Computer Science Paper 1 HL Nov 2017
Computer Science Paper 1 HL Nov 2017
Computer Science Paper 1 HL Nov 2017
Computer science
Higher level
Paper 1
2 hour 10 minutes
Instructions to candidates
yy Do not open this examination paper until instructed to do so.
yy Section A: answer all questions.
yy Section B: answer all questions.
yy The maximum mark for this examination paper is [100 marks].
8817 – 7011
9 pages © International Baccalaureate Organization 2017
–2– N17/4/COMSC/HP1/ENG/TZ0/XX
Section A
3. Identify one method of inputting data that can improve the accessibility of a computer
system for some users. [1]
A B A NOR B (A NOR B) OR A
FALSE FALSE … …
… … … …
mystery(N)
if (N > 0) AND (N mod 2 = 0) then
mystery(N−2)
end if
output N
end mystery
(a) Determine the output produced by the method call mystery(5). [1]
(b) Determine the output produced by the method call mystery(4). [3]
(c) Construct an iterative algorithm for the method mystery(), which uses a single
while loop instead of recursion. [4]
–3– N17/4/COMSC/HP1/ENG/TZ0/XX
7. The machine instruction cycle is the process by which a program instruction is fetched,
decoded, executed and the results are stored.
(a) State where all instructions and data are stored. [1]
(b) Outline the role of the data bus and address bus in this process. [2]
Turn over
–4– N17/4/COMSC/HP1/ENG/TZ0/XX
Section B
(a) Describe how a spellchecker checks whether a word in a text file is correctly spelt
or not. [2]
The office manager decides to buy and install new software and hardware.
(b) Outline one problem that may arise from the installation of new hardware and software
in the office. [2]
The changeover to the new system can be achieved by either direct changeover or
phased conversion.
The new software allows basic text summaries and analysis to help check text files,
including functions such as calculating word frequency.
For example, consider the character array MESSAGE, which is of length 19.
[0] [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18]
A U R O R A M U S I S A M I C A .
(e) Construct an efficient algorithm for the method findFirst(). You should use the
function len(), which returns the number of characters in an array (for example,
len(MESSAGE) returns 19). [6]
–5– N17/4/COMSC/HP1/ENG/TZ0/XX
11. A wireless local area network (WLAN) is used to extend access to a school’s wired
local area network.
(a) Identify one hardware component of the WLAN, other than computers. [1]
The advantages of this WLAN are user-mobility and economical access points.
(c) Identify three ways in which the network administrator can reduce the risk of
unauthorized access to confidential data. [3]
(e) With reference to Figure 1, explain how data is transferred by packet switching. [6]
Turn over
–6– N17/4/COMSC/HP1/ENG/TZ0/XX
12. A biotechnology company owns a resource centre which collects and classifies organisms
for use in research.
Only authorized employees are allowed access to some laboratories in the resource centre.
These laboratories are protected by locked doors. Each door is controlled by a separate
microprocessor. A digital camera is used to scan the iris of an employee who wishes to
enter the lab. If the employee is authorized the doors are unlocked.
(a) Identify two benefits of using a digital camera as an input device in this control system. [2]
The company is planning to use a centralized computer system to secure the resource
centre’s building.
(d) Compare a centrally controlled system with the system described above. [4]
(f) Suggest with reasons which of these two techniques is the most appropriate for this
centrally controlled system. [3]
–7– N17/4/COMSC/HP1/ENG/TZ0/XX
Consider the following doubly linked list which holds the names of flowers in
alphabetical order.
(b) Explain how “Primrose” could be inserted into this doubly linked list. You should draw
a labelled diagram in your answer. [6]
FLOWERS FRUITS
Aster Apple
Broom Cherry
Camellia Orange
Day Lily Pear
Lavender
Primrose
Yarrow
A third stack, FLOFRU, is needed. It should contain all the data from FLOWERS and FRUITS
and will store it as shown below
FLOFRU
Yarrow
Primrose
Lavender
Day Lily
Camellia
Broom
Aster
Pear
Orange
Cherry
Apple
Turn over
–8– N17/4/COMSC/HP1/ENG/TZ0/XX
The value −1 is stored in MAT at position [4][2]. The position [4][2] means row 4
and column 2.
A two-dimensional array in which most of the elements are zero is called a sparse matrix.
A sparse matrix can be compressed by storing only non-zero elements using three
one‑dimensional arrays.
The first array, VALUES, stores all non-zero elements taken from the sparse matrix in
row‑major order (left-to-right then top-to-bottom order).
The length of the array VALUES is equal to the number of non-zero elements in the sparse
matrix. For the sparse matrix above, MAT, the array VALUES is:
The second array is ROWC. ROWC[i] stores the number of non-zero elements, from row 0 to
row i of the sparse matrix, inclusive.
The length of ROWC is equal to the number of rows in the sparse matrix. For MAT the array
ROWC is:
For example, ROWC[2] stores 3 because in MAT there are three non-zero elements from
row 0 to row 2, inclusive.
The third array, COL, stores the column index for each non-zero element in the sparse
matrix. COL[i] stores the sparse matrix column index for the non-zero element stored in
VALUES[i]. For MAT the array COL is:
(Question 14 continued)
Consider the following three arrays. They hold the compressed contents of a 7 × 7 sparse
matrix, BIGMAT.
VALUES
[0] [1] [2] [3] [4] [5] [6] [7] [8] [9]
15 20 37 43 57 60 70 89 90 92
ROWC
[0] [1] [2] [3] [4] [5] [6]
1 3 4 5 5 7 10
COL
[0] [1] [2] [3] [4] [5] [6] [7] [8] [9]
0 1 2 1 3 0 1 0 5 6
(d) For a given column, C, in BIGMAT, outline how it could be determined that this column
contains no non-zero elements. [2]
(e) State how many rows in BIGMAT contain only zeros. [1]
(f) (i) State the index in VALUES of the first non-zero element in row 5 of BIGMAT. [1]
(ii) For a given row, R, in BIGMAT, determine the range of indexes in VALUES where
non-zero elements in row R of BIGMAT are placed. You may assume that there
is at least one non-zero element in row R. [3]