Computer science

Cambridge International AS & A Level Computer Science Textbook Questions And Answers

US$14.99 US$24.00

b Chapter: 9 -Problem: 3 /b Describe, using an example, the process of stepwise refinement. brbAnswer Preview/b: We use the term here mainly to describe the development of a met… brbr,b Chapter: 14 -Problem: 1 /b a Copy the diagram below and conn

Description

Chapter: 9 -Problem: 3 >> Describe, using an example, the process of stepwise refinement.
Answer Preview: We use the term here mainly to describe the development of a met…

, Chapter: 14 -Problem: 1 >> a) Copy the diagram below and connect each peer-to-peer term to its correct description.b) Copy and complete the diagram to show the layers in a TCP/IP protocol. c) Describe the protocols used when sending and receiving emails. Transcribed Image Text: Peer-to-peer term Description central server tha
Answer Preview: A Copy the diagram below and connect each peer-to-peer term to its correct ==> Nodes - These are individual devices on a peer-to-peer network that can communicate with each other directly. Peers - In …

, Chapter: 16 -Problem: 2 >> A computer operating system (OS) uses paging for memory management. In paging: – Main memory is divided into equal-size blocks, called page frames – Each process that is executed is divided into blocks of same size, called pages – Each process has a page table that is used to manage the pages of this process The following table is the incomplete page table for a process, Y.a) State two facts about
Answer Preview: a) Two facts about Page 5: Page 5 is a page of the process Y. The page table entry for Page 5 is inc…

, Chapter: 12 -Problem: 2 >> A 1D array, Product, of type STRING is used to store information about a range of products in a shop. There are 100 elements in the array. Each element stores one data item. The format of each data item is as follows: – ProductID is a four-character string of numerals – ProductName is a variable-length string The following pseudocode is an initial attempt at defining a procedure, ArraySort, which
Answer Preview: Line Number Error Correction 2 Temp should be declared as STRING, …

, Chapter: 1 -Problem: 5 >> a) Carry out 0.52 + 0.83 using binary-coded decimal (BCD). Show all of your working. b) i) Define the term hexadecimal. ii) Give two uses of the hexadecimal system. iii) Convert the following binary number into hexadecimal. 0 1 1 1 1 1 1 0 1 1 1 1 0 0 1 0
Answer Preview: a) To add 0 52 + 0 83 using binary-coded decimal (BCD), we first need to convert the decimal numbers …

, Chapter: 16 -Problem: 4 >> A number of processes are being executed in a computer. A process can be in one of these states: running, ready or blocked. a) For each of the following, the process is moved from the first state to the second state. Describe the conditions that cause each of the following changes of state of a process: i) From blocked to ready. ii) From running to ready. b) Explain why a process cannot move direc
Answer Preview: a) i) A process can move from the blocked state to the ready state when it is unblocked, for example …

, Chapter: 13 -Problem: 3 >> In a particular computer system, real numbers are stored using floating-point representation with: – 8 Bits for the mantissa – 8 Bits for the exponent – Two’s complement form for both mantissa and exponent. a) Calculate the floating-point representation of +3.5 in this system. Show your working.b) Calculate the floating-point representation of ?3.5 in this system. Show your working.
Answer Preview: a) 3 5 = 3 25 * 10^1 Mantissa: 3 25 = 0011 01 …

, Chapter: 14 -Problem: 4 >> a) This table shows some statements about circuit switching and packet switching. Copy the table and indicate which statements are true (?) and which are false (?).b) Explain the following terms and why they are used when sending packets across a network. i) Hop number/hopping ii) Checksum c) Describe how headers and routing tables are used to route packets efficiently from a sender to recipient.
Answer Preview: a) statements circuit switching packet switching a dedicated circuit/path is needed at all times TRU…

, Chapter: 9 -Problem: 5 >> Study the pseudocode and answer the following questions. Line numbers have been added to help you.a) Give the line number of: i) An assignment statement ii) A selection iii) An iteration. b) Complete an identifier table for the algorithm. c) Extend the algorithm to only allow four tries for a correct choice. Transcribed Im
Answer Preview: ANSWER a) i) Line 16 ii) Line 7 iii) Line 1 b) Identifier | Type | Purpose Choice …

, Chapter: 16 -Problem: 5 >> a) Explain how programs can access data from memory when using virtual memory b) Describe the following page replacement algorithms. i) First in first out (FIFO) ii) Optimal page replacement (OPR) iii) Least recently used (LRU)
Answer Preview: a) When a computer uses virtual memory, it is able to access data that is stored on the hard drive a…

, Chapter: 18 -Problem: 3 >> Copy and complete the text, using words from the box. Words may be used once, more than once, or not at all. Transcribed Image Text: actual output machine learning reinforcement learning back propagation minimised removed deep learning random weighting static error gradients recurrent supervised lea
Answer Preview: Static, expected results, minimised, back propagation, super…

, Chapter: 9 -Problem: 1 >> Algorithms can be shown as structured English, flowcharts and pseudocode.Explain what is meant bya) Structured Englishb) A flowchart c) pseudocode.
Answer Preview: A vacuole is a membrane-bound cell organelle. In animal cell…

, Chapter: 15 -Problem: 6 >> A logic circuit is shown.a) Write the Boolean expression corresponding to this logic circuit. b) Copy and complete the truth table for this logic circuit.c) i) Copy and complete the Karnaugh map (K-map) for the truth table in part b).The K-map can be used to simplify the function in part a). ii) Draw loops around appropriate groups to produce an optional sum-of-products. iii) Write a simplified su
Answer Preview: a) The Boolean expression for the given logic diagram is S = (~(Q + …

, Chapter: 14 -Problem: 3 >> a) Explain what is meant by circuit switching. b) There are many applications in which digital data are transferred across a network. Video conferencing is one of these. For this application, circuit switching is preferable to the use of packet switching. Explain why this is so. c) A web page is transferred from a web server to a home computer using the Internet. Explain how the web page is transf
Answer Preview: a) Circuit switching is a method of transmitting data in which a dedicated physical connection, or c…

,

, Chapter: 3 -Problem: 1 >> a) Many mobile phone and tablet manufacturers are moving to OLED screen technology.Give three reasons why this is happening.b) A television manufacturer makes the following advertising claim:‘Our OLED screens allow the user to enjoy over one million vivid colours in True-to-life vision.’Comment on the validity of this claim.
Answer Preview: 1) OLED is an organic material that, like the name implies, emits light when a current is passed through it. As opposed to LCD panels, which are back-…

, Chapter: 16 -Problem: 9 >> There are four stages in the compilation of a program written in a high-level language. a) Four statements and four compilation stages are shown below. Copy the diagram below and connect each statement to the correct compilation stage.b) Write the Reverse Polish Notation (RPN) for the following expression.c) An interpreter is executing a program. The program uses the variables a, b, c and d. The p
Answer Preview: a) Here is the diagram connecting each statement to the correct compilation stage: Statement Compila…

, Chapter: 11 -Problem: 5 >> Procedures and functions are subroutines. Explain what is meant by a) A procedure b) A function c) A parameter d) A procedure or function header.
Answer Preview: A procedure is a set of instructions that perform a specific task or tasks. It ma…

, Chapter: 1 -Problem: 2 >> A software developer is using a microphone and a sound editing app to collect and edit sounds for his new game. When collecting sounds, the software developer can decide on the sampling resolution he wishes to use. a) i) State what is meant by sampling resolution. ii) Describe how sampling resolution will affect how accurate the stored digitised sound will be. b) The software developer will includ
Answer Preview: a) i) Sampling resolution is defined as the number of bits that will be used to represent the sample. If we increase the sampling resolution the quali…

, Chapter: 6 -Problem: 2 >> a) Explain what antivirus software is and how it can be used to ensure data security. b) Explain how a firewall can be used to identify illegal attempts at accessing a computer system and how they can be used to keep data safe.
Answer Preview: Antivirus software helps protect your computer against malware and cybercriminals. Antivirus softwar…

, Chapter: 18 -Problem: 2 >> a) Describe three features you would associate with: i) Reinforcement learning ii) Supervised learning. b) Explain why these applications are regarded as artificial intelligence. i) Chat bots ii) Search engines iii) Photographic enhancement applications
Answer Preview: Reinforcement learning is a machine learning training method based on rewarding desired behaviors an…

,

, Chapter: 10 -Problem: 2 >> Explain, using an example, what is meant by a composite data type.
Answer Preview: A composite data type is one whose values are composed of component values (poss…

, Chapter: 11 -Problem: 2 >> Write a pseudocode algorithm to input the height and width of a right-angled triangle and check that these values are positive and less than the maximum values given in question 1.
Answer Preview: An algorithm is a procedure for solving a problem in terms of the actions to be executed and th…

, Chapter: 3 -Problem: 6 >> a) Three digital sensors, A, B and C, are used to monitor a process. The outputs from the sensors are used as the inputs to a logic circuit. A signal, X, is output from the logic circuit:Output, X, has a value of 1 if either of the following two conditions occur: – Sensor A outputs the value 1 OR sensor B outputs the value 0. – Sensor B outputs the value 1 AND sensor C outputs the value 0. Draw a
Answer Preview: a) The logic circuit can be represented using OR and AND gates as …

, Chapter: 13 -Problem: 2 >> A computer uses 12 bits for the mantissa and 6 bits for the exponent. a) Convert these binary floating-point numbers into denary.b) Convert these denary numbers into binary floating-point numbers. i) +4.75 ii) ?8.375 Transcribed Image Text: i) 011 100100000 000 11 1 ii) | 1 0|1 0 11100 00 111100
Answer Preview: ANSWER a. i) 0 101100 1100 ii) 1 011100 1100 b. i) 0 011110 1110 ii) 1 101110 11…

, Chapter: 11 -Problem: 4 >> Explain what is meant by the term library routine. Give two examples of uses of library routines.
Answer Preview: library routine - a debugged routine that is maintained in a pr…

, Chapter: 2 -Problem: 5 >> a) When data is transmitted over a LAN network there is the possible risk of data collision. i) Explain the term data collision. ii) Describe how CSMA/CD is able to detect collisions. iii) Explain how CSMA/CD can be used to resolve the problem of data collision. b) Copy the diagram below and connect each network device to its description. 
Answer Preview: a) When data is transmitted over a LAN network there is the possible risk of data collision. i) A da…

, Chapter: 3 -Problem: 3 >> An air conditioning unit in a car is being controlled by a microprocessor and a number of sensors. a) Describe the main differences between control and monitoring of a process. b) Describe how the sensors and microprocessor would be used to control the air conditioning unit in the car. Name at least two different sensors that might be used and explain the role of positive feedback in your descript
Answer Preview: a) The main differences is that monitoring process takes place with th…

,

,

, Chapter: 15 -Problem: 5 >> a) Four descriptions and four types of computer architecture are shown below. Draw a line to connect each description to the appropriate type of computer architecture.b) In a massively parallel computer explain what is meant by: i) Massive ii) Parallel c) There are both hardware and software issues that have to be considered for parallel processing to succeed. Describe one hardware and one softwar
Answer Preview: Description Computer architecture A computer that does not have the ability for parallel processing …

, Chapter: 4 -Problem: 2 >> a) Explain the main differences between HDMI, VGA and USB ports when sending data to peripherals. b) Describe how interrupts can be used to service a printer printing out a large 1000 page document.
Answer Preview: Question (a) The main difference between HDMI, VGA a…

, Chapter: 11 -Problem: 6 >> Explain the difference between a) A procedure and a function b) Passing parameters by value and by reference c) Defining a procedure and calling a procedure.
Answer Preview: Procedure Function Used mainly to a execute certain pro…

, Chapter: 5 -Problem: 3 >> File History and Time Machine are examples of back-up utilities offered as part of two different operating systems. a) Explain why it is important to back up files on a computer. b) One of the features offered by both utilities is the possibility of ‘turning back the internal computer clock’. Explain why this is an important feature and give two occasions when a user may wish to use this feature.
Answer Preview: a) It is important to back up files on a computer because it ensures that important data, documents, …

, Chapter: 4 -Problem: 5 >> An intruder detection system for a large house has four sensors. An 8-bit memory location stores the output from each sensor in its own bit position. The bit value for each sensor shows: – 1 – The sensor has been triggered – 0 – The sensor has not been triggeredThe bit positions are used as follows:The output from the intruder detection system is a loud alarm. a) i) State the name of the type of s
Answer Preview: a) i) Intruder detection systems belong to the category of security systems. ii) Intruder detection …

, Chapter: 2 -Problem: 4 >> A buffer is 2 MiB in size. The lower limit of the buffer is set at 200 KiB and the higher limit is set at 1.8 MiB. Data is being streamed at 1.5 Mbps and the media player is taking data at the rate 600 kbps. You may assume a megabit is 1 048 576 bits and a kilobit is 1024 bits. a) Explain why the buffer is needed. b) i) Calculate the amount of data stored in the buffer after 2 seconds of streaming
Answer Preview: Given, Low watermark is set at =100kb=100kb High watermark is set at =900kb=900kb Incoming data rate KB/sec =1Mbps=1Mbps =1000 kbps=125kb/s=1000kbps=1…

, Chapter: 2 -Problem: 2 >> a) Conventional telephone calls are made using the public service telephone network (PSTN). The national network uses both copper cables and fibre optic cables. i) Explain the difference between copper cabling and fibre optic cabling ii) Describe two benefits and two drawbacks of both types of cabling. b) Satellite technology is often used in long distance communications. Compare the differences b
Answer Preview: a) i) Copper cabling uses copper wires to transmit electrical signals, while fibre optic cabling uses thin glass or plastic fibres to transmit light s…

, Chapter: 20 -Problem: 3 >> a) When designing and writing program code, explain what is meant by: – An exception – Exception handling. b) A program is to be written to read a list of exam marks from an existing text file into a 1D array. Each line of the file stores the mark for one student. State three exceptions that a programmer should anticipate for this program. c) The following pseudocode is to read two numbers.The pro
Answer Preview: Exception and Exception Handling Exception. An exception is an error that occurs during the executio…

, Chapter: 1 -Problem: 4 >> a) Write the denary numbers 60, 27 and ?27 in 8-bit binary two’s complement form. b) Show the result of the addition 60 + 27 using 8-bit binary two’s complement form. Show all of your working. c) Show the result of the subtraction 60 ? 27 using 8-bit binary two’s complement form. d) Give the result of the following addition. 0 1 0 1 1 0 0 1 + 0 1 1 0 0 0 0 1 Explain why the expected result is not
Answer Preview: a) The 8-bit binary two's complement form of 60 is 0011 1100, of 27 is 0001 1011, and of -27 is 1110 …

, Chapter: 7 -Problem: 4 >> The IEEE Software Engineering Code of Ethics uses eight key principles shown in the right-hand column of the following diagram. Tom is employed as a tester with a software company. He is keen to become a trainee programmer. The middle column in the diagram labels six incidents which have happened to tom this week. The table that follows the diagram describes each incident.a) Copy the diagram above
Answer Preview: a) IEEE Software Engineering Code of Ethics | Incident | Ethical/Unethical Behavior Responsib…

, Chapter: 10 -Problem: 3 >> Explain, using diagrams, the process of reversing a queue using a stack.
Answer Preview: A queue can be reversed by using a stack, Remove all the elements from the …

, Chapter: 20 -Problem: 1 >> A declarative programming language is used to represent the following facts and rules:These clauses have the following meaning:a) More facts are to be included. Ali and Meena are the parents of Ahmed. Write the additional clauses to record this.b) Using the variable C, the goalWrite the result returned by the goalc) Use the variable M to write the goal to find the mother of Gina.d) Write the rule
Answer Preview: ANSWER : a) 15 parent (ali, ahmed); 16 parent (meena, ahmed). b) P = ali, aisha. c) mother (M, gina)…

, Chapter: 10 -Problem: 4 >> a) Write pseudocode to set up a text file to store records like this, with one record on every line.b) Write pseudocode to append a record. c) Write pseudocode to find and delete a record. d) Write pseudocode to output all the records. Transcribed Image Text: TYPE TstudentRecord DECLARE name STRING
Answer Preview: a) Open the text file for writing Create a student record type Declare variables for name, address a…

, Chapter: 20 -Problem: 2 >> A college has two types of student: full-time and part-time. All students have their name and date of birth recorded. A full-time student has their address and telephone number recorded. A part-time student attends one or more courses. A fee is charged for each course. The number of courses a part-time student attends is recorded, along with the total fee and whether or not the fee has been paid.
Answer Preview: a) Class diagram: +---------------+ | Student | +---------------+ | - name | | - dob | +------------…

, Chapter: 11 -Problem: 1 >> Use pseudocode to declare these variables and constants. You will need to decide which identifiers are variables and which are constants. Transcribed Image Text: Identifier name Description height Stores value input for length of height maxHeight Maximum height, 25 width Stores value input for lengt
Answer Preview: When associated with an identifier, a constant is said to be named, although the terms constant and …

, Chapter: 3 -Problem: 4 >> The nine stages in printing a page using an inkjet printer are shown below. They are not in the correct order. Write the letters A to I so that the stages are in the correct order. Transcribed Image Text: The data is then sent to the printer and it is stored in a temporary memory known as a printer
Answer Preview: ANSWER A - G - E - C - I - D - B - F - H EXPLANATION A - The data is sent to the …

, Chapter: 6 -Problem: 1 >> A college is using a local area network (LAN) to access data from a database. a) Give two security measures to protect the data on the college’s computer system. b) Data regarding new students joining the college is being entered into the database. Each student has a 7-digit identification number (ID). A check digit is used as a form of checking to ensure errors have not been made when entering th
Answer Preview: a) Two security measures to protect the data on the college's computer system are: Access controls: …

, Chapter: 2 -Problem: 3 >> a) Explain the term bit streaming. b) A person watches a film streamed from a website on a tablet computer. i) Give two benefits of using bit streaming for this purpose. ii) State two potential problems of using bit streaming for this purpose. c) Explain the terms on-demand bit streaming and real-time bit streaming.
Answer Preview: a) Bit streaming refers to the process of transmitting digital data, such as audio or video, in a s…

, Chapter: 7 -Problem: 1 >> Nicolae has joined a software company as a new team manager. During his induction he was given a presentation on the company’s code of conduct and the company’s expected ethical behaviour. He was given hand-outs after the presentation which included the code of conduct and ethical behaviour. a) Explain what is meant by the term ethics. b) Describe the differences between behaving in an unethical m
Answer Preview: ANSWER a) Ethics is a set of moral principles that guide a person's behavior or the conducting of a…

, Chapter: 18 -Problem: 6 >> Tom is using a GPS device to navigate from point B to point E. Tom’s GPS uses the A* algorithm to find the shortest route: B ? C ? M ? J ? K ? E This route is shown in orange on the diagram. However, due to some major flooding, routes M to J and M to F have been closed, making the original path no longer possible. Describe how the GPS system will use the A* algorithm to find an alternative route f
Answer Preview: The A* algorithm is a heuristic search algorithm that combines the strengths of uniform-cost search …

, Chapter: 19 -Problem: 2 >> A Queue Abstract Data type (ADT) has these associated operations: – Create queue – Add item to queue – Remove item from queue The queue ADT is to be implemented as a linked list of nodes. Each node consists of data and a pointer to the next node. a) The following operations are carried out:Copy the diagram and add appropriate labels to show the final state of the queue. Use the space on the left a
Answer Preview: a)…

, Chapter: 19 -Problem: 1 >> Data is stored in the array NameList [1:10]. This data is to be sorted. a) i) Copy and complete this pseudocode algorithm for an insertion sort.ii) A special case is when NameList is already in order. The algorithm in part a) i) is applied to this special case. Explain how many iterations are carried out for each of the loops. b) An alternative sort algorithm is a bubble sort:i) As in part a) ii),
Answer Preview: a) i) FOR ThisPointer FROM 2 TO length of NameList TempNameList = NameList[ThisPointer] Pointer = Th…

, Chapter: 10 -Problem: 1 >> Abstract data types (ADTs) are collections of data and the operations used on that data. Explain what is meant by a) Stack b) Queue c) Linked list.
Answer Preview: Abstract Data type (ADT) is a type (or class) for objects whose behavior is defined by a set of valu…

, Chapter: 12 -Problem: 3 >> A company creates two new websites, Site X and Site Y, for selling bicycles. Various programs are to be written to process the sales data. These programs will use data about daily sales made from Site X (using variable SalesX) and Site Y (using variable SalesY).a) Name the data structure to be used in a program for SalesX. b) The programmer writes a program from the following pseudocode design.i)
Answer Preview: a) The data structure to be used in a program for SalesX can be an array, list, or any other data …

, Chapter: 18 -Problem: 4 >> a) Explain the difference between the A* algorithm and Dijkstra’s algorithm. b) The following graph (network) shows how long it takes (in seconds) to walk between ten hotels in a city.i) Using Dijkstra’s algorithm, show the shortest time to walk from the City Hotel (C) to the Quality Hotel (Q). ii) Give the route corresponding to your answer in part b) i).
Answer Preview: INTRODUCTION. Movement from one location to the next has been a routine in people's daily lives. People have to take shortest routes to get to work quickly to save on time. Buses and Airplanes have to …

, Chapter: 4 -Problem: 3 >> a) i) Name three special registers used in a typical processor. ii) Explain the purpose of the three registers named in part i). b) Explain how interrupts are used when a processor sends a document to a printer.
Answer Preview: Question a part (i) The special registers used in a typical processor …

, Chapter: 5 -Problem: 2 >> a) The operating system contains code for performing various management tasks. The appropriate code is run when the user performs actions. Copy the diagram below and connect each OS management task to the appropriate user action.b) A user has the following issues with the use of his PC. State the utility software which should provide a solution. i) The hard disk stores a large number of video file
Answer Preview: OS management task: Main memory management Input/output management Secondary storage management Huma…

, Chapter: 4 -Problem: 4 >> A programmer is writing a program in assembly language. They need to use shift instructions. Describe, using examples, three types of shift instructions the programmer could use.
Answer Preview: For complete ternary tree tree(k=3) total no. of nod…

, Chapter: 13 -Problem: 5 >> a) Three file organisation methods and two file access methods are shown below. Copy the diagram below and connect each file organisation method to its appropriate file access method(s).b) An energy company supplies electricity to a large number of customers. Each customer has a meter that records the amount of electricity used. Customers submit meter readings using their online account. The compa
Answer Preview: Sequential file organization arranges data in a sequential manner, indexed file organization uses an …

, Chapter: 9 -Problem: 2 >> Several techniques are used in computational thinking. Explain what is meant by a) Abstraction b) Decomposition c) Pattern recognition.
Answer Preview: Decomposition - breaking down a complex problem or system into smaller, more manageable parts. pa…

, Chapter: 12 -Problem: 1 >> When the guarantee on a computer runs out, the owner can take out insurance to cover breakdown and repairs. The price of the insurance is calculated from: – The model of the computer ? The age of the computer ? The current insurance rates Following an enquiry to the insurance company, the customer receives a quotation letter with the price of the insurance. A program is to be produced. The structu
Answer Preview: The "input computer details" module contains the customers email, name,mode…

, Chapter: 5 -Problem: 1 >> A programmer is writing a program that includes code from a program library. a) Describe two benefits to the programmer of using one or more library routines. b) The programmer decides to use a Dynamic Link Library (DLL) file. i) Describe two benefits of using DLL files. ii) State one drawback of using DLL files.
Answer Preview: a) Benefits to the programmer of using one or more library routines include: i) Reduced development …

, Chapter: 7 -Problem: 2 >> a) Name three types of software licensing. b) For each example, describe three features which identify the differences between them. c) Describe how copyright issues affect each type of named software licensing.
Answer Preview: Question (a) 1. Proprietary software licenses 2. Open source software licenses 3. Freeware licenses …

, Chapter: 15 -Problem: 2 >> a) Consider the following truth table.i) Draw a Karnaugh map from this truth table. ii) Use your Karnaugh map from part a) i) to produce a Boolean expression. b) Use the laws of Boolean algebra to simplify: i) (A + C).(A.D + A.D) + A.C + C ii) A.(A + B) + (B + A.A).(A + B) Transcribed Image Text: IN
Answer Preview: In K-map to compute the Sum of Product (SOP) expression, we need to put 1s in blocks of K-map respec…

, Chapter: 6 -Problem: 3 >> The following block of data was received after transmission from a remote computer. Odd parity was being used by both sender and receiver. One of the bits has been changed during the transmission stage. Locate where this error is and suggest a corrected byte value. Transcribed Image Text: bit 3 bit
Answer Preview: Using the odd parity rule, the parity bit should be set to 1 if the total number of 1's in the data …

, Chapter: 11 -Problem: 7 >> A driver buys a new car. The value of the car reduces each year by a percentage of its current value. The percentage reduction is: – In the first year, 40% – In each following year, 20% The driver writes a program to predict the value of the car in future years. The program requirements are: – Enter the cost of the new car (to nearest $) – Calculate and output the value of the car at the end of ea
Answer Preview: The above code written in C language is as follows: #include int main() { int YearCount = 1; float P…

, Chapter: 15 -Problem: 1 >> a) Write down the Boolean expression to represent the logic circuit below.  b) Produce the Karnaugh map to represent the above logic circuit and hence write down a simplified Boolean expression. c) Draw a simplified logic circuit from your Boolean expression in part b) using AND and OR gates only. Transcribed Image Text:
Answer Preview: In logic gates, an AND gate output can be represented by logical multiplication whi…

, Chapter: 17 -Problem: 1 >> a) Explain what is meant by QKD. b) The following eleven statements refer to the transmission of an encryption key using quantum key distribution protocols. Put each statement into its correct sequence, 1-11. The first one has been numbered for you. Transcribed Image Text: sequence statement the sen
Answer Preview: Quantum key distribution (QKD) is a secure communication method which implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random s…

, Chapter: 1 -Problem: 6 >> a) Convert the denary number 95 into binary coded decimal (BCD). b) Using two’s complement, carry out the binary subtraction: 0 0 1 0 0 0 1 1 – 0 1 0 0 0 1 0 0 And convert your answer into denary. c) Convert the denary number 506 into hexadecimal.
Answer Preview: a) To convert the denary number 95 into binary coded decimal (BCD), we must first co…

, Chapter: 16 -Problem: 3 >> State the ten computer terms being described below.a) A fixed time slice allotted to a process.b) When a process switches from running state to steady state or from waiting state to steady state.c) System which gives the illusion that there is unlimited memory available.d) Algorithm which decides which process (in the ready state) should get CPU time next (running state).e) Procedure by which, whe
Answer Preview: a ) Time Sl ice b ) Context Switch c ) V…

, Chapter: 9 -Problem: 4 >> Computer programs have to evaluate expressions. – Study the sequence of pseudocode statements. – Write down the value assigned to each variable. a) Perimeter b) Area c) Z d) A Transcribed Image Text: DECLARE h, w, r, Perimeter, Area : REAL DECLARE ?, ?, ?, D, E BOOLEAN h e 13.6 w + 6.4 Perimeter + (
Answer Preview: ANSWER a) Perimeter = 42 24 b) Area = 314 2 c) Z = 15 6 d) A = False EXPLANATION The expres…

, Chapter: 1 -Problem: 1 >> a) The following bytes represent binary integers using the two’s complement form. State the equivalent denary values.i) 0 1 0 0 1 1 1 1ii) 1 0 0 1 1 0 1 0iii) Write the integer ?53 in two’s complement form.iv) Write the maximum possible range of numbers using the two’s complement form of an 8-bit binary number.Give your answers in denary.b) i) Write the denary integer 798 in binary-coded decimal (
Answer Preview: The alternative name of the denary values are decimal values a) i) Given numbers are in two's compl…

,

, Chapter: 13 -Problem: 4 >> a) Using the pseudocode declarations below, identify i) An enumerated data type ii) A composite data type iii) A non-composite data type iv) A user-defined data type.Write pseudocode to declare a variable Journal of type TJournal Record and assign the following values to the variable. Title – Spring Flowers Author – H Williams Publisher – XYZ Press Number of pages – 40 Season – Spring
Answer Preview: ANSWER DECLARE Journal: TJournalRecord Journal title = Spring Flowers …

,

, Chapter: 15 -Problem: 4 >> a) Describe four types of processors used in parallel processing. b) A hardware designer decided to look into the use of parallel processing. Describe three features of parallel processing she needs to consider when designing her new system. c) A computer system uses pipelining. An assembly code program being run has eight instructions. Compare the number of clock cycles required when using pipeli
Answer Preview: a) Four types of processors used in parallel processing are: 1) Central Processing Units (CPUs): A CPU is the primary component of a computer system a…

, Chapter: 18 -Problem: 1 >> a) Answer these multiple choice questions. i) Identify the statement that best describes artificial intelligence. A. Putting human intelligence into a computer system B. Programming a computer using a user’s intelligence C. Making a machine intelligent D. Playing a game on a computer E. Adding more memory units to a computer ii) Identify the programming language that is not used when programming A
Answer Preview: a) i) C. Making a machine intelligent ii) D. Perl iii) D. An inf…

, Chapter: 18 -Problem: 5 >> The following graph is made up of a (9 × 8) matrix. Use the A* algorithm to show the shortest route from A to B. Transcribed Image Text: 1 2 3 4 5 6 7 8 9 starting point 'A' 3 4 5 6 7 finishing point 'B' 8
Answer Preview: INTRODUCTION A* Algorithm is a traversal Algorithm that can be used to find the shortest distance be…

, Chapter: 8 -Problem: 1 >> A database has been designed to store data about programmers and the programs they have developed. These facts help to define the structure of the database: – Each programmer works in a particular team. – Each programmer has a unique first name. – Each team has one or more programmer. – Each program is for one customer only. – Each programmer can work on any program. – The number of days that each
Answer Preview: a) The table ProgDev is not in first normal form (1NF) because it contains repeating groups, such as …

, Chapter: 5 -Problem: 5 >> State four features of an IDE that are helpful when coding a program.
Answer Preview: IDE Common Features Text editor. Virtually every IDE will have …

, Chapter: 16 -Problem: 1 >> This table shows the burst time and arrival time for four processes:This is a list of average waiting times, in ms: 6.0  6.25  6.5  8.0  8.25  10.0  11.25  14.0  14.25  14.5 Choosing from the list, select the correct average waiting time for the four processes, P1–P4, for each of these scheduling routines: a) FCFS b) SJF c) SRTF d) Round robin
Answer Preview: ANSWER a) FCFS: 14 25 b) SJF: 6 5 c) SRTF: 6 25 d) Round Robin: 8 25 EXPLANATION a) FC…

, Chapter: 10 -Problem: 5 >> Data is stored in the array NameList [1:10]. This data is to be sorted using a bubble sort:a) A special case is when NameList is already in order. The algorithm above is applied to this special case. Explain how many iterations are carried out for each of the loops.b) Rewrite the algorithm using pseudocode, to reduce the number of unnecessary comparisons. Use the same variable names where appropri
Answer Preview: (a) For the first loop, there will be 9 iterations. For the second loop, there will be 8 iteratio…

, Chapter: 11 -Problem: 3 >> a) For this question, you will need to use this function, which returns the real value of the square root of anyPosVal:Extend your algorithm for Question 2 to i) Calculate the hypotenuse ii) Calculate the area iii) Calculate the perimeter. b) Provide a menu to choose which calculation to perform. c) Check that all the above work by writing and testing a program in your chosen programming language.
Answer Preview: ANSWER a) Algorithm for Question 2 extended to calculate the hypotenuse, area, and perimeter: Step 1…

, Chapter: 5 -Problem: 4 >> Assemblers, compilers and interpreters are all used to translate programs. Discuss the different roles played by each translator.
Answer Preview: Assembler - A translator that converts assembly language to machine language is kno…

, Chapter: 3 -Problem: 5 >> a) There are two types of RAM: dynamic RAM (DRAM) and static RAM (SRAM). Five statements about DRAM and RAM are shown below. Copy the diagram below and connect each statement to the appropriate type of RAM. b) Give three differences between RAM and ROM.c) DVD-RAM and f lash memory are two examples of storage devices. Describe two differences in how they operate.
Answer Preview: ANSWER a) StatementType of RAM requires the data to be refreshed periodically in order to retain dat…

, Chapter: 4 -Problem: 1 >> a) Write these six stages of the Von Neumann fetch-execute cycle in the correct order. – Instruction is copied from the MDR and is placed in the CIR – The instruction is executed – The instruction is decoded – The address contained in PC is copied to the MAR – The value in PC is incremented by 1 – Instruction is copied from memory location in MAR and placed in MDR b) Explain how the following affe
Answer Preview: a) 1. The address contained in PC is copied to the MAR 2. Instruction is copied from memory location …

, Chapter: 3 -Problem: 2 >> a) A company is developing a new games console. The game will be stored on a ROM chip once the program to run the new game has been fully tested and developed. i) Give two advantages of putting the game’s program on a ROM chip. ii) Explain why the manufacturers would use an EPROM chip during development. iii) The manufacturers are also using RAM chips on the internal circuit board. Explain why the
Answer Preview: 1) Durability: ROM chips are non-volatile memory, meaning they retain their data even when the power is turned off. This makes them a reliable storage option for game programs that need to be accessed …

, Chapter: 8 -Problem: 2 >> A school stores a large amount of data. This includes student attendance, qualification, and contact details. The school’s software uses a file-based approach to store this data. a) The school is considering changing to a DBMS. i) State what DBMS stands for. ii) Describe two ways in which the Database Administrator (DBA) could use the DBMS software to ensure the security of the student data. iii)
Answer Preview: (i) DBMS stands for Data Base Management system (ii) Database security refers to the range of tools, controls, and measures designed to establish and preserve database confidentiality, integrity, and …

, Chapter: 17 -Problem: 3 >> A user keys a URL into their browser and hits the key. a) Re-order the following stages, 1-6, to show how an SSL digital certificate is used to set up a secure connection between client (user) and website.b) List four items found on a digital certificate. c) Explain how a digital signature can be formed from a digital certificate.
Answer Preview: a) Re-order the following stages, 1-6, to show how an SSL digital certificate is used to set up a se…

, Chapter: 14 -Problem: 2 >> a) An Ethernet frame contains a section called Ethernet data. Copy and complete this diagram to show the other four items missing from the Ethernet data section.b) State what is meant by the term metadata. c) Describe how files can be shared using the BitTorrent protocol. Transcribed Image Text: Eth
Answer Preview: a) An Ethernet frame contains a section called Ethernet data which includes the f…

, Chapter: 7 -Problem: 3 >> a) Computers over the years have been described as first to fifth generation. Identify the generation that is associated with AI. A. First B. Second C. Third D. Fourth E. Fifth b) AI is involved in problem-solving. Identify the term that is used to describe the ‘common sense’ part of problem-solving. A. Analysis B. Critical design C. Heuristics D. Programming E. Sampling c) Identify the statement
Answer Preview: a) D. Fourth b) C. Heuristics c) D. Making a machine behave in an intelligent …

, Chapter: 13 -Problem: 1 >> A computer holds binary floating-point numbers in two’s complement form with the binary point immediately after the left-most bit. A 24-bit word is used as follows:a) Three words are held in floating-point representations:i) State the values being represented by A, B and C. ii) Identify the value that is not normalised. iii) Explain why it is normal for floating-point numbers to be normalised.b) C
Answer Preview: a) i) The values being represented by A, B and C cannot be determined without additional information…

, Chapter: 18 -Problem: 7 >> The following graph shows the routes connecting buildings on a university campus. The numbers represent the time taken (in minutes) to cycle from one building to another.a) i) Use Dijkstra’s algorithm to find the minimum time to cycle from building A to building L. ii) Write down the corresponding shortest route. b) It has been decided to construct a new cycle path, either from A directly to D (cy
Answer Preview: a) i) Using Dijkstras algorithm, the minimum time to cycle from build…

, Chapter: 17 -Problem: 2 >> a) Explain the terms SSL and TLS. b) Explain the following terms used in TLS. i) Record protocol ii) Handshake protocol iii) Session caching c) Give two differences between SSL and TLS.
Answer Preview: SSL and TLS are cryptographic …

, Chapter: 1 -Problem: 3 >> The editor of a movie is finalising the music score. They will send the final version of the score to the movie producer by email attachment. a) Describe how sampling is used to record the music sound clips. b) The music sound clips need to undergo some form of data compression before the music editor can send them via email. Identify the type of compression, lossy or lossless, they should use. Gi
Answer Preview: Thorough Explanation. a) Sampling is used to record the music sound clips by takin…

Additional Information

Book:
Cambridge International AS & A Level Computer Science
Isbn:
ISBN: 9781510457591
Edition:
1st Edition
Author:
Authors: David Watson, Helen Williams
Image:
61476dcf0c664_2136.jpg

11 Reviews for Cambridge International AS & A Level Computer Science Textbook Questions And Answers

Dane Parker
You did an awesome job. Thanks again!
Lawson Serrano
Awesome work and Reliable
Maci Howard
Great job! Very detailed.
Amari Fuller
awesome work
Myah Mccullough
good.

Add a review

Your Rating

39396

Character Limit 400