SlideShare a Scribd company logo
This document consists of 14 printed pages and 2 blank pages.
DC (RW) 111393
© UCLES 2015 [Turn over
Cambridge International Examinations
Cambridge Ordinary Level
*9470539200*
COMPUTER SCIENCE 2210/12
Paper 1 Theory May/June 2015
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.
No calculators allowed.
READ THESE INSTRUCTIONS FIRST
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
Answer all questions.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
2
2210/12/M/J/15© UCLES 2015
1 (a) Four statements about cookies are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement is true or false.
Statement True False
they are a form of spyware
they are used only in advertising
they are used to track browser use
they act in the same way as a virus
[4]
(b) Five descriptions and five security issues are shown below.
Draw a line to connect each description to the correct security issue.
Description Security issue
malicious code installed on the hard drive of a
user’s computer or on the web server; this code
will re-direct user to a fake web site without their
consent
hacking
software that gathers information by monitoring
key presses on a user’s computer and relays
the information back to the person who sent the
software
pharming
program or code that replicates itself and is
designed to amend, delete or copy data and files
on a user’s computer without their consent
phishing
the act of gaining illegal access to a computer
system without the owner’s consent
spyware
creator of code sends out a legitimate-looking
email in the hope of gathering personal and
financial data; it requires the recipient to follow a
link in the email or open an attachment
virus
[4]
3
2210/12/M/J/15© UCLES 2015 [Turn over
2 The majority of mobile phones use touch screens. Three common technologies are used by
different mobile phone manufacturers.
Choose one of the following mobile phone technologies:
• resistive
• capacitive
• infrared
Chosen technology ..........................................................................................................................
(i) Describe how your chosen technology works to allow a user to make selections by touching
the screen.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(ii) Give one benefit and one drawback of your chosen technology when used on mobile phone
touch screens.
Benefit
...................................................................................................................................................
...................................................................................................................................................
Drawback
...................................................................................................................................................
...................................................................................................................................................
[2]
4
2210/12/M/J/15© UCLES 2015
3 Four input devices, four descriptions and four applications are shown below.
Draw a line to connect each input device to its correct description. Then connect each description
to its correct application.
Input device Description Application
barcode reader
copies paper documents and
converts the text and pictures
into a computer-readable form
voice
recognition
microphone
reads labels containing parallel
dark and light lines using laser
light or LEDs; the width of each
line represents a binary code
reading
passports
pH sensor
detects changes in acidity
levels; data is often in
analogue form
automatic stock
control
scanner
device that allows audio
signals to be converted into
electric signals; these can be
interpreted by a computer after
being converted into digital form
monitor soil in a
greenhouse
[6]
5
2210/12/M/J/15© UCLES 2015 [Turn over
4 (a) State what is meant by the term SSL.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(b) The following stages take place when a user wishes to access a secure website.
Put each stage in sequence by writing the numbers 1 to 6 in the column on the right. The first
one has been done for you.
Stage
Sequence
number
the encrypted data is then shared securely between the web browser
and the web server
the web browser attempts to connect to a website which is secured by
SSL 1
the web server sends the web browser a copy of its SSL certificate
the web browser requests the web server to identify itself
the web server will then send back some form of acknowledgement to
allow the SSL encrypted session to begin
the web browser checks whether the SSL certificate is trustworthy; if it
is, then the web browser sends a message back to the web server
[5]
6
2210/12/M/J/15© UCLES 2015
5 Parity checks are often used to check for errors that may occur during data transmission.
(a) A system uses even parity.
Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.
Received byte Byte transmitted correctly Byte transmitted incorrectly
1 1 0 0 1 0 0 0
0 1 1 1 1 1 0 0
0 1 1 0 1 0 0 1
[3]
(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.
The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per
character). A tenth byte, the parity byte, was also transmitted.
The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.
letter column
1
column
2
column
3
column
4
column
5
column
6
column
7
column
8
byte 1 F 1 0 1 0 0 1 1 0
byte 2 L 1 0 1 0 1 1 0 0
byte 3 O 1 0 1 0 1 1 1 1
byte 4 W 1 0 1 1 0 1 1 1
byte 5 C 1 0 1 0 0 0 1 1
byte 6 H 0 0 1 0 1 0 0 0
byte 7 A 0 0 1 0 0 1 0 1
byte 8 R 1 0 1 1 0 0 1 0
byte 9 T 1 0 1 1 0 1 0 0
parity
byte
1 0 1 1 1 1 1 0
(i) One of the bits has been transmitted incorrectly.
Write the byte number and column number of this bit:
Byte number ......................................................................................................................
Column number .................................................................................................................
[2]
7
2210/12/M/J/15© UCLES 2015 [Turn over
(ii) Explain how you arrived at your answer for part (b)(i).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) Give the denary (base 10) value of the byte: 1 0 1 1 1 1 1 0
...................................................................................................................................................
...............................................................................................................................................[1]
(d) A parity check may not identify that a bit has been transmitted incorrectly.
Describe one situation in which this could occur.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
8
2210/12/M/J/15© UCLES 2015
6 A gas fire has a safety circuit made up of logic gates. It generates an alarm (X = 1) in response to
certain conditions.
Input Description
Binary
value
Conditions
G gas pressure
1 gas pressure is correct
0 gas pressure is too high
C carbon monoxide level
1 carbon monoxide level is correct
0 carbon monoxide level is too high
L gas leak detection
1 no gas leak is detected
0 gas leak is detected
The output X = 1 is generated under the following conditions:
gas pressure is correct AND carbon monoxide level is too high
OR
carbon monoxide level is correct AND gas leak is detected
(a) Draw a logic circuit for this safety system.
[5]
9
2210/12/M/J/15© UCLES 2015 [Turn over
(b) Complete the truth table for the safety system.
G C L
Workspace
X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) Complete the truth table for the XOR gate:
A B C
0 0
0 1
1 0
1 1
[1]
10
2210/12/M/J/15© UCLES 2015
7 (a) Street lighting is controlled automatically. A light sensor and a microprocessor are used to
decide when to switch each street light on or off.
Describe how the sensor, microprocessor and light interact to switch the street light on or off.
Include in your answer how the microprocessor stops the street lights being frequently
switched on and off due to brief changes in the light intensity.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Name three different sensors (other than light and pH) and describe an application for each
of these sensors.
A different application is needed for each sensor.
Sensor 1 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 3 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[6]
11
2210/12/M/J/15© UCLES 2015 [Turn over
8 Five computing terms are described below.
Write the name of the term being described.
Software that anyone can download for free from the Internet
and then use without having to pay any fees. The usual
copyright laws apply and a user license is important.
................................................
Software that gives the user the chance to try it out free of
charge before actually buying it. The software is subject to the
usual copyright laws. As a rule, not all the features found in the
full version are available at this stage.
................................................
Software where users have freedom to run, copy, change and
adapt it. This is an issue of liberty and not of price since the
software guarantees freedom and the right to study and modify
the software by having access to the actual source code.
................................................
Set of principles that regulates the use of computers in
everyday life. This covers intellectual property rights, privacy
issues and the effects of computers on society in general.
................................................
The taking of somebody’s idea or software and claim that the
idea or software code were created by the “taker”.
................................................
[5]
12
2210/12/M/J/15© UCLES 2015
9 (a) Five statements about interpreters and compilers are shown in the table below.
Study each statement.
Tick (✓) to show whether the statement refers to an interpreter or to a compiler.
Statement Interpreter Compiler
creates an executable file that runs directly on the
computer
more likely to crash the computer since the machine
code produced runs directly on the processor
easier to debug since each line of code is analysed
and checked before being executed
slow speed of execution of program loops
it is more difficult to modify the executable code,
since it is in machine code format
[5]
(b) State why a compiler or an interpreter is needed when running a high-level program on a
computer.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(c) Give one benefit of writing a program in a high-level language.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(d) Give one benefit of writing a program in a low-level language.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
13
2210/12/M/J/15© UCLES 2015 [Turn over
(e) Study the following three sections of code.
A: 1 0 1 0 1 1 0 1
1 1 0 0 1 1 1 0
1 0 1 1 0 1 1 1
B: LDA X
INC X
STA Y
C: FOR x ← 1 TO 10
READ n
ENDFOR
Identify, using the letters A, B or C, which of the above codes is an example of assembly
code, high-level language code or machine code:
Assembly code .........................................................................................................................
High-level language code .........................................................................................................
Machine code ...........................................................................................................................
[2]
14
2210/12/M/J/15© UCLES 2015
10 Letters from the alphabet are represented in a computer by the following denary (base 10) values:
A = 97
G = 103
I = 105
L = 108
N = 110
The word “A L I G N” is stored as: 97 108 105 103 110
(a) Convert each of the five values to binary. The first one has been done for you.
Letter Denary value
A (97): 0 1 1 0 0 0 0 1
L (108):
I (105):
G (103):
N (110):
[2]
(b) An encryption system works by shifting the binary value for a letter one place to the left. “A”
then becomes:
1 1 0 0 0 0 1 0
This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:
C 2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these
values into hexadecimal:
hexadecimal
L: .............................................
G: .............................................
[4]
15
2210/12/M/J/15© UCLES 2015
BLANK PAGE
16
2210/12/M/J/15© UCLES 2015
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.
BLANK PAGE
® IGCSE is the registered trademark of Cambridge International Examinations.
CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge Ordinary Level
MARK SCHEME for the May/June 2015 series
2210 COMPUTER SCIENCE
2210/12 Paper 1, maximum raw mark 75
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.
Cambridge will not enter into discussions about these mark schemes.
Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®
, Cambridge International A and AS Level components and some
Cambridge O Level components.
Page 2 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
1 (a) 1 mark per correctly placed tick
Statement True False
they are a form of spyware
they are used in advertising only
they are used to track the browsing of a user
they act in the same way as a virus
[4]
(b)
4/5 matches – 4 marks
3 matches – 3 marks
2 matches – 2 marks
1 match – 1 mark
[4]
malicious code installed on the hard drive of a
user’s computer or on the web server; this code
will re-direct user to a fake web site without their
consent
software that gathers information by monitoring
key presses on a user’s computer and relays the
information back to the person who sent the
software
program or code that replicates itself and is
designed to amend/delete/copy data and files on
a user’s computer without their consent
the act of gaining illegal access to a computer
system without the owner’s consent
creator of code sends out a legitimate-looking
email in the hope of gathering personal and
financial data from the recipient; it requires the
email or attachment to be opened first
hacking
pharming
phishing
spyware
virus
Page 3 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
2 (i) Either of the three options, resistive, capacitive or infra-red must be chosen
maximum of two marks from chosen technology:
resistive
− uses multiple layers of material …
− … that transmit electric currents
− when the top layer/screen is pushed/touched into the lower/bottom layer …
− … the electric current changes and location of “touch” is found
capacitive
− current sent/flows out from all 4 corners of the screen
− when finger/stylus touches screen, the current changes
− the location of “touch” is calculated
infra-red
− an “invisible” grid on the screen (pattern of infra-red LED beams)
− sensors detect where the screen has been touched through a break in an infrared
beam(s)
− the position where the screen touched is calculated [2]
(ii) 1 mark for benefit, 1 mark for drawback
Resistive
benefits:
− inexpensive/cheap to manufacture
− can use stylus/finger/gloved finger/pen
drawbacks:
− poor visibility in sunlight
− vulnerable to scratching
− wears through time
− does not allow multi-touch facility
capacitive
benefits:
− good visibility in sunlight
− (very) durable surface
− allows multi-touch facility
drawbacks:
− screen (glass) will shatter/break/crack (on impact)
− cannot use when wearing (standard) gloves
infra-red
benefits:
− good durability
− allows multi-touch facility
− can use stylus/finger/gloved finger/pen
drawbacks:
− expensive to manufacture
− screen (glass) will shatter/break/crack (on impact)
− sensitive to dust/dirt [2]
Page 4 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
3
Input Device to Description Description to Application
3/4 matches – 3 marks 3/4 matches – 3 marks
2 matches – 2 marks 2 matches – 2 marks
1 match – 1 mark 1 match – 1 mark
[6]
copies paper
documents and
converts the text and
pictures into a
computer-readable form
reads labels containing
parallel dark and light
lines using laser light;
the width of each line
represents a binary
code
detects changes in
acidity levels; data is
often in analogue form
audio device that allows
audio signals to be
converted into electric
signals which can be
interpreted by a
computer after being
converted into digital
barcode
reader
microphone
pH sensor
scanner
voice
recognition
reading
passports
automatic
stock control
monitor soil in
a greenhouse
Page 5 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
4 (a) Any one from:
− secure sockets layer
− encrypts data being transmitted
− use of https
− use public and private keys
[1]
(b) 1 mark for each number in the correct order, next to the correct stage.
Stage
Sequence
number
the encrypted data is then shared securely between the web browser and the
web server
6
the web browser attempts to connect to a web site which is secured by SSL (1)
the web server sends the web browser a copy of its SSL certificate 3
the web browser requests the web server to identify itself 2
the web server will then send back some form of acknowledgement to allow the
SSL encrypted session to begin
5
the web browser checks whether the SSL certificate is trustworthy; if it is then
the web browser sends a message back to the web server
4
[5]
Page 6 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
5 (a) 1 mark per correctly placed tick
Received byte Byte transmitted correctly Byte transmitted incorrectly
1 1 0 0 1 0 0 0
0 1 1 1 1 1 0 0
0 1 1 0 1 0 0 1
[3]
(b) (i) byte number: 7
column number: 6
[2]
(ii) Any two from:
− letter “A”(byte 7) transmitted as odd parity (three 1s)
− column 6 has odd parity (seven 1s)
− intersection of byte 7 and column 6 indicates incorrect bit value
[2]
(c) 190
[1]
(d) Any one from:
− 2 bits interchanged (e.g. 1 → 0 and 0 → 1) that won’t change parity value
− even number of bits/digits are transposed
− If there are multiple errors in the same byte/column, that still produce the same parity bit,
the error will not be detected
[1]
Page 7 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
6 (a) 1 mark per correct logic gate, correctly connected
[5]
(b)
G C L Workspace X
0 0 0 0
]1 mark
0 0 1 0
0 1 0 1
]1 mark
0 1 1 0
1 0 0 1
]1 mark
1 0 1 1
1 1 0 1
]1 mark
1 1 1 0
[4]
G
C
L
X
Page 8 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
(c) 1 mark for correctly completed truth table
A B C
0 0 0
0 1 1
1 0 1
1 1 0
[1]
7 (a) Maximum 5 marks in total for question part
Description of how street light is controlled: (max 4 marks)
− sensor sends signal/data to the microprocessor
− signal/data converted to digital/using ADC
− microprocessor compares value to a stored value
− if input value < stored value …
− … signal sent from microprocessor to actuator
− … and light is switched on/off
− whole process continues in an infinite loop
Avoiding frequent on/off switches: (max 2 marks)
− microprocessor continues to keep light on/off for a pre-determined period
− after pre-determined period, sensor output is again sampled
[5]
Page 9 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
(b) 1 mark for correct sensor, 1 mark for its matching application
(all THREE applications must be different)
sensor application
infra-red/motion automatic doors
burglar alarm systems
temperature chemical process
central heating/air con system
greenhouse environment
oven
sound/acoustic burglar alarm systems
leak detection system
disco lighting
moisture/humidity clothes drier
environmental control (greenhouse, air con)
pressure burglar alarm system
traffic light control
chemical process
carbon dioxide/ pollution monitoring in a river
oxygen/gas greenhouse environment (growth control)
confined area (e.g. space craft)
Fish tank/Aquarium
magnetic field mobile phone
anti-lock braking
CD players
[6]
8 1 mark per correct word
Freeware
Shareware
Free software
(Computer) Ethics
Plagiarism
[5]
Page 10 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
9 (a) 1 mark per correctly placed tick
statement interpreter compiler
creates an executable file that runs directly on the computer
more likely to crash the computer since the machine code
produced runs directly on the processor
easier to debug since each line of code is analysed and
checked before being executed
slow speed of execution of program loops
it is more difficult to modify the code since the executable
code is now in machine code format
[5]
(b) Any one from:
− code is required to be converted into machine code/binary
− code needs to be produced that can be understood by the computer
[1]
(c) Any one from:
− close to English/native/human language
− easier/faster to correct errors/read/write
− works on many different machines/operating systems (portable)
[1]
(d) Any one from:
− work directly on registers/CPU
− more control over what happens in computer
− can use machine specific functions
[1]
(e) 1 mark per correct letter, maximum 2 marks
Assembly code: B
High-level language code: C
Machine code: A
[2]
Page 11 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 12
© Cambridge International Examinations 2015
10 (a) 1 mark for two correct lines, 2 marks for four correct lines
[2]
(b) 1 mark for each correct binary value
1 mark for each correct hexadecimal value
hexidecimal
L: 1 1 0 1 1 0 0 0 D8
G: 1 1 0 0 1 1 1 0 CE
[4]
0 1 1 0 1 1 0 0
0 1 1 0 1 0 0 1
0 1 1 0 0 1 1 1
0 1 1 0 1 1 1 0
L (108):
I (105):
G (103):
N (110):
Cambridge Ordinary Level
2210 Computer Science June 2015
Principal Examiner Report for Teachers
© 2015
COMPUTER SCIENCE
Paper 2210/12
Paper 1
Key Messages
This is a new syllabus and the standard of candidates work was mostly very good. There is a continued
move to provide questions where candidates have to apply their knowledge, rather than just show their ability
to simply remember facts. There is strong evidence that this is producing candidates who are now exhibiting
a good understanding of many of the topics.
General Comments
Candidates and centres are reminded that written papers are now scanned in and marked on computer
screens by Examiners. Consequently, if a candidate writes the answer to a question on an additional page
they must indicate very clearly to the Examiner where their revised answer is to be found. Also if answers
have been crossed out, the new answers must be written very clearly so that Examiners can easily read the
text and award candidates the appropriate mark.
Comments on Specific Questions
Questions 1(a) and 1(b)
In part (a) the full range of marks were awarded with most candidates gaining three or four marks. The most
common error was candidates mistaking cookies for being spyware.
In part (b) the full range of marks were awarded and candidates displayed a good level of knowledge of
security issues. The most common error was candidates confusing the definition of phishing and pharming.
Questions 2(i) and (ii)
Very few candidates displayed knowledge of touch screen technology. Very few candidates gained marks
for this question and generally repeated phrases from the question, rather that describing how touch screen
technology works. Candidate’s answers were mostly too vague, with a simplistic level of knowledge
displayed. The most common answer given was infrared technology. In terms of infrared touch screen
technology candidates gave a vague description of a heat based method, but most infrared touch screen
technology works with a grid of infrared beams that are interrupted to register a ‘touch’ on the screen.
Question 3
Many candidates displayed an excellent level of knowledge input devices and their uses, gaining five or six
marks for the answer. The most common error was candidates confusing stock control and reading
passports.
Questions 4(a) and 4(b)
Most candidates gained a mark for their answer to part (a). This was mainly through stating Secure Sockets
Layer as the full name for SSL. Those candidates that did not provide the name, but instead gave a
description of SSL involving encryption and web servers also gained a mark.
In part (b) the full range of marks were awarded with many candidates demonstrating a good level of
knowledge of secure websites. The most common error was the confusion of steps 2 and 3.
Cambridge Ordinary Level
2210 Computer Science June 2015
Principal Examiner Report for Teachers
© 2015
Questions 5(a), 5(b), 5(c) and 5(d)
In part (a) many candidates gained full marks. The most common error was candidates inverting the
responses and getting all three incorrect.
In part (b)(i) the full range of marks were awarded. Most candidates chose the correct byte number but a
range of answers were given for the column number with only some candidates giving the correct column.
In part (b)(ii) some candidates were able to give a clear description how they had arrived at their answer
through counting the number of 1’s in a byte/column and checking if this was odd/even. However some
candidates struggled to explain how they had arrived at their answer giving a vague description or referring
to counting zeroes rather than ones.
Many candidates were able to give a correct answer for part (c) and demonstrated a good understanding of
binary conversion. Some candidates seemed to correctly map out the calculation needed but noted an
incorrect response as their answer so a mark could not be awarded.
In part (d) most candidates demonstrated some understanding that if bits were transposed an error may not
be detected, but candidates needed to describe that it would need to be an even number of bits that were
transposed, and some were too vague in their response due to this.
Questions 6(a), 6(b) and 6(c)
Many candidates demonstrated a good level of knowledge of producing logic gates in part (a). Candidates
just need to make sure that they draw the gates very clearly. They need to make sure that the small circle at
the front of a NOT logic gate is included and is visible in order for it to be a valid NOT gate. The most
common error was the emission of the NOT logic gates from the circuit.
In part (b) the full range of marks were awarded. Those candidates gaining higher marks normally correlated
to a correct answer given in part (a).
In part (c) around 50% of candidates could correctly give the output of an XOR gate.
Questions 7(a) and 7(b)
The full range of marks were awarded in part (a), but not many responses gained full marks. Most
candidates gave a good description of a sensor sending data/signal to a microprocessor and the value being
compared to a stored value. Some candidates included the use of an analogue to digital converter. Very
few candidates acknowledged the issue of preventing the lights frequently turning on and off. A most
common error in this questions was candidates that incorrectly referring to the microprocessor sending
‘information’ rather than ‘data’ or a ‘signal’.
Most candidates gained some marks in part (b) with the full range being awarded. Some candidates were
too vague in their naming of the sensor, for example a heat sensor, and some candidates repeated the
application they gave for different parts of the question.
Question 8
Some candidates demonstrated a good level of knowledge of computing terms and gained full marks but a
number of vague and confused responses were also give. Some candidates confused freeware and free
software, and some candidates referred to trial software, which was too vague.
Question 9(a), 9(b), 9(c), 9(d) and 9(e)
In part (a) many candidates demonstrated a good knowledge of compilers and interpreters, gaining full
marks. The most common errors for incorrect answers occurred in the first and fourth rows.
In parts (b), (c) and (d) candidates either gave a clear description demonstrating a good level of knowledge
or a very vague response. Common errors were a reference to machine language rather than machine code
in part (b) and not stating who machine code was easier to understand for in part (c). In part (d) a number of
candidates referred to the amount of memory used and it running faster, but with modern processors this is
often not the case, or is very minimal, so not a true advantage.
Cambridge Ordinary Level
2210 Computer Science June 2015
Principal Examiner Report for Teachers
© 2015
In part (e) most candidates gave a correct response.
Questions 10(a) and 10(b)
Many candidates showed some knowledge of binary conversion in part (a) and could correctly convert the
values. Some candidates showed little knowledge and gave a random and incorrect response as a result.
In part (b) many candidates were able to correctly carry out the bit shift then covert the value to hex. Some
candidates gained marks for a correct bit shift but were unable to demonstrate the knowledge to convert the
values to hex so gained two marks. Candidates were awarded follow through marks if they had calculated
the values incorrectly in part (a) for both their bit shift and the hex conversion.

More Related Content

What's hot

Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan
 
Bitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & BlockchainBitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & Blockchain
Jitendra Chittoda
 
Html list
Html listHtml list
Html list
sayed fathey
 
The Complete HTML
The Complete HTMLThe Complete HTML
The Complete HTML
Rohit Buddabathina
 
Html tags
Html tagsHtml tags
Html tags
sotero66
 
Htmltag.ppt
Htmltag.pptHtmltag.ppt
Htmltag.ppt
anandha ganesh
 
Id and class selector
Id and class selectorId and class selector
Id and class selector
MyCredentials YourReference
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
Naman Rastogi
 
Data comm and networking
Data comm and networkingData comm and networking
Data comm and networking
Prof. Dr. K. Adisesha
 
Html list.
Html list.Html list.
Html list.
RUKHSARSHAIKH19
 
01 - Introduction to Hyperledger : A Blockchain Technology for Business
01 - Introduction to Hyperledger : A Blockchain Technology for Business01 - Introduction to Hyperledger : A Blockchain Technology for Business
01 - Introduction to Hyperledger : A Blockchain Technology for Business
Merlec Mpyana
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
Lionnel Yamentou
 
Blog ppt
Blog pptBlog ppt
Blog ppt
sahils123
 
What is merkle tree
What is merkle treeWhat is merkle tree
What is merkle tree
Celine George
 
Blockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptxBlockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptx
The NorthCap University
 
Evolution of www ppt
Evolution of www pptEvolution of www ppt
Evolution of www ppt
sequels
 
Computer Networks .ppt
Computer Networks .pptComputer Networks .ppt
Computer Networks .ppt
AbdulRehman515971
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain ppt
abhi sharma
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
kanaka vardhini
 
Block Chain
Block ChainBlock Chain
Block Chain
Md.Noman Hasan
 

What's hot (20)

Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Bitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & BlockchainBitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & Blockchain
 
Html list
Html listHtml list
Html list
 
The Complete HTML
The Complete HTMLThe Complete HTML
The Complete HTML
 
Html tags
Html tagsHtml tags
Html tags
 
Htmltag.ppt
Htmltag.pptHtmltag.ppt
Htmltag.ppt
 
Id and class selector
Id and class selectorId and class selector
Id and class selector
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
Data comm and networking
Data comm and networkingData comm and networking
Data comm and networking
 
Html list.
Html list.Html list.
Html list.
 
01 - Introduction to Hyperledger : A Blockchain Technology for Business
01 - Introduction to Hyperledger : A Blockchain Technology for Business01 - Introduction to Hyperledger : A Blockchain Technology for Business
01 - Introduction to Hyperledger : A Blockchain Technology for Business
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
Blog ppt
Blog pptBlog ppt
Blog ppt
 
What is merkle tree
What is merkle treeWhat is merkle tree
What is merkle tree
 
Blockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptxBlockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptx
 
Evolution of www ppt
Evolution of www pptEvolution of www ppt
Evolution of www ppt
 
Computer Networks .ppt
Computer Networks .pptComputer Networks .ppt
Computer Networks .ppt
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain ppt
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
Block Chain
Block ChainBlock Chain
Block Chain
 

Similar to 2210 s15 qp_ms_er_12

0417_s19_qp_11 (2).pdf
0417_s19_qp_11 (2).pdf0417_s19_qp_11 (2).pdf
0417_s19_qp_11 (2).pdf
ssuser1a942d
 
Blockchain Based Electronic Ballot System
Blockchain Based Electronic Ballot SystemBlockchain Based Electronic Ballot System
Blockchain Based Electronic Ballot System
IRJET Journal
 
M150 A Fall2010 T01
M150 A Fall2010 T01M150 A Fall2010 T01
M150 A Fall2010 T01
abdalodainat
 
The ultimate-guide-to-sql
The ultimate-guide-to-sqlThe ultimate-guide-to-sql
The ultimate-guide-to-sql
McNamaraChiwaye
 
The ultimate-guide-to-sql
The ultimate-guide-to-sqlThe ultimate-guide-to-sql
The ultimate-guide-to-sql
McNamaraChiwaye
 
Getting Started
Getting StartedGetting Started
Getting Started
Videoguy
 
COSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology AssignmentsCOSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology Assignments
Johnsmith5188
 
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .pptembedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
Tusharchauhan939328
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
ShardaSalunkhe1
 
Lab 3 Cover SheetNameAdders and Two’s ComplementDateGrade .docx
Lab 3 Cover SheetNameAdders and Two’s ComplementDateGrade .docxLab 3 Cover SheetNameAdders and Two’s ComplementDateGrade .docx
Lab 3 Cover SheetNameAdders and Two’s ComplementDateGrade .docx
smile790243
 
TDD for the Newb Who Wants to Become an Apprentice
TDD for the Newb Who Wants to Become an ApprenticeTDD for the Newb Who Wants to Become an Apprentice
TDD for the Newb Who Wants to Become an Apprentice
Howard Deiner
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digits
johnhwoodsslideshare
 
Attacks1
Attacks1Attacks1
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxDue 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
jacksnathalie
 
CodeChecker summary 21062021
CodeChecker summary 21062021CodeChecker summary 21062021
CodeChecker summary 21062021
Olivera Milenkovic
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction system
Rekha dudiya
 
PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)
Pace IT at Edmonds Community College
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
shrinivasgnaik
 
Validation verification
Validation  verificationValidation  verification
Validation verification
khair20
 
Net 6
Net 6Net 6

Similar to 2210 s15 qp_ms_er_12 (20)

0417_s19_qp_11 (2).pdf
0417_s19_qp_11 (2).pdf0417_s19_qp_11 (2).pdf
0417_s19_qp_11 (2).pdf
 
Blockchain Based Electronic Ballot System
Blockchain Based Electronic Ballot SystemBlockchain Based Electronic Ballot System
Blockchain Based Electronic Ballot System
 
M150 A Fall2010 T01
M150 A Fall2010 T01M150 A Fall2010 T01
M150 A Fall2010 T01
 
The ultimate-guide-to-sql
The ultimate-guide-to-sqlThe ultimate-guide-to-sql
The ultimate-guide-to-sql
 
The ultimate-guide-to-sql
The ultimate-guide-to-sqlThe ultimate-guide-to-sql
The ultimate-guide-to-sql
 
Getting Started
Getting StartedGetting Started
Getting Started
 
COSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology AssignmentsCOSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology Assignments
 
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .pptembedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
 
Error correction and detection th
Error correction and detection thError correction and detection th
Error correction and detection th
 
Lab 3 Cover SheetNameAdders and Two’s ComplementDateGrade .docx
Lab 3 Cover SheetNameAdders and Two’s ComplementDateGrade .docxLab 3 Cover SheetNameAdders and Two’s ComplementDateGrade .docx
Lab 3 Cover SheetNameAdders and Two’s ComplementDateGrade .docx
 
TDD for the Newb Who Wants to Become an Apprentice
TDD for the Newb Who Wants to Become an ApprenticeTDD for the Newb Who Wants to Become an Apprentice
TDD for the Newb Who Wants to Become an Apprentice
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digits
 
Attacks1
Attacks1Attacks1
Attacks1
 
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxDue 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
 
CodeChecker summary 21062021
CodeChecker summary 21062021CodeChecker summary 21062021
CodeChecker summary 21062021
 
project ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction systemproject ppt on anti counterfeiting technique for credit card transaction system
project ppt on anti counterfeiting technique for credit card transaction system
 
PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)PACE-IT: Basic Network Concepts (part 3)
PACE-IT: Basic Network Concepts (part 3)
 
Error detection and correction unit-05
Error detection and correction unit-05Error detection and correction unit-05
Error detection and correction unit-05
 
Validation verification
Validation  verificationValidation  verification
Validation verification
 
Net 6
Net 6Net 6
Net 6
 

More from Tabsheer Hasan

Lab Network Settings And Testing
Lab Network Settings And TestingLab Network Settings And Testing
Lab Network Settings And Testing
Tabsheer Hasan
 
How to train cortana to respond to your voice
How to train cortana to respond to your voiceHow to train cortana to respond to your voice
How to train cortana to respond to your voice
Tabsheer Hasan
 
How to turn on hey cortana on windows 10
How to turn on hey cortana on windows 10How to turn on hey cortana on windows 10
How to turn on hey cortana on windows 10
Tabsheer Hasan
 
How to pin cortana to your taskbar on
How to pin cortana to your taskbar on How to pin cortana to your taskbar on
How to pin cortana to your taskbar on
Tabsheer Hasan
 
Introduction To Computer
Introduction To ComputerIntroduction To Computer
Introduction To Computer
Tabsheer Hasan
 
How to set up cortana on windows 10
How to set up cortana on windows 10How to set up cortana on windows 10
How to set up cortana on windows 10
Tabsheer Hasan
 
Databases By ZAK
Databases By ZAKDatabases By ZAK
Databases By ZAK
Tabsheer Hasan
 
Data structures; arrays By ZAK
Data structures; arrays By ZAKData structures; arrays By ZAK
Data structures; arrays By ZAK
Tabsheer Hasan
 
Programming concepts By ZAK
Programming concepts By ZAKProgramming concepts By ZAK
Programming concepts By ZAK
Tabsheer Hasan
 
Pseudocode By ZAK
Pseudocode By ZAKPseudocode By ZAK
Pseudocode By ZAK
Tabsheer Hasan
 
problem solving and design By ZAK
problem solving and design By ZAKproblem solving and design By ZAK
problem solving and design By ZAK
Tabsheer Hasan
 
Ethics By ZAK
Ethics By ZAKEthics By ZAK
Ethics By ZAK
Tabsheer Hasan
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
Tabsheer Hasan
 
operating systems By ZAK
operating systems By ZAKoperating systems By ZAK
operating systems By ZAK
Tabsheer Hasan
 
memory, storage devices and media By ZAK
memory, storage devices and media By ZAKmemory, storage devices and media By ZAK
memory, storage devices and media By ZAK
Tabsheer Hasan
 
input devices By ZAK
input devices By ZAKinput devices By ZAK
input devices By ZAK
Tabsheer Hasan
 
1.3.2 computer architecture and the fetch execute cycle By ZAK
1.3.2 computer architecture and the fetch execute cycle By ZAK1.3.2 computer architecture and the fetch execute cycle By ZAK
1.3.2 computer architecture and the fetch execute cycle By ZAK
Tabsheer Hasan
 
computer architecture and the fetch execute cycle By ZAK
computer architecture and the fetch execute cycle By ZAKcomputer architecture and the fetch execute cycle By ZAK
computer architecture and the fetch execute cycle By ZAK
Tabsheer Hasan
 
logic gates By ZAK
logic gates By ZAKlogic gates By ZAK
logic gates By ZAK
Tabsheer Hasan
 
internet principles of operation By ZAK
internet principles of operation By ZAKinternet principles of operation By ZAK
internet principles of operation By ZAK
Tabsheer Hasan
 

More from Tabsheer Hasan (20)

Lab Network Settings And Testing
Lab Network Settings And TestingLab Network Settings And Testing
Lab Network Settings And Testing
 
How to train cortana to respond to your voice
How to train cortana to respond to your voiceHow to train cortana to respond to your voice
How to train cortana to respond to your voice
 
How to turn on hey cortana on windows 10
How to turn on hey cortana on windows 10How to turn on hey cortana on windows 10
How to turn on hey cortana on windows 10
 
How to pin cortana to your taskbar on
How to pin cortana to your taskbar on How to pin cortana to your taskbar on
How to pin cortana to your taskbar on
 
Introduction To Computer
Introduction To ComputerIntroduction To Computer
Introduction To Computer
 
How to set up cortana on windows 10
How to set up cortana on windows 10How to set up cortana on windows 10
How to set up cortana on windows 10
 
Databases By ZAK
Databases By ZAKDatabases By ZAK
Databases By ZAK
 
Data structures; arrays By ZAK
Data structures; arrays By ZAKData structures; arrays By ZAK
Data structures; arrays By ZAK
 
Programming concepts By ZAK
Programming concepts By ZAKProgramming concepts By ZAK
Programming concepts By ZAK
 
Pseudocode By ZAK
Pseudocode By ZAKPseudocode By ZAK
Pseudocode By ZAK
 
problem solving and design By ZAK
problem solving and design By ZAKproblem solving and design By ZAK
problem solving and design By ZAK
 
Ethics By ZAK
Ethics By ZAKEthics By ZAK
Ethics By ZAK
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
operating systems By ZAK
operating systems By ZAKoperating systems By ZAK
operating systems By ZAK
 
memory, storage devices and media By ZAK
memory, storage devices and media By ZAKmemory, storage devices and media By ZAK
memory, storage devices and media By ZAK
 
input devices By ZAK
input devices By ZAKinput devices By ZAK
input devices By ZAK
 
1.3.2 computer architecture and the fetch execute cycle By ZAK
1.3.2 computer architecture and the fetch execute cycle By ZAK1.3.2 computer architecture and the fetch execute cycle By ZAK
1.3.2 computer architecture and the fetch execute cycle By ZAK
 
computer architecture and the fetch execute cycle By ZAK
computer architecture and the fetch execute cycle By ZAKcomputer architecture and the fetch execute cycle By ZAK
computer architecture and the fetch execute cycle By ZAK
 
logic gates By ZAK
logic gates By ZAKlogic gates By ZAK
logic gates By ZAK
 
internet principles of operation By ZAK
internet principles of operation By ZAKinternet principles of operation By ZAK
internet principles of operation By ZAK
 

Recently uploaded

World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 

Recently uploaded (20)

World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 

2210 s15 qp_ms_er_12

  • 1. This document consists of 14 printed pages and 2 blank pages. DC (RW) 111393 © UCLES 2015 [Turn over Cambridge International Examinations Cambridge Ordinary Level *9470539200* COMPUTER SCIENCE 2210/12 Paper 1 Theory May/June 2015 1 hour 45 minutes Candidates answer on the Question Paper. No Additional Materials are required. No calculators allowed. READ THESE INSTRUCTIONS FIRST Write your Centre number, candidate number and name in the spaces at the top of this page. Write in dark blue or black pen. You may use an HB pencil for any diagrams, graphs or rough working. Do not use staples, paper clips, glue or correction fluid. DO NOT WRITE IN ANY BARCODES. Answer all questions. No marks will be awarded for using brand names of software packages or hardware. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. The maximum number of marks is 75.
  • 2. 2 2210/12/M/J/15© UCLES 2015 1 (a) Four statements about cookies are shown in the table below. Study each statement. Tick (✓) to show whether the statement is true or false. Statement True False they are a form of spyware they are used only in advertising they are used to track browser use they act in the same way as a virus [4] (b) Five descriptions and five security issues are shown below. Draw a line to connect each description to the correct security issue. Description Security issue malicious code installed on the hard drive of a user’s computer or on the web server; this code will re-direct user to a fake web site without their consent hacking software that gathers information by monitoring key presses on a user’s computer and relays the information back to the person who sent the software pharming program or code that replicates itself and is designed to amend, delete or copy data and files on a user’s computer without their consent phishing the act of gaining illegal access to a computer system without the owner’s consent spyware creator of code sends out a legitimate-looking email in the hope of gathering personal and financial data; it requires the recipient to follow a link in the email or open an attachment virus [4]
  • 3. 3 2210/12/M/J/15© UCLES 2015 [Turn over 2 The majority of mobile phones use touch screens. Three common technologies are used by different mobile phone manufacturers. Choose one of the following mobile phone technologies: • resistive • capacitive • infrared Chosen technology .......................................................................................................................... (i) Describe how your chosen technology works to allow a user to make selections by touching the screen. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[2] (ii) Give one benefit and one drawback of your chosen technology when used on mobile phone touch screens. Benefit ................................................................................................................................................... ................................................................................................................................................... Drawback ................................................................................................................................................... ................................................................................................................................................... [2]
  • 4. 4 2210/12/M/J/15© UCLES 2015 3 Four input devices, four descriptions and four applications are shown below. Draw a line to connect each input device to its correct description. Then connect each description to its correct application. Input device Description Application barcode reader copies paper documents and converts the text and pictures into a computer-readable form voice recognition microphone reads labels containing parallel dark and light lines using laser light or LEDs; the width of each line represents a binary code reading passports pH sensor detects changes in acidity levels; data is often in analogue form automatic stock control scanner device that allows audio signals to be converted into electric signals; these can be interpreted by a computer after being converted into digital form monitor soil in a greenhouse [6]
  • 5. 5 2210/12/M/J/15© UCLES 2015 [Turn over 4 (a) State what is meant by the term SSL. ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[1] (b) The following stages take place when a user wishes to access a secure website. Put each stage in sequence by writing the numbers 1 to 6 in the column on the right. The first one has been done for you. Stage Sequence number the encrypted data is then shared securely between the web browser and the web server the web browser attempts to connect to a website which is secured by SSL 1 the web server sends the web browser a copy of its SSL certificate the web browser requests the web server to identify itself the web server will then send back some form of acknowledgement to allow the SSL encrypted session to begin the web browser checks whether the SSL certificate is trustworthy; if it is, then the web browser sends a message back to the web server [5]
  • 6. 6 2210/12/M/J/15© UCLES 2015 5 Parity checks are often used to check for errors that may occur during data transmission. (a) A system uses even parity. Tick (✓) to show whether the following three bytes have been transmitted correctly or incorrectly. Received byte Byte transmitted correctly Byte transmitted incorrectly 1 1 0 0 1 0 0 0 0 1 1 1 1 1 0 0 0 1 1 0 1 0 0 1 [3] (b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data. The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per character). A tenth byte, the parity byte, was also transmitted. The following block of data shows all ten bytes received after transmission. The system uses even parity and column 1 is the parity bit. letter column 1 column 2 column 3 column 4 column 5 column 6 column 7 column 8 byte 1 F 1 0 1 0 0 1 1 0 byte 2 L 1 0 1 0 1 1 0 0 byte 3 O 1 0 1 0 1 1 1 1 byte 4 W 1 0 1 1 0 1 1 1 byte 5 C 1 0 1 0 0 0 1 1 byte 6 H 0 0 1 0 1 0 0 0 byte 7 A 0 0 1 0 0 1 0 1 byte 8 R 1 0 1 1 0 0 1 0 byte 9 T 1 0 1 1 0 1 0 0 parity byte 1 0 1 1 1 1 1 0 (i) One of the bits has been transmitted incorrectly. Write the byte number and column number of this bit: Byte number ...................................................................................................................... Column number ................................................................................................................. [2]
  • 7. 7 2210/12/M/J/15© UCLES 2015 [Turn over (ii) Explain how you arrived at your answer for part (b)(i). ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... .......................................................................................................................................[2] (c) Give the denary (base 10) value of the byte: 1 0 1 1 1 1 1 0 ................................................................................................................................................... ...............................................................................................................................................[1] (d) A parity check may not identify that a bit has been transmitted incorrectly. Describe one situation in which this could occur. ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[1]
  • 8. 8 2210/12/M/J/15© UCLES 2015 6 A gas fire has a safety circuit made up of logic gates. It generates an alarm (X = 1) in response to certain conditions. Input Description Binary value Conditions G gas pressure 1 gas pressure is correct 0 gas pressure is too high C carbon monoxide level 1 carbon monoxide level is correct 0 carbon monoxide level is too high L gas leak detection 1 no gas leak is detected 0 gas leak is detected The output X = 1 is generated under the following conditions: gas pressure is correct AND carbon monoxide level is too high OR carbon monoxide level is correct AND gas leak is detected (a) Draw a logic circuit for this safety system. [5]
  • 9. 9 2210/12/M/J/15© UCLES 2015 [Turn over (b) Complete the truth table for the safety system. G C L Workspace X 0 0 0 0 0 1 0 1 0 0 1 1 1 0 0 1 0 1 1 1 0 1 1 1 [4] (c) Complete the truth table for the XOR gate: A B C 0 0 0 1 1 0 1 1 [1]
  • 10. 10 2210/12/M/J/15© UCLES 2015 7 (a) Street lighting is controlled automatically. A light sensor and a microprocessor are used to decide when to switch each street light on or off. Describe how the sensor, microprocessor and light interact to switch the street light on or off. Include in your answer how the microprocessor stops the street lights being frequently switched on and off due to brief changes in the light intensity. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[5] (b) Name three different sensors (other than light and pH) and describe an application for each of these sensors. A different application is needed for each sensor. Sensor 1 ................................................................................................................................... Application ................................................................................................................................ ................................................................................................................................................... Sensor 2 ................................................................................................................................... Application ................................................................................................................................ ................................................................................................................................................... Sensor 3 ................................................................................................................................... Application ................................................................................................................................ ................................................................................................................................................... [6]
  • 11. 11 2210/12/M/J/15© UCLES 2015 [Turn over 8 Five computing terms are described below. Write the name of the term being described. Software that anyone can download for free from the Internet and then use without having to pay any fees. The usual copyright laws apply and a user license is important. ................................................ Software that gives the user the chance to try it out free of charge before actually buying it. The software is subject to the usual copyright laws. As a rule, not all the features found in the full version are available at this stage. ................................................ Software where users have freedom to run, copy, change and adapt it. This is an issue of liberty and not of price since the software guarantees freedom and the right to study and modify the software by having access to the actual source code. ................................................ Set of principles that regulates the use of computers in everyday life. This covers intellectual property rights, privacy issues and the effects of computers on society in general. ................................................ The taking of somebody’s idea or software and claim that the idea or software code were created by the “taker”. ................................................ [5]
  • 12. 12 2210/12/M/J/15© UCLES 2015 9 (a) Five statements about interpreters and compilers are shown in the table below. Study each statement. Tick (✓) to show whether the statement refers to an interpreter or to a compiler. Statement Interpreter Compiler creates an executable file that runs directly on the computer more likely to crash the computer since the machine code produced runs directly on the processor easier to debug since each line of code is analysed and checked before being executed slow speed of execution of program loops it is more difficult to modify the executable code, since it is in machine code format [5] (b) State why a compiler or an interpreter is needed when running a high-level program on a computer. ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[1] (c) Give one benefit of writing a program in a high-level language. ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[1] (d) Give one benefit of writing a program in a low-level language. ................................................................................................................................................... ................................................................................................................................................... ...............................................................................................................................................[1]
  • 13. 13 2210/12/M/J/15© UCLES 2015 [Turn over (e) Study the following three sections of code. A: 1 0 1 0 1 1 0 1 1 1 0 0 1 1 1 0 1 0 1 1 0 1 1 1 B: LDA X INC X STA Y C: FOR x ← 1 TO 10 READ n ENDFOR Identify, using the letters A, B or C, which of the above codes is an example of assembly code, high-level language code or machine code: Assembly code ......................................................................................................................... High-level language code ......................................................................................................... Machine code ........................................................................................................................... [2]
  • 14. 14 2210/12/M/J/15© UCLES 2015 10 Letters from the alphabet are represented in a computer by the following denary (base 10) values: A = 97 G = 103 I = 105 L = 108 N = 110 The word “A L I G N” is stored as: 97 108 105 103 110 (a) Convert each of the five values to binary. The first one has been done for you. Letter Denary value A (97): 0 1 1 0 0 0 0 1 L (108): I (105): G (103): N (110): [2] (b) An encryption system works by shifting the binary value for a letter one place to the left. “A” then becomes: 1 1 0 0 0 0 1 0 This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be: C 2 For the two letters “L” and “G”, shift the binary values one place to the left and convert these values into hexadecimal: hexadecimal L: ............................................. G: ............................................. [4]
  • 16. 16 2210/12/M/J/15© UCLES 2015 Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will be pleased to make amends at the earliest possible opportunity. To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after the live examination series. Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge. BLANK PAGE
  • 17. ® IGCSE is the registered trademark of Cambridge International Examinations. CAMBRIDGE INTERNATIONAL EXAMINATIONS Cambridge Ordinary Level MARK SCHEME for the May/June 2015 series 2210 COMPUTER SCIENCE 2210/12 Paper 1, maximum raw mark 75 This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the details of the discussions that took place at an Examiners’ meeting before marking began, which would have considered the acceptability of alternative answers. Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for Teachers. Cambridge will not enter into discussions about these mark schemes. Cambridge is publishing the mark schemes for the May/June 2015 series for most Cambridge IGCSE® , Cambridge International A and AS Level components and some Cambridge O Level components.
  • 18. Page 2 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 1 (a) 1 mark per correctly placed tick Statement True False they are a form of spyware they are used in advertising only they are used to track the browsing of a user they act in the same way as a virus [4] (b) 4/5 matches – 4 marks 3 matches – 3 marks 2 matches – 2 marks 1 match – 1 mark [4] malicious code installed on the hard drive of a user’s computer or on the web server; this code will re-direct user to a fake web site without their consent software that gathers information by monitoring key presses on a user’s computer and relays the information back to the person who sent the software program or code that replicates itself and is designed to amend/delete/copy data and files on a user’s computer without their consent the act of gaining illegal access to a computer system without the owner’s consent creator of code sends out a legitimate-looking email in the hope of gathering personal and financial data from the recipient; it requires the email or attachment to be opened first hacking pharming phishing spyware virus
  • 19. Page 3 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 2 (i) Either of the three options, resistive, capacitive or infra-red must be chosen maximum of two marks from chosen technology: resistive − uses multiple layers of material … − … that transmit electric currents − when the top layer/screen is pushed/touched into the lower/bottom layer … − … the electric current changes and location of “touch” is found capacitive − current sent/flows out from all 4 corners of the screen − when finger/stylus touches screen, the current changes − the location of “touch” is calculated infra-red − an “invisible” grid on the screen (pattern of infra-red LED beams) − sensors detect where the screen has been touched through a break in an infrared beam(s) − the position where the screen touched is calculated [2] (ii) 1 mark for benefit, 1 mark for drawback Resistive benefits: − inexpensive/cheap to manufacture − can use stylus/finger/gloved finger/pen drawbacks: − poor visibility in sunlight − vulnerable to scratching − wears through time − does not allow multi-touch facility capacitive benefits: − good visibility in sunlight − (very) durable surface − allows multi-touch facility drawbacks: − screen (glass) will shatter/break/crack (on impact) − cannot use when wearing (standard) gloves infra-red benefits: − good durability − allows multi-touch facility − can use stylus/finger/gloved finger/pen drawbacks: − expensive to manufacture − screen (glass) will shatter/break/crack (on impact) − sensitive to dust/dirt [2]
  • 20. Page 4 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 3 Input Device to Description Description to Application 3/4 matches – 3 marks 3/4 matches – 3 marks 2 matches – 2 marks 2 matches – 2 marks 1 match – 1 mark 1 match – 1 mark [6] copies paper documents and converts the text and pictures into a computer-readable form reads labels containing parallel dark and light lines using laser light; the width of each line represents a binary code detects changes in acidity levels; data is often in analogue form audio device that allows audio signals to be converted into electric signals which can be interpreted by a computer after being converted into digital barcode reader microphone pH sensor scanner voice recognition reading passports automatic stock control monitor soil in a greenhouse
  • 21. Page 5 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 4 (a) Any one from: − secure sockets layer − encrypts data being transmitted − use of https − use public and private keys [1] (b) 1 mark for each number in the correct order, next to the correct stage. Stage Sequence number the encrypted data is then shared securely between the web browser and the web server 6 the web browser attempts to connect to a web site which is secured by SSL (1) the web server sends the web browser a copy of its SSL certificate 3 the web browser requests the web server to identify itself 2 the web server will then send back some form of acknowledgement to allow the SSL encrypted session to begin 5 the web browser checks whether the SSL certificate is trustworthy; if it is then the web browser sends a message back to the web server 4 [5]
  • 22. Page 6 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 5 (a) 1 mark per correctly placed tick Received byte Byte transmitted correctly Byte transmitted incorrectly 1 1 0 0 1 0 0 0 0 1 1 1 1 1 0 0 0 1 1 0 1 0 0 1 [3] (b) (i) byte number: 7 column number: 6 [2] (ii) Any two from: − letter “A”(byte 7) transmitted as odd parity (three 1s) − column 6 has odd parity (seven 1s) − intersection of byte 7 and column 6 indicates incorrect bit value [2] (c) 190 [1] (d) Any one from: − 2 bits interchanged (e.g. 1 → 0 and 0 → 1) that won’t change parity value − even number of bits/digits are transposed − If there are multiple errors in the same byte/column, that still produce the same parity bit, the error will not be detected [1]
  • 23. Page 7 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 6 (a) 1 mark per correct logic gate, correctly connected [5] (b) G C L Workspace X 0 0 0 0 ]1 mark 0 0 1 0 0 1 0 1 ]1 mark 0 1 1 0 1 0 0 1 ]1 mark 1 0 1 1 1 1 0 1 ]1 mark 1 1 1 0 [4] G C L X
  • 24. Page 8 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 (c) 1 mark for correctly completed truth table A B C 0 0 0 0 1 1 1 0 1 1 1 0 [1] 7 (a) Maximum 5 marks in total for question part Description of how street light is controlled: (max 4 marks) − sensor sends signal/data to the microprocessor − signal/data converted to digital/using ADC − microprocessor compares value to a stored value − if input value < stored value … − … signal sent from microprocessor to actuator − … and light is switched on/off − whole process continues in an infinite loop Avoiding frequent on/off switches: (max 2 marks) − microprocessor continues to keep light on/off for a pre-determined period − after pre-determined period, sensor output is again sampled [5]
  • 25. Page 9 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 (b) 1 mark for correct sensor, 1 mark for its matching application (all THREE applications must be different) sensor application infra-red/motion automatic doors burglar alarm systems temperature chemical process central heating/air con system greenhouse environment oven sound/acoustic burglar alarm systems leak detection system disco lighting moisture/humidity clothes drier environmental control (greenhouse, air con) pressure burglar alarm system traffic light control chemical process carbon dioxide/ pollution monitoring in a river oxygen/gas greenhouse environment (growth control) confined area (e.g. space craft) Fish tank/Aquarium magnetic field mobile phone anti-lock braking CD players [6] 8 1 mark per correct word Freeware Shareware Free software (Computer) Ethics Plagiarism [5]
  • 26. Page 10 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 9 (a) 1 mark per correctly placed tick statement interpreter compiler creates an executable file that runs directly on the computer more likely to crash the computer since the machine code produced runs directly on the processor easier to debug since each line of code is analysed and checked before being executed slow speed of execution of program loops it is more difficult to modify the code since the executable code is now in machine code format [5] (b) Any one from: − code is required to be converted into machine code/binary − code needs to be produced that can be understood by the computer [1] (c) Any one from: − close to English/native/human language − easier/faster to correct errors/read/write − works on many different machines/operating systems (portable) [1] (d) Any one from: − work directly on registers/CPU − more control over what happens in computer − can use machine specific functions [1] (e) 1 mark per correct letter, maximum 2 marks Assembly code: B High-level language code: C Machine code: A [2]
  • 27. Page 11 Mark Scheme Syllabus Paper Cambridge O Level – May/June 2015 2210 12 © Cambridge International Examinations 2015 10 (a) 1 mark for two correct lines, 2 marks for four correct lines [2] (b) 1 mark for each correct binary value 1 mark for each correct hexadecimal value hexidecimal L: 1 1 0 1 1 0 0 0 D8 G: 1 1 0 0 1 1 1 0 CE [4] 0 1 1 0 1 1 0 0 0 1 1 0 1 0 0 1 0 1 1 0 0 1 1 1 0 1 1 0 1 1 1 0 L (108): I (105): G (103): N (110):
  • 28. Cambridge Ordinary Level 2210 Computer Science June 2015 Principal Examiner Report for Teachers © 2015 COMPUTER SCIENCE Paper 2210/12 Paper 1 Key Messages This is a new syllabus and the standard of candidates work was mostly very good. There is a continued move to provide questions where candidates have to apply their knowledge, rather than just show their ability to simply remember facts. There is strong evidence that this is producing candidates who are now exhibiting a good understanding of many of the topics. General Comments Candidates and centres are reminded that written papers are now scanned in and marked on computer screens by Examiners. Consequently, if a candidate writes the answer to a question on an additional page they must indicate very clearly to the Examiner where their revised answer is to be found. Also if answers have been crossed out, the new answers must be written very clearly so that Examiners can easily read the text and award candidates the appropriate mark. Comments on Specific Questions Questions 1(a) and 1(b) In part (a) the full range of marks were awarded with most candidates gaining three or four marks. The most common error was candidates mistaking cookies for being spyware. In part (b) the full range of marks were awarded and candidates displayed a good level of knowledge of security issues. The most common error was candidates confusing the definition of phishing and pharming. Questions 2(i) and (ii) Very few candidates displayed knowledge of touch screen technology. Very few candidates gained marks for this question and generally repeated phrases from the question, rather that describing how touch screen technology works. Candidate’s answers were mostly too vague, with a simplistic level of knowledge displayed. The most common answer given was infrared technology. In terms of infrared touch screen technology candidates gave a vague description of a heat based method, but most infrared touch screen technology works with a grid of infrared beams that are interrupted to register a ‘touch’ on the screen. Question 3 Many candidates displayed an excellent level of knowledge input devices and their uses, gaining five or six marks for the answer. The most common error was candidates confusing stock control and reading passports. Questions 4(a) and 4(b) Most candidates gained a mark for their answer to part (a). This was mainly through stating Secure Sockets Layer as the full name for SSL. Those candidates that did not provide the name, but instead gave a description of SSL involving encryption and web servers also gained a mark. In part (b) the full range of marks were awarded with many candidates demonstrating a good level of knowledge of secure websites. The most common error was the confusion of steps 2 and 3.
  • 29. Cambridge Ordinary Level 2210 Computer Science June 2015 Principal Examiner Report for Teachers © 2015 Questions 5(a), 5(b), 5(c) and 5(d) In part (a) many candidates gained full marks. The most common error was candidates inverting the responses and getting all three incorrect. In part (b)(i) the full range of marks were awarded. Most candidates chose the correct byte number but a range of answers were given for the column number with only some candidates giving the correct column. In part (b)(ii) some candidates were able to give a clear description how they had arrived at their answer through counting the number of 1’s in a byte/column and checking if this was odd/even. However some candidates struggled to explain how they had arrived at their answer giving a vague description or referring to counting zeroes rather than ones. Many candidates were able to give a correct answer for part (c) and demonstrated a good understanding of binary conversion. Some candidates seemed to correctly map out the calculation needed but noted an incorrect response as their answer so a mark could not be awarded. In part (d) most candidates demonstrated some understanding that if bits were transposed an error may not be detected, but candidates needed to describe that it would need to be an even number of bits that were transposed, and some were too vague in their response due to this. Questions 6(a), 6(b) and 6(c) Many candidates demonstrated a good level of knowledge of producing logic gates in part (a). Candidates just need to make sure that they draw the gates very clearly. They need to make sure that the small circle at the front of a NOT logic gate is included and is visible in order for it to be a valid NOT gate. The most common error was the emission of the NOT logic gates from the circuit. In part (b) the full range of marks were awarded. Those candidates gaining higher marks normally correlated to a correct answer given in part (a). In part (c) around 50% of candidates could correctly give the output of an XOR gate. Questions 7(a) and 7(b) The full range of marks were awarded in part (a), but not many responses gained full marks. Most candidates gave a good description of a sensor sending data/signal to a microprocessor and the value being compared to a stored value. Some candidates included the use of an analogue to digital converter. Very few candidates acknowledged the issue of preventing the lights frequently turning on and off. A most common error in this questions was candidates that incorrectly referring to the microprocessor sending ‘information’ rather than ‘data’ or a ‘signal’. Most candidates gained some marks in part (b) with the full range being awarded. Some candidates were too vague in their naming of the sensor, for example a heat sensor, and some candidates repeated the application they gave for different parts of the question. Question 8 Some candidates demonstrated a good level of knowledge of computing terms and gained full marks but a number of vague and confused responses were also give. Some candidates confused freeware and free software, and some candidates referred to trial software, which was too vague. Question 9(a), 9(b), 9(c), 9(d) and 9(e) In part (a) many candidates demonstrated a good knowledge of compilers and interpreters, gaining full marks. The most common errors for incorrect answers occurred in the first and fourth rows. In parts (b), (c) and (d) candidates either gave a clear description demonstrating a good level of knowledge or a very vague response. Common errors were a reference to machine language rather than machine code in part (b) and not stating who machine code was easier to understand for in part (c). In part (d) a number of candidates referred to the amount of memory used and it running faster, but with modern processors this is often not the case, or is very minimal, so not a true advantage.
  • 30. Cambridge Ordinary Level 2210 Computer Science June 2015 Principal Examiner Report for Teachers © 2015 In part (e) most candidates gave a correct response. Questions 10(a) and 10(b) Many candidates showed some knowledge of binary conversion in part (a) and could correctly convert the values. Some candidates showed little knowledge and gave a random and incorrect response as a result. In part (b) many candidates were able to correctly carry out the bit shift then covert the value to hex. Some candidates gained marks for a correct bit shift but were unable to demonstrate the knowledge to convert the values to hex so gained two marks. Candidates were awarded follow through marks if they had calculated the values incorrectly in part (a) for both their bit shift and the hex conversion.