Computer Science Standard Level Paper 1 - May 2015
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Construct a truth table for the following Boolean expression. (A OR B) AND (NOT C OR B)

A B C (A OR B) (NOT C OR B) (A OR B) AND (NOT C OR B)
True True True True True True
True True False True True True
True False True True True True
True False False True True True
False True True True True True
False True False True True True
False False True False True False
False False False False True False

Outline one example of the use of a virtual private network (VPN).

A VPN can be used to securely access a company intranet when working remotely. The VPN encrypts all data transmitted between the user's computer and the company's network, ensuring that sensitive information is protected.

Outline how a sub-procedure can be considered an example of abstraction.

A sub-procedure hides the specific details of how a task is performed, presenting only the overall function and input/output parameters to the user. This allows for simpler code organization and re-use of the sub-procedure in different parts of the program.

Trace the following algorithmic fragment for N = 6. Show all working in a trace table. SUM = 0 loop COUNT from 1 to (N div 2) if N mod COUNT = 0 then SUM = SUM + COUNT end if end loop if SUM = N then output "perfect" else output "not perfect" end if

<table> <thead> <tr> <th>COUNT</th> <th>N mod COUNT</th> <th>SUM</th> </tr> </thead> <tbody> <tr> <td>1</td> <td>0</td> <td>1</td> </tr> <tr> <td>2</td> <td>0</td> <td>3</td> </tr> <tr> <td>3</td> <td>0</td> <td>6</td> </tr> <tr> <td>Therefore, the output is “perfect”.</td> <td></td> <td></td> </tr> </tbody> </table> Signup and view all the answers

Outline two usability features in relation to the characteristics of a new laptop.

<p>Two usability features for a new laptop could include: (1) A large, high-resolution screen for easier viewing and multitasking, and (2) A responsive keyboard with comfortable typing ergonomics.</p> Signup and view all the answers

Describe one way that software developers can ensure that the users are aware of any available updates for their products.

<p>One way software developers can ensure users are aware of available updates is by displaying notification popups or messages within the application interface when an update is available for download and installation.</p> Signup and view all the answers

Based on this information, identify four tasks that should be done by the students, listing the tasks in the order that they could be completed. Six students are planning their group 4 project, which is due in two days. They have to produce a scientific report and give an animated computer presentation based on their analysis of water samples. These water samples are to be taken from four local lakes.

<ol> <li>Collecting the water samples from the four local lakes.</li> <li>Analyzing the water samples in the laboratory.</li> <li>Writing the scientific report based on the analysis results.</li> <li>Developing the animated computer presentation.</li> </ol> Signup and view all the answers

Outline how two of the tasks identified in part (a) could be completed concurrently.

<p>The tasks of collecting water samples and writing the scientific report can be completed concurrently. Students could divide themselves into two groups, one to collect the samples and the other to start writing the report based on previous data or research.</p> Signup and view all the answers

Construct an algorithm to illustrate the monthly process described above. An insurance company holds a large database of information about its customers, including the date of their next payment. Once a month the database is searched to compile the following lists:
• list 1: customers whose next payment date will be within the next 30 days • list 2: customers whose payment date has passed by more than 14 days but less than, or equal to, 30 days • list 3: customers whose payment date has passed by more than 30 days. Customers who are in list 3 are flagged for deletion.

<ol> <li>Start</li> <li>Create three empty lists: list1, list2, and list3.</li> <li>For each customer in the database: <ul> <li>If the customer's next payment date is within the next 30 days, add the customer to list1.</li> <li>If the customer's next payment date is more than 14 days but less than or equal to 30 days past, add the customer to list2.</li> <li>If the customer's next payment date is more than 30 days past, add the customer to list3.</li> </ul> </li> <li>Mark all customers in list 3 for deletion.</li> <li>End</li> </ol> Signup and view all the answers

Explain how the lists could be used to merge the data from the database with a word processor to create these messages automatically for sending either by post or by email. After the lists have been compiled, the following messages are sent out to customers. • A reminder is sent to customers in list 1. • A warning that payments are more than 14 days overdue is sent to customers in list 2. • A cancellation of contract is sent to customers in list 3.

<p>The lists can be used to filter the database and isolate specific customer groups. The filtered lists can then be exported to a word processor, where a template for each type of message can be created. By using mail merge features, the word processor can automatically populate the templates with the relevant customer data from the lists, creating personalized messages for each group.</p> Signup and view all the answers

Outline the consequences of data loss to customers and to the company.

<p>Data loss for customers could result in the loss of important personal information, including financial records, contact details, and policy information. This can make it difficult to manage insurance claims, renew policies, or access other important services. For the company, data loss can lead to financial penalties, legal complications, damage to reputation, and loss of customer trust.</p> Signup and view all the answers

Describe one method that the company could use to prevent data loss.

<p>One method to prevent data loss is to implement regular data backups. This involves creating copies of the database at regular intervals and storing them in a separate, secure location. In case of data loss, the company can restore the database from the backup, minimizing the impact of the loss.</p> Signup and view all the answers

Outline the concept of the Open Systems Interconnection (OSI) model in communication across a network.

<p>The OSI model is a conceptual framework that defines seven layers of abstraction in network communication. Each layer performs a specific function, allowing for interoperability between different network devices and protocols. By breaking down communication into distinct layers, the OSI model simplifies the design, implementation, and troubleshooting of network systems.</p> Signup and view all the answers

Outline, with an example, the function of protocols.

<p>Protocols define the rules and formats for communication between devices on a network. They ensure that data is transmitted and received correctly, regardless of the specific hardware or software used. For example, the TCP protocol ensures reliable data transfer by breaking data into packets, sequencing them for delivery, and providing error checking and acknowledgments.</p> Signup and view all the answers

Outline one advantage and one disadvantage of allowing wireless access to the server. The LAN has one server, which is connected to the internet. The workstations are connected to the server by cable. There is also a wireless connection.

<p>An advantage of allowing wireless access to the server is increased mobility and flexibility for users. They can work from anywhere within range of the wireless network, without being tied to a fixed location. However, a disadvantage of wireless access is the potential for security vulnerabilities, as wireless signals can be intercepted more easily than wired connections. This requires implementing strong security measures, such as encryption, to protect sensitive data.</p> Signup and view all the answers

Outline the steps needed to search the collection and return the next job to be printed. The jobs sent to the printer are held in a collection of objects. Each object includes the priority that has been given and the time it was sent to be printed. If any job has been waiting more than 10 minutes it is moved to the front of the queue and is the next to be printed.

<ol> <li>Iterate through the collection of print job objects, checking the time each job has been waiting.</li> <li>If any job has been waiting for more than 10 minutes, move it to the beginning of the collection.</li> <li>Return the first job in the collection as the next job to be printed.</li> </ol> Signup and view all the answers

Identify two differences and two similarities between a bubble sort and a selection sort when sorting an array of 10 elements. A cycling tour lasts for 15 days. The total time for each competitor is recorded in a one-dimensional array, TIMES []. After each day's race, the array entry for each competitor is increased by their time for that day. There are 150 competitors and the 10 fastest times are transferred to the array FASTEST[] and displayed on a screen each day.

<p>Differences:</p> <ul> <li>Bubble sort compares and swaps adjacent elements, moving larger elements to the end of the array in each pass. Selection sort finds the smallest element in the unsorted portion and swaps it with the element at the beginning of the unsorted portion.</li> <li>Bubble sort can be optimized to stop when no swaps occur in a pass, whereas selection sort always iterates through the entire unsorted portion. Similarities:</li> <li>Both bubble sort and selection sort are in-place sorting algorithms, modifying the original array without creating a new one.</li> <li>Both algorithms have a time complexity of O(n^2) in the worst case, making them inefficient for large datasets.</li> </ul> Signup and view all the answers

Explain why a selection sort would be more efficient than a bubble sort in this case.

<p>Selection sort would be more efficient than bubble sort in this case because it only needs to find the 10 smallest elements, not sort the entire array. Selection sort would iterate through the array to find the smallest element, swap it to the beginning, then repeat for the next smallest element, and so on. This is more efficient than bubble sort because bubble sort would repeatedly compare and swap adjacent elements, which would be unnecessary for just finding the 10 fastest times.</p> Signup and view all the answers

Construct an algorithm to transfer the 10 fastest times from the array TIMES [] to the array FASTEST []. Assume that the array TIMES[] is not sorted.

<ol> <li>Initialize the array FASTEST[] with a size of 10.</li> <li>For each element in TIMES[]: <ul> <li>If the current element in TIMES[] is smaller than the largest element in FASTEST[]:</li> <li>Find the position of the largest element in FASTEST[]</li> <li>Replace the largest element in FASTEST[] with the current element from TIMES[]</li> </ul> </li> <li>Return the array FASTEST[]</li> </ol> Signup and view all the answers

Compare the use of two arrays, to hold the competitor's times and names, with the use of objects. The race organizers need to display the names of the 10 fastest competitors, as well as their times, on the screen. There is another array, NAMES [], which contains the names of all competitors in the same order as their times in TIMES[] (for example, NAMES [5] and TIMES [5] are the name and time of the same competitor).

<p>Using two arrays, TIMES[] and NAMES[], requires separate indexing and retrieval of data. A single index is needed to access the corresponding time and name. Using objects, you can store the time and name as properties within a single object. This allows for a more direct access to the desired data without needing to track separate indices. Data can be accessed by referencing the object and its properties. However, array-based approaches might be more efficient for certain operations. Objects provide more flexible and structured data representation, while arrays may be suitable for simpler data storage and manipulation.</p> Signup and view all the answers

Study Notes

Computer Science Standard Level Paper 1 - May 2015

  • Exam Details:
    • Paper format: 1 hour 30 minutes
    • Paper type: Computer Science, Standard Level, Paper 1
    • Date: Tuesday 19 May, 2015 (afternoon)
    • Maximum marks: 70
    • Number of pages: 4
  • Instructions:
    • Do not open the exam paper until instructed.
    • Answer all questions in Section A.
    • Answer all questions in Section B.
  • Paper Structure (Section A):
    • Question 1: Construct a truth table for (A OR B) AND (NOT C OR B) [4 marks]
    • Question 2: Outline one example of a virtual private network (VPN) use. [3 marks]
    • Question 3: Explain how a sub-procedure is an example of abstraction. [2 marks]
    • Question 4: Trace an algorithm for N = 6, showing working in a table; the output is "perfect" or "not perfect" [4 marks] Algorithm includes finding SUM of numbers up to half of N, using COUNT as a loop variable.
    • Question 5: Outline two usability features for a new laptop. [4 marks]
    • Question 6: Describe how developers alert users to software updates. [2 marks]
    • Question 7: Six students planning a group project needing a scientific report, presentation on water samples from four lakes:
      • (a) List four tasks in order of completion. [2 marks]
      • (b) Explain how two tasks can be completed concurrently. [2 marks]
      • (c) Draw a Gantt chart showing the tasks and their concurrency. [2 marks]
  • Paper Structure (Section B):
    • Question 8: An insurance company manages customer data, including payment dates:
      • (a) Design an algorithm to compile lists of customers based on upcoming or overdue payments. [6 marks]
      • (b) Describe merging the compiled lists with a word processor to generate messages (email/post). [4 marks]
      • (c) Outline consequences of data loss (customers/company). [2 marks]
      • (d) Suggest a method to prevent data loss. [3 marks]
  • Question 9: Six lawyers, one secretary connected by LAN to a central server.
    • (a) Outline the Open Systems Interconnection (OSI) model. [3 marks]
    • (b) Describe the use of protocols with an example. [3 marks]
    • (c) Discuss advantages and disadvantages of wireless access to the server. [4 marks]
    • (d) Explain the steps to select the next print job from the print queue. [5 marks]
  • Question 10 : Sorting and Analysis
    • (a) Contrast Bubble and selection sorts (2 differences, 2 similarities) with regards to an array of 10 elements. [4 marks]
    • (b) Explain why selection sort is more efficient for finding the 10 fastest times in a large set of competition results, than Bubble Sort. [2 marks]
    • (c) Describe an algorithm for finding the 10 fastest times from a large array of race results and putting those times in another array. [2 marks]
    • (d) Compare using two arrays (names and times) versus using objects to store competitor data [3 marks]

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your understanding of key concepts in Computer Science with this Standard Level Paper 1 from May 2015. The quiz covers topics such as truth tables, virtual private networks, and algorithm tracing. Prepare for your exams by familiarizing yourself with real exam questions and structure.

More Like This

Truth Tables Lecture
16 questions
Logic and Truth Tables Quiz
29 questions
Logic and Truth Tables
40 questions

Logic and Truth Tables

SociableMoscovium7423 avatar
SociableMoscovium7423
Use Quizgecko on...
Browser
Browser