Computer science

Cambridge IGCSE Computer Science Coursebook Textbook Questions And Answers

US$14.99 US$24.00

b Chapter: 5 -Problem: 10 /b Explain how a 3D scanner works. Give an example in your answer. brbAnswer Preview/b: It works like this: a 3D scanner takes multiple snapshots of an object . The sho… brbr,b Chapter: 6 -Problem: 1 /b Define the term s

Description

Chapter: 5 -Problem: 10 >> Explain how a 3D scanner works. Give an example in your answer.
Answer Preview: It works like this: a 3D scanner takes multiple snapshots of an object . The sho…

, Chapter: 6 -Problem: 1 >> Define the term 'sensor'.
Answer Preview: In the broadest definition, a sensor is a device, module, machine, or subsystem whose …

, Chapter: 12 -Problem: 4 >> Design a pseudocode algorithm that will calculate the area and perimeter of a triangle. The user must choose which answer they want to be output.
Answer Preview: Laser printers are often used for corporate, school, and other environments that require print j…

, Chapter: 2 -Problem: 2 >> Describe two advantages of serial data transmission.
Answer Preview: Following are the benefits or advantages of Serial Inte…

, Chapter: 7 -Problem: 6 >> Discuss how and why 3D printing may become a more common technology in the home.
Answer Preview: Raw materials for 3D printing will become more uniform and …

, Chapter: 9 -Problem: 1 >> What is meant by data losing its value?
Answer Preview: Data loss occurs when valuable or sensitive informati…

, Chapter: 4 -Problem: 1 >> Describe the role of a logic gate in a logic circuit.
Answer Preview: A logic gate is an idealized model of computation or physica…

, Chapter: 8 -Problem: 2 >> Describe three ways in which RAM differs from ROM.
Answer Preview: RAM which stands for Random Access Memory , and ROM , which stands for Read Only Memory , are both p…

, Chapter: 6 -Problem: 3 >> Explain two drawbacks of using motion sensors in a security system and suggest how they could be overcome.
Answer Preview: Radio frequency at high power is harmful for humans (active type) . R…

, Chapter: 14 -Problem: 7 >> Why can unreliable data be of concern to a database user?
Answer Preview: Unreliable data is to be a concern for database user…

, Chapter: 8 -Problem: 6 >> A 16-bit Colour image is 4 inches x 1 inch in size, with a resolution of 600 dots per inch. Calculate the storage requirements for this image.
Answer Preview: This classification has seven major elements. They are: platform and mana…

, Chapter: 10 -Problem: 4 >> Explain how malware can be distributed using electronic communications.
Answer Preview: Typically, malware is distributed in one of three methods: by e-mail, either through a virus-laden a…

, Chapter: 12 -Problem: 2 >> Explain why flowcharts are a useful design tool.
Answer Preview: Flow charts are an important tool for the improvemen…

, Chapter: 9 -Problem: 6 >> Describe how a proxy server can help keep data safe.
Answer Preview: Proxy servers act as a firewall and web filter, provide …

, Chapter: 6 -Problem: 6 >> Describe how a light sensor is used to read a barcode.
Answer Preview: All barcode readers use a light source and sensors to detect …

, Chapter: 9 -Problem: 3 >> Explain how phishing and pharming trick a user into giving up personal data.
Answer Preview: What is a phishing attack. Phishing is a type of social engineering attack often used to ste…

, Chapter: 9 -Problem: 5 >> Explain why computer security is more effective when anti-virus software and firewalls are used.
Answer Preview: While antivirus software helps to protect the file syst…

, Chapter: 11 -Problem: 4 >> Explain why sequence is important when creating a program.
Answer Preview: Sequences are the main logical structure of algorithms or prog…

, Chapter: 4 -Problem: 2 >> Consider the following logic circuit: a. Write the logic statement to represent this logic gate.b. When A = 0, B = 0 and C = 1, output X= ……..c. When A = 1, B = 0 and C = 1, output X= ……… Transcribed Image Text: A T.
Answer Preview: Consider the given circuit diagram. We can see AND, OR and NOT gates. a. As we know the output of this circuit is X. As we can see that AND gate has t…

, Chapter: 5 -Problem: 5 >> Explain how a touch screen device recognises that the screen is being touched.
Answer Preview: When a finger touches the screen, some of the electric…

, Chapter: 2 -Problem: 3 >> Draw a tine to match the error detection and correction terms to the correct definitions: Transcribed Image Text: The number of bits transmitted are added up and this calculation is transmitted with the data Check digit Al or a0 is added as an extra bit to make the sum of the bits in a Parity check
Answer Preview: Definitions. Error detection is the detection of errors caused by noise or other i…

, Chapter: 12 -Problem: 1 >> Explain why comments should be used in pseudocode.
Answer Preview: Comments are readable explanat…

, Chapter: 10 -Problem: 1 >> Define the term 'computer ethics.
Answer Preview: COMPUTER ETHICS is a set of principles set out to regulate the use of computers. Three factors are considered: INTELLECTUAL PROPERTY RIGHTS this cover…

, Chapter: 7 -Problem: 5 >> Explain what is meant by the resolution of a display.
Answer Preview: A term that refers to the number of pixels on a display o…

, Chapter: 1 -Problem: 5 >> Tom wants to send an image by email to his friend Nadia. He needs to reduce the size of the image in order to be able to send it via email. Describe two methods he could use to do this.
Answer Preview: 1)Tom should use lossy compre…

, Chapter: 1 -Problem: 3 >> The following instruction, written in machine code, is stored in computer memory: 110000011110 Convert the code into hexadecimal notation.
Answer Preview: The instruction 110000011110 in binary can be converted to hexadecimal by grouping …

, Chapter: 2 -Problem: 7 >> Describe the difference between a static IP and a dynamic IP.
Answer Preview: What is the difference between a dynamic and stati…

, Chapter: 2 -Problem: 5 >> Sarni wants to access a website that sells his favourite records. Explain how San will do this.
Answer Preview: First of all he should ensur…

, Chapter: 9 -Problem: 7 >> Explain the difference between symmetric and asymmetric encryption.
Answer Preview: The basic difference between these two types of encryption …

, Chapter: 12 -Problem: 6 >> Design a flowchart algorithm for a simple drinks machine. The user can choose from tea, coffee, hot chocolate, orange juice and apple juice. if the user inputs a drink that is not listed an error message should be displayed.
Answer Preview: Impact printers are most functional in specialized environments where low-c…

, Chapter: 6 -Problem: 5 >> Describe how an infrared sensor works.
Answer Preview: Active infrared sensors work with radar technology and t…

, Chapter: 11 -Problem: 7 >> When creating an array, what are the two main things that we need to do?
Answer Preview: Must ensure that each column cont…

, Chapter: 8 -Problem: 5 >> A company sends out an electronic catalogue its customers. Suggest a suitable storage medium and justify your choice with reasons.
Answer Preview: Google develops the Android mobile operating system , as well as its smartwatch, telev…

, Chapter: 11 -Problem: 5 >> State one reason why a programmer would use an array.
Answer Preview: Arrays a…

, Chapter: 10 -Problem: 2 >> Explain why ethics are necessary when using computers.
Answer Preview: Ethics is the most necessary thing while using a computer. PCs and LPs are that have personal in…

, Chapter: 5 -Problem: 2 >> Explain what is meant by an input device.
Answer Preview: In computing, an input device is a peripheral (piece of …

, Chapter: 11 -Problem: 6 >> A teacher wants to create a program that will allow them to write exam scores for a class to an array. There are 15 students in the class. Write a suitable pseudocode solution that will allow the teacher to do this.
Answer Preview: Inkjet Printers use a special type of ink for print…

, Chapter: 3 -Problem: 4 >> Describe three functions of an operating system.
Answer Preview: An operating system has three main functions: (1) …

, Chapter: 3 -Problem: 6 >> Explain the difference between a compiler and an interpreter.
Answer Preview: The difference between an interpreted and a compiled language lies in the result of the process …

, Chapter: 12 -Problem: 7 >> Amy has been asked to design an algorithm for a very large program. which design tool, pseudocode or flowchart, do you think would be most suitable? Explain your answer.
Answer Preview: Although printers provide us various interfaces fo…

, Chapter: 5 -Problem: 6 >> Explain why, when using a microphone, an analogue-to-digital converter is also needed when inputting data.
Answer Preview: This need to convert analog data into its digital equivalent stems from the fact that our compu…

, Chapter: 13 -Problem: 6 >> Why is it important to use test data? Use examples in your answer.
Answer Preview: Test Data helps the developers to find the problem durin…

,

, Chapter: 11 -Problem: 3 >> A teacher wants to work out the average test score for a class. They want to count and total the number of marks they enter to calculate the average.a. Explain how they would do this.b. The teacher wants to enter marks till they have no more marks to enter.They do not currently know how many marks they will need to enter. Which loop structure would they use to repeat the process of entering marks
Answer Preview: Laser printers use toner powder instead of dye or pigm…

, Chapter: 7 -Problem: 3 >> Explain why printers do not print in RGB.
Answer Preview: To understand why printers generally don't use RGB, …

, Chapter: 8 -Problem: 4 >> What enables a Blu-ray disk to hold more data than a compact disk?
Answer Preview: As we have the Blu Ray Disc is derived from the digital optical storage format and …

, Chapter: 13 -Problem: 2 >> Seema wishes to design an algorithm using a flowchart. Discuss the possible benefits and drawbacks of using a flowchart to design her algorithm.
Answer Preview: Flowcharts are way easier to understand than algorithms as they are represented in pictorial fo…

, Chapter: 2 -Problem: 8 >> Why can the use of cookies raise concern for an internet user?
Answer Preview: HTTP cookies are essential to the modern Internet but a vulnerability to yo…

, Chapter: 8 -Problem: 1 >> Explain the difference between primary storage and secondary storage.
Answer Preview: Difference between Primary Storage and Secondary storage: Primary Storage -It is like main memo…

, Chapter: 14 -Problem: 5 >> Bosire has a simple flat file database. Its table has two fields: name and telephone number.a. Explain why neither field is suitable as a primary key. What field could be added to create a primary key?b. Why might a user choose to create a flat file database rather than a relational database?
Answer Preview: The Facebook application is a software product , it's an app. You can log into it onlin…

, Chapter: 14 -Problem: 3 >> Match the correct term with its definition: Transcribed Image Text: A structure in which data is stored in a database Field Query A unique identifier for a record A collection of data about one single item in a database Record One piece of data about an item in a database Table Primary Key A method
Answer Preview: 1. Field: A collection of data about one single item in …

, Chapter: 3 -Problem: 3 >> Draw a line from each term to its correct definition: Transcribed Image Text: Connection between components in the CPU along which information travels Control unit Arithmetic and logic unit Unit that manages the flow of data through the CPU Register in which values are stored to have calculations ca
Answer Preview: control unit - unit that manages flow of data through the CPU. …

, Chapter: 3 -Problem: 2 >> Define the term 'register'.
Answer Preview: 1 : a written record containing regular entries of items or details . 2a : a book or system of pu…

, Chapter: 13 -Problem: 1 >> Describe what is meant by a library routine and suggest reasons why using such a routine is of benefit to a programmer.
Answer Preview: Library routine - a debugged routine that is maint…

, Chapter: 9 -Problem: 8 >> Describe what a protocol is and how protocols help protect data.
Answer Preview: Security Protocols naming cryptographic or encryption protocol help protect se…

, Chapter: 10 -Problem: 5 >> Explain why it might be unethical to use an image taken from the internet in a commercial website.
Answer Preview: One image stolen is too many. Infringement comes at a high p…

, Chapter: 5 -Problem: 8 >> Describe how an interactive whiteboard could be used to help train staff in a company.
Answer Preview: Here are five ways interactive whiteboard collaboration can improve workflow in businesses…

, Chapter: 6 -Problem: 4 >> Explain how the use of moisture sensors can improve farming.
Answer Preview: A soil moisture sensor is a device that measures current soil moisture. Sensors integr…

, Chapter: 11 -Problem: 2 >> A programmer would like to store the following data:a. The user's nameb. The user's agec. The user's genderd. The user's quiz score.Give the most suitable data type for each item of data they want to store.
Answer Preview: Impact printers are printers which works by creating a direct contact between ink ribbon and …

, Chapter: 4 -Problem: 4 >> The following truth table is for the logic statement X = A XOR (B AND C).Fill in the missing values to complete the truth table. Transcribed Image Text: Input Output B 1. 1 1.
Answer Preview: Given the logic statemet logic statement X = A XOR (B AND C). Here lets fill the inputs A, B and C s…

, Chapter: 1 -Problem: 2 >> What is meant by the term 'byte'?
Answer Preview: Byte, the basic unit of information in computer storage and …

,

, Chapter: 3 -Problem: 1 >> Describe the fetch-execute cycle carried out in the von Neumann architecture.
Answer Preview: The computer retrieves a software instruction from memo…

, Chapter: 1 -Problem: 1 >> A stopwatch uses six digits to display hours, minutes and seconds: 0     1:5       4:2       3It uses a nibble of binary data for each digit displayed on the stopwatch. What time is the stopwatch stopped at when the binary nibbles show the following values?                   0000 0010 : 0011 1000 : 0101 1001
Answer Preview: The time would be 02:38:59 on the stopwatch. Time s…

, Chapter: 13 -Problem: 5 >> Explain the difference between validation and verification.
Answer Preview: Validation is the process of checking whether the specif…

, Chapter: 1 -Problem: 7 >> Explain how ASCII is used to represent text so it can be processed by a computer.
Answer Preview: When any key on a keyboard is pressed, it needs to be con…

, Chapter: 8 -Problem: 7 >> Explain why data on a magnetic tape may be accessed quickly or slowly.
Answer Preview: Magnetic tapes can store up to one terabyte of uncompresse…

, Chapter: 5 -Problem: 1 >> Identify two input devices that could be present in a mobile phone.
Answer Preview: Keyboard one of the primary input devices used to i…

, Chapter: 7 -Problem: 4 >> Vikram wants a new printer to take to university. He will be printing mainly essays and reports. State which type of printer would be most suitable and say why.
Answer Preview: When it comes to professional printing processes th…

, Chapter: 9 -Problem: 2 >> Explain what is meant by an automatic backup.
Answer Preview: An automatic backup is a type of data …

, Chapter: 7 -Problem: 1 >> Explain what is meant by an output device.
Answer Preview: An output device is any piece of computer hardware equipmen…

, Chapter: 11 -Problem: 1 >> Explain the difference between a variable and a constant. Give an example of when you would use each.
Answer Preview: Difference between variable and constant- The variable value i…

, Chapter: 3 -Problem: 7 >> Describe the role of an assembler.
Answer Preview: An assembler is responsible for putting together parts or …

, Chapter: 8 -Problem: 8 >> Explain two reasons why solid-state storage is not as common in desktop PCs and laptops as hard disk drives.
Answer Preview: What are two disadvantages of using an SSD drive over a hard drive? D…

, Chapter: 2 -Problem: 1 >> Explain what is meant by bit rate.
Answer Preview: In telecommunications and computing, bit rate (bitrate or …

, Chapter: 14 -Problem: 1 >> Explain what a database is.
Answer Preview: A Database is an organized collection of structured information or data, typically stored ele…

, Chapter: 14 -Problem: 6 >> A database stores data in a table called Cars. The table structure includes fields called Colour, Engine Size and Number of Doors. Write an SQL query-by-example which searches for red or blue cars, with 5 doors and an engine size of more than 1600cc.
Answer Preview: System software is a type of computer program that is designed to run a computer's hardware an…

, Chapter: 14 -Problem: 2 >> Describe two advantages of using an electronic database over a paper-based system.
Answer Preview: The world generates an enormous amount of data from almost every aspect of life; school records, cre…

, Chapter: 14 -Problem: 4 >> Explain why it is important to give the correct data type to a field.
Answer Preview: Every table is made up of fields. The properties of a field describe the characteristics and behavio…

, Chapter: 3 -Problem: 5 >> Describe two advantages of high-level languages.
Answer Preview: The main advantage of high-level languages over low-level langu…

, Chapter: 13 -Problem: 3 >> Consider this algorithm: Complete the following trace table using the input data 4, 3,10,1, 0,15:  Transcribed Image Text: value 0 nextValue 0 INPUT value INPUT nextValue WHILE nextValuc!-0#!-means not IF nextValue > value# note indentation value = nextValue ENDIF INPUT nextValue ENDWHILE OUTPUT val
Answer Preview: following: VARIABLES: note all the variables in the piece of code you are looking at (this includes …

, Chapter: 5 -Problem: 3 >> Input devices can be either automatic or manual. Explain the difference between the two types. Give examples in your answer.
Answer Preview: A manual input device is something you operate yourself, so you could make a mistake manuall…

, Chapter: 1 -Problem: 8 >> Kamil and his band want to record the new track they have written. How could the quality of their sound recording on a computer be improved?
Answer Preview: So what do you choose for recording your audio? For pris…

, Chapter: 8 -Problem: 3 >> Explain how a hard disk drive reads and writes data.
Answer Preview: In a hard disk information / data is written on the rotating …

, Chapter: 6 -Problem: 2 >> Identify three different sensors that could be used to increase safety in a nuclear plant and describe how they would do this.
Answer Preview: They include distributed sensing (Rayleigh, Raman, Brillouin) for both temp…

, Chapter: 9 -Problem: 4 >> Explain how anti-virus software may help to prevent distributed denial of service attacks.
Answer Preview: Equip your network, applications, and infrastructure with multi-level protection st…

, Chapter: 3 -Problem: 8 >> Tick (?) which statements are true and false about low-level languages: Transcribed Image Text: Statement True False Low-level languages are a computer's native language Low-level languages need to be compiled before they can be processed Low-level languages are much easier for humans to understand
Answer Preview: ANSWER True True False True EXPLANATION Low-level langu…

, Chapter: 7 -Problem: 2 >> Explain why LCD screens are more suited to portable devices than CRTs.
Answer Preview: LCD monitors are a newer technology and have more demand s…

, Chapter: 2 -Problem: 6 >> The Rock Factory uses a CSS to store the formatting instructions for their website. Explain what the advantages are for doing this.
Answer Preview: Synonyms advantages and disadvantages. …

, Chapter: 10 -Problem: 3 >> If a company gave you a free version of their software and encouraged you to try and improve it and share it with the online community, what kind of software would this be?
Answer Preview: A list of some of the most well-known computer software examples includes: Operating systems (such …

, Chapter: 1 -Problem: 6 >> Tick (?) the most suitable file extension for the following tasks: Transcribed Image Text: jpg .mp4 -mp3 .csv Storing holiday photos Storing holiday videos Storing a favourite song Storing data to be imported into other files
Answer Preview: Below is the most common file extensions used with text …

, Chapter: 13 -Problem: 4 >> Explain the difference between a logic error and a syntax error.
Answer Preview: A syntax error is an error in the source code of a program. . A …

, Chapter: 4 -Problem: 5 >> In a system there are three switches and an alarm. The alarm will sound only if switches A and B are on. If switch C is turned on then the alarm will stop.a. Write the logic statement for this problem.b. Draw the logic circuit for this problem.c. Create a truth table for this problem.
Answer Preview: a. The logic statement for this problem can be written as: "Alarm sounds if s…

, Chapter: 12 -Problem: 3 >> What symbol is used in a flowchart to represent a decision?
Answer Preview: Different symbols were used to represent …

, Chapter: 5 -Problem: 7 >> Describe two benefits of using a digital camera over a film camera.
Answer Preview: Digital cameras are more convenient than film cameras, and since buying and developing film a…

, Chapter: 1 -Problem: 4 >> Explain why hexadecimal notation is sometimes used to represent binary numbers.
Answer Preview: Hexadecimal (or hex) is a base 16 system used to simplify ho…

, Chapter: 5 -Problem: 9 >> Describe how a barcode works and what data they usually store.
Answer Preview: In a nutshell, a barcode is a way to encode information into a visual pattern (those blac…

, Chapter: 5 -Problem: 4 >> Explain how a business could make use of QR codes.
Answer Preview: As it turns out, QR codes are still a valuable tool for market…

, Chapter: 2 -Problem: 4 >> Explain how anti-virus software protects a computer.
Answer Preview: An antivirus program protects a computer by monito…

Additional Information

Book:
Cambridge IGCSE Computer Science Coursebook
Isbn:
ISBN: 9781107518698
Edition:
1st Edition
Author:
Authors: Sarah Lawrey, Donald Scott
Image:
6131dda35faa1_2127.jpg

7 Reviews for Cambridge IGCSE Computer Science Coursebook Textbook Questions And Answers

Oscar Moody
Reliable and good work
William Maxwell
Thanks Homework_Soultion, You always do a GREAT Job.
Jordan Eaton
Excellent work!
Felicity Nelson
thank you
Abraham Hale

Add a review

Your Rating

85698

Character Limit 400