s15 QP 12
s15 QP 12
s15 QP 12
com
Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
The maximum number of marks is 75.
DC (ST/FD) 101512/1
© UCLES 2015 [Turn over
www.dynamicpapers.com
2
1 (a) Four statements about cookies are shown in the table below.
(b) Five descriptions and five security issues are shown below.
[4]
2 The majority of mobile phones use touch screens. Three common technologies are used by
different mobile phone manufacturers.
• resistive
• capacitive
• infrared
(i) Describe how your chosen technology works to allow a user to make selections by touching
the screen.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(ii) Give one benefit and one drawback of your chosen technology when used on mobile phone
touch screens.
Benefit
...................................................................................................................................................
...................................................................................................................................................
Drawback
...................................................................................................................................................
...................................................................................................................................................
[2]
3 Four input devices, four descriptions and four applications are shown below.
Draw a line to connect each input device to its correct description. Then connect each description
to its correct application.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
(b) The following stages take place when a user wishes to access a secure website.
Put each stage in sequence by writing the numbers 1 to 6 in the column on the right. The first
one has been done for you.
Sequence
Stage
number
the encrypted data is then shared securely between the web browser
and the web server
the web server sends the web browser a copy of its SSL certificate
the web server will then send back some form of acknowledgement to
allow the SSL encrypted session to begin
5 Parity checks are often used to check for errors that may occur during data transmission.
Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.
11001000
01111100
01101001
[3]
(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.
The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per
character). A tenth byte, the parity byte, was also transmitted.
The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.
(ii) Explain how you arrived at your answer for part (b)(i).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(c) Give the denary (base 10) value of the byte: 1 0111110
...................................................................................................................................................
...............................................................................................................................................[1]
(d) A parity check may not identify that a bit has been transmitted incorrectly.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
6 A gas fire has a safety circuit made up of logic gates. It generates an alarm (X = 1) in response to
certain conditions.
Binary
Input Description Conditions
value
1 gas pressure is correct
G gas pressure
0 gas pressure is too high
1 carbon monoxide level is correct
C carbon monoxide level
0 carbon monoxide level is too high
1 no gas leak is detected
L gas leak detection
0 gas leak is detected
OR
&
;
[5]
Workspace
G C L X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
A B C
0 0
0 1
1 0
1 1
[1]
7 (a) Street lighting is controlled automatically. A light sensor and a microprocessor are used to
decide when to switch each street light on or off.
Describe how the sensor, microprocessor and light interact to switch the street light on or off.
Include in your answer how the microprocessor stops the street lights being frequently
switched on and off due to brief changes in the light intensity.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]
(b) Name three different sensors (other than light and pH) and describe an application for each
of these sensors.
Sensor 1 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 2 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
Sensor 3 ...................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[6]
Software that anyone can download for free from the Internet
and then use without having to pay any fees. The usual
copyright laws apply and a user license is important.
................................................
Software that gives the user the chance to try it out free of
charge before actually buying it. The software is subject to the
usual copyright laws. As a rule, not all the features found in the
full version are available at this stage.
................................................
9 (a) Five statements about interpreters and compilers are shown in the table below.
(b) State why a compiler or an interpreter is needed when running a high-level program on a
computer.
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[1]
A: 1 0 1 0 1 1 0 1
1 1 0 0 1 1 1 0
1 0 1 1 0 1 1 1
B: LDA X
INC X
STA Y
C: FOR x ← 1 TO 10
READ n
ENDFOR
Identify, using the letters A, B or C, which of the above codes is an example of assembly
code, high-level language code or machine code:
10 Letters from the alphabet are represented in a computer by the following denary (base 10) values:
A = 97
G = 103
I = 105
L = 108
N = 110
(a) Convert each of the five values to binary. The first one has been done for you.
A (97): 0 1 1 0 0 0 0 1
L (108):
I (105):
G (103):
N (110):
[2]
(b) An encryption system works by shifting the binary value for a letter one place to the left. “A”
then becomes:
1 1 0 0 0 0 1 0
This binary value is then converted to hexadecimal; the hexadecimal value for “A” will be:
C 2
For the two letters “L” and “G”, shift the binary values one place to the left and convert these
values into hexadecimal:
hexadecimal
L: .............................................
G: .............................................
[4]
BLANK PAGE
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.
Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.