Class IX-O: Bahria Town School & College Mid-Year Examination 2020

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Bahria Town School & College

Mid-Year Examination 2020


Class IX-O
* 8 8 9 3 9 3 6 0 2 6 *

COMPUTER SCIENCE 2210


Class 9-O
Paper 1 Theory
December 2019
1 hour 30 minutes
Candidate answer on question paper
No Additional Materials are required.
No calculators allowed.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

No marks will be awarded for using brand names of software packages or hardware.

Any businesses described in this paper are entirely fictitious.

At the end of the examination, fasten all your work securely together.

The number of marks is given in brackets [ ] at the end of each question or part question.

The maximum number of marks is 75

This document consists of 11 printed pages and 1 blank page.


2
1 Hexadecimal is used for MAC addresses.

Part of a MAC address is given:

97 – 5C – E1
Each pair of digits is stored as binary in an 8-bit register.

(a) Show what the binary register stores for each pair of the given digits.

97

5C

E1
[3]

(b) Explain what is meant by a MAC address.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(c) Give two other examples where hexadecimal can be used.

Example 1 .................................................................................................................................

...................................................................................................................................................

Example 2 .................................................................................................................................

...................................................................................................................................................
[2]
3

The MAC address of a device is represented using hexadecimal.

A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary.

(d) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The
first number has already been converted.

6A FF 08 93
01101010
[3]

(e) Explain why data is stored as binary in computers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

2 Data can be transferred using half-duplex serial transmission.

(a) Describe serial transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Give one application of serial data transmission.

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Describe half-duplex data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]
4

3 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check for errors during data
transmission and storage.

(a) A system uses even parity. Write the appropriate parity bit for each byte.

Parity Bit
1 0 1 0 0 1 1
1 0 1 1 1 1 1
1 0 1 0 0 0 1
[2]

(b) Explain how Automatic Repeat reQuests (ARQ) are used in data transmission and storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) State one other method that could be used to check for transmission errors.

...............................................................................................................................................[1]
5

4. (a) Convert the following hexadecimal number into 12-bit binary:

4AF

[3]

(b) The 2016 Olympic Games will be held in Rio de Janeiro. A timer that counts down to the
opening of the Games is shown on a microprocessor-controlled display.

The number of hours, minutes and seconds until the Games open are held in three 8-bit
registers.

The present register values are:

0 1 1 0 1 0 0 1 105 hours

0 0 1 0 0 0 0 0 32 minutes

0 0 0 1 0 1 0 0 20 seconds

The timer will count down in seconds.

(i) Show the values in each 8-bit register 30 seconds after the time shown above:

hours

minutes

seconds
[3]

(ii) Write the hexadecimal value of the minutes register from part (b)(i).

.........................................................................................................[1]
6

5. (a) Three descriptions of data transmission are given

below. Tick (✓) the appropriate box in each table to show

the:

• type of transmission
• method of transmission

Description 1:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted several bits at
a time down several wires in both simplex serial
directions simultaneously.
half-duplex parallel

full-duplex

Description 2:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted in one direction
only, one bit at a time, down a simplex serial
single wire.
half-duplex parallel

full-duplex

Description 3:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted one bit at a
time down a single wire; the data simplex serial
is transmitted in both directions
but not at the same time.
half-duplex parallel

full-duplex

[6]

(b) Give two reasons why serial transmission, rather than parallel transmission, is used to
connect devices to a computer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]
7

6.
8

7. Letters from Greek Alphbets are to be stored in computer. Each letter can be represented
on 8 by 8 grid. Each column has a value from 0 to 128.
The letter  is stored as
9

8. (a) State what is meant by the term USB.


...................................................................................................................................................

................................................................................................................................................... [1]

(b) Describe two benefits of using USB connections between a computer and a device.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................[2]

(c) There are various methods used to detect errors that can occur during data transmission
and storage.

Describe each of the following error detection methods.

Parity check ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Checksum ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Automatic Repeat request (ARQ) ....................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]
10

9. (a) The denary number 57 is to be stored in two different computer registers.

Convert 57 from denary to binary and show your working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Show the binary number from part (a) as it would be stored in the following registers.

Register 1

Register 2
[2]

(c) A binary number stored in a register can have many different uses, for example an address in
main memory.

Give two other uses for a binary number stored in a register.

Use 1 ........................................................................................................................................

Use 2 ........................................................................................................................................
[2]

(d) A register in a computer contains binary digits.

0 0 1 1 1 0 1 0

The contents of the register represent a binary integer.

Convert the binary integer to hexadecimal.

...................................................................................................................................................

...............................................................................................................................................[2]
11

10.Computer A is communicating with computer B.

(a) Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The
direction of the data transmission must be fully labelled.

Simplex data transmission

Computer A Computer B

Duplex data transmission

Computer A Computer B

Half-duplex data transmission

Computer A Computer B
[6]

(b) State a use for the following data transmission methods. The use must be different for each
data transmission method.

Simplex .....................................................................................................................................

...................................................................................................................................................

Duplex ......................................................................................................................................

...................................................................................................................................................
[2]
12

BLANK PAGE

12

You might also like