has been developed to mimic human knowledge and expertise Robots that roam the internet, scanning websites and categorising them for search purposes Simulated intelligence in machines; building of machines capable of thinking like a human A repository of facts and expertise in the form of a collection of objects and their attributes Combination of software and hardware designed and programmed to work automatically without the need of any human interaction A subset of AI in which the algorithms are 'trained' and can learn from their past experience and from examples Branch of computer science that brings together the design, construction and operation of 'intelligent' electromechanical machines Rules base Knowledge base Autonomous Chat bot Artificial intelligence Expert system Robotics Machine learning Automated system Web crawler Automated and emerging technologies 6 318496_06_IGCSE_OLCSSW_084-096.indd Page 84 31/03/21 2:07 PM sw-103 /130/HO01894/work/indd
  • 86. 6 Automated and emerging technologies 85 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 3 Many examples of automated systems exist. a Define what is meant by an automated system. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. b One part of the automated system involves the use of sensors. Explain what a sensor is. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. c Name three areas where automated systems are used. 1   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... 2   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... 3   .......................................................................................................................................................................   .......................................................................................................................................................................   ....................................................................................................................................................................... 318496_06_IGCSE_OLCSSW_084-096.indd Page 85 31/03/21 2:07 PM sw-103 /130/HO01894/work/indd
  • 87. 6 Automated and emerging technologies 86 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook d Give three general advantages of using automated systems. 1.......................................................................................................................................................................... .......................................................................................................................................................................... .......................................................................................................................................................................... 2.......................................................................................................................................................................... .......................................................................................................................................................................... .......................................................................................................................................................................... 3.......................................................................................................................................................................... .......................................................................................................................................................................... .......................................................................................................................................................................... e Give three general disadvantages of using automated systems. 1.......................................................................................................................................................................... .......................................................................................................................................................................... .......................................................................................................................................................................... 2.......................................................................................................................................................................... .......................................................................................................................................................................... .......................................................................................................................................................................... 3.......................................................................................................................................................................... .......................................................................................................................................................................... .......................................................................................................................................................................... 318496_06_IGCSE_OLCSSW_084-096.indd Page 86 31/03/21 2:07 PM sw-103 /130/HO01894/work/indd
  • 88. 6 Automated and emerging technologies 87 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 4 An example of an automated system is the control of the entry and exit to a private car park. Cameras take a photograph of a car’s number plate on entry which is then checked before the barrier is raised. At the exit, another camera captures the car’s number plate, which is again checked before raising the barrier. Private car park Camera Barrier Camera Barrier a Name the software that is needed to convert the camera image of the car’s number plate into an electronic format that can be used in, for example, a database. ............................................................................................................................................................................. b Describe how sensors, cameras, actuators and a computer system can be used to control entry to and exit from the car park. Your answer should include how a car number plate meets the criteria for entry and any other security or safety aspects. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_06_IGCSE_OLCSSW_084-096.indd Page 87 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
  • 89. 6 Automated and emerging technologies 88 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook c i Describe the advantages of using an automated system to control entry and exit to the car park. ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ii One disadvantage is the possibility of illegal copying of number plates to 'fool' the system and allow unauthorised access to the car park. Discuss how you might think this problem could be overcome. ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ ................................................................................................................................................................................ 5 a A car is equipped with self-parking technology. Explain the role of the following devices in the self-parking technology: i cameras: ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� ii sensors: ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� iii actuators: ���������������������������������������������������������������������������������������������������������������������������������������������������������������������� 318496_06_IGCSE_OLCSSW_084-096.indd Page 88 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
  • 90. 6 Automated and emerging technologies 89 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited b Describe how embedded systems in a car prevent the driver exceeding a set speed and also prevent the car getting too close to the vehicle in front of it. Include the role of the microprocessor and any named sensors in your answer. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_06_IGCSE_OLCSSW_084-096.indd Page 89 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
  • 91. 6 Automated and emerging technologies 90 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook 6 a Name suitable sensors for each of the following automated systems. Describe the function of your named sensor in each case. Description of automated system Suitable sensor(s) Function of named sensors Manufacture of a new vaccine which requires the mixing of four liquids in the ratio 1:2:3:4 as a single batch. The four liquids must be totally mixed and the temperature must be maintained at 35°C, which is critical to the process. When fully mixed, the solution turns an even yellow colour. ......................................... ......................................... ......................................... ......................................... ......................................... ......................................... .................................................................... .................................................................... .................................................................... .................................................................... .................................................................... .................................................................... A lighting display has been set up in one room of an art gallery (as part of the exhibition). A random sequence of different coloured LED lights is under microprocessor control. The display only switches on when visitors walk into the room; at the same time, the room lights are dimmed to give the lighting display its most dramatic effect. ......................................... ......................................... ......................................... ......................................... ......................................... ......................................... .................................................................... .................................................................... .................................................................... .................................................................... .................................................................... .................................................................... A train uses automatic twin- doors. Both doors open automatically when the train stops. Both doors close again when no-one is still boarding or leaving the train. The doors have a safety mechanism so that a passenger cannot become trapped between the two closing doors. The train can only move off when every door on the train has been safely closed. ......................................... ......................................... ......................................... ......................................... ......................................... ......................................... .................................................................. .................................................................. .................................................................. .................................................................. .................................................................. .................................................................. 318496_06_IGCSE_OLCSSW_084-096.indd Page 90 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
  • 92. 6 Automated and emerging technologies 91 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited b The eight statements on the left-hand side of the following table are either true or false. Tick (✓) the appropriate box to indicate which statements are true and which are false. Statements True (✓) False (✓) Automated systems lead to less consistent results or less consistent products Automated systems are more expensive to set up than traditional manual systems Automated systems could be quickly overwhelmed by the amount of data presented to them Automated systems are inherently less safe than manual systems Automated systems generally require enhanced maintenance when compared to manual systems Automated systems allow processes to run at optimum conditions at all times Software failures, due to unforeseen conditions, are unlikely to impact on an automated system Automated systems will react more quickly to unusual process conditions than a manual system 7 a Complete the diagram of an expert system. 1 ������������������������������������������������������������������������������������������������������������������������������������������������������������������������ 2 ������������������������������������������������������������������������������������������������������������������������������������������������������������������������ 3 ������������������������������������������������������������������������������������������������������������������������������������������������������������������������ b A section of a knowledge base is shown below. Attribute 1 Attribute 2 Attribute 3 Attribute 4 Bus Hybrid electric/petrol engine Uses a road Has 4 wheels Up to 80 passengers Train Electric motors Uses rails Has 40 wheels Up to 400 passengers Taxi cab Diesel engine Uses a road Has 4 wheels Up to 4 passengers i What is the correct expert system name for the items in column 1? ....................................................................................................................................................................... Explanation system Rules base 1 2 3 318496_06_IGCSE_OLCSSW_084-096.indd Page 91 02/04/21 11:57 AM sw-103 /130/HO01894/work/indd
  • 93. 6 Automated and emerging technologies 92 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook ii The following set of questions was asked by the expert system. The user’s answers to each question are shown. Using the knowledge base section shown above, what would be the expected output? Expert system question User response Does it have a hybrid engine? NO Does it use a road? YES Does it have four wheels? YES Can it take more than 5 passengers? NO ....................................................................................................................................................................... c Describe the steps in setting up an expert system. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 8 a Explain what is meant by the following terms: i artificial intelligence (AI): ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... 318496_06_IGCSE_OLCSSW_084-096.indd Page 92 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
  • 94. 6 Automated and emerging technologies 93 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited ii machine learning: ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... ....................................................................................................................................................................... b Describe the differences between AI and machine learning. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 9 a Which one of the following is NOT a component of an expert system? Circle the correct answer. A an inference engine B rules base C accelerometer D knowledge base E user interface b The practice of getting a machine to make decisions without being programmed to do so, via data acquisition, is a feature of: A robotics B a search engine C an inference engine D an automated system E machine learning Circle the correct answer. 318496_06_IGCSE_OLCSSW_084-096.indd Page 93 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
  • 95. 6 Automated and emerging technologies 94 Photocopying prohibited Cambridge IGCSE and O Level Computer Science Computer Systems Workbook c The combination of software and hardware designed and programmed to work automatically without the need for human interaction is known as: A a chatbot B an automated system C an expert system D machine learning E robotics Circle the correct answer. d The branch of computer science that brings together the design, construction and operation of electromechanical devices is known as: A robotics B control technology C computer programming D automated systems E electronics Circle the correct answer. e Which one of the following is NOT an advantage to the management of using robots in an industrial application? Circle the correct answer. A they can work 24/7 without the need for breaks or holidays B their work is more consistent C they lead to higher productivity D they can cause deskilling of the workforce E they are less likely to make errors 318496_06_IGCSE_OLCSSW_084-096.indd Page 94 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
  • 96. 6 Automated and emerging technologies 95 Cambridge IGCSE and O Level Computer Science Computer Systems Workbook Photocopying prohibited 10 Autonomous vehicles are becoming increasingly common. Discuss the advantages and disadvantages of: » autonomous trains » autonomous cars and buses ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. ............................................................................................................................................................................. 318496_06_IGCSE_OLCSSW_084-096.indd Page 95 31/03/21 2:08 PM sw-103 /130/HO01894/work/indd
  • 97. Develop understanding of computer systems, the internet and emerging technologies with further questions and activities. This Workbook provides additional support for the computer systems section of Cambridge IGCSE™ and O Level Computer Science Student’s Book Second Edition. » Become accomplished computer scientists: the workbook provides a series of questions designed to test and develop knowledge of how computer systems and associated technologies work. » Develop understanding and build confidence: provides additional practice for use at home or in class throughout the course. Use with Cambridge IGCSE™ and O Level Computer Science Student’s Book Second Edition 9781398318281 This resource is endorsed by Cambridge Assessment International Education ✓ Provides learner support for the Cambridge IGCSE, IGCSE (9-1) and O Level Computer Science syllabuses (0478/0984/2210) for examination from 2023 ✓ Has passed Cambridge International’s rigorous quality-assurance process ✓ Developed by subject experts ✓ For Cambridge schools worldwide For over 25 years we have been trusted by Cambridge schools around the world to provide quality support for teaching and learning. For this reason we have been selected by Cambridge Assessment International Education as an official publisher of endorsed material for their syllabuses. 25 YEARS W orking for over C a m b r i d g e A s s essment Internati o n a l E d u c a t i o n WITH 318496 IGCSE and O Level Computer Science WB CV.indd 2 318496 IGCSE and O Level Computer Science WB CV.indd 2 07/04/2021 16:31 07/04/2021 16:31