Chapter 1-2-Test COMPUTER SCIENCE IGCSE
Chapter 1-2-Test COMPUTER SCIENCE IGCSE
Chapter 1-2-Test COMPUTER SCIENCE IGCSE
TEST PAPER
CHAPTER 1 & 2
Name: ______________________ Time: 30 mins
Carla uses the USB port to connect her mobile device to her computer, to transfer her photos.
(a) Benefit
1 ..........................................................................................................................................
.............................................................................................................................................
Benefit
2 ..........................................................................................................................................
.............................................................................................................................................
Benefit
3 ..........................................................................................................................................
.............................................................................................................................................
[3]
(b) State the type of data transmission used when transferring data using a USB port.
............................................................................................................................................ [1]
2 Two error detection methods that Allison’s computer uses are check digit and checksum.
(a) Give two similarities between the check digit and checksum methods.
1 .........................................................................................................................................
............................................................................................................................................
Page | 1
2 .........................................................................................................................................
............................................................................................................................................
[2]
(b) Identify one other error detection method that Allison’s computer could use.
Method ..............................................................................................................................
Description ........................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
[4]
(a) Give the 8-bit binary value of the two denary values:
180 ....................................................................................................................................
201 ....................................................................................................................................
[2]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Page | 2
(b) Give the 12-bit binary value of the denary value 250.
........................................................................................................................................... [1]
Working space
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
10010011 ...........................................................................................................................
00011101 ...........................................................................................................................
[2]
1 ...........................................................................................................................................
2 ...........................................................................................................................................
3 ............................................................................................................................................
[3]
(b) Meena buys products for her business using the Internet.
The Transport Layer Security (TLS) protocol is used for transferring data when she buys
products.
Page | 3
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................[2]
(ii) Identify another protocol that can be used to transfer data securely.
.......................................................................................................................................... [1]
The browser uses a small file to store the details of the products she views. This allows the
............................................................................................................................................. [1]
Complete the table giving the missing Term for each definition.
Term Definition
A data transmission method that sends data one bit at a time,
down a single wire
An address given to a device on a network.
The address is assigned by the network
The software used to render HTML and display
a web page
[4]
Page | 4
6 All smartphones have a MAC address.
...................................................................................................................................................
................................................................................................................................................... [1]
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
..................................................................................................................................................
.................................................................................................................................................. [3]
Page | 5