Cambridge O Level: Computer Science 2210/11
Cambridge O Level: Computer Science 2210/11
Cambridge O Level: Computer Science 2210/11
* 2 1 0 0 7 5 9 7 9 3 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (SL) 341463
© UCLES 2024 [Turn over
2
(a) Identify two input devices that could be built into the portable tablet computer.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) Identify one output device that could be built into the portable tablet computer.
............................................................................................................................................. [1]
(c) Identify one type of storage device that could be built into the portable tablet computer.
............................................................................................................................................. [1]
(a) Tick (3) one box to show which statement about the hexadecimal number system is incorrect.
C It is a base 10 system.
20 ..............................................................................................................................................
32 ..............................................................................................................................................
165 ............................................................................................................................................
[3]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(a) Give the 8-bit binary number that will be stored after the shift has taken place.
............................................................................................................................................. [1]
(b) Tick (3) one box to show which statement about a logical left shift of two places is correct.
Convert the two’s complement integer 10100011 to denary. Show all your working.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
............................................................................................................................................. [1]
4 Data packets are transmitted across a network from one computer to another computer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Packet switching is used to transmit the data packets across the network.
Identify the device that controls which path is taken by each data packet.
............................................................................................................................................. [1]
(c) Serial data transmission is used to transmit the data packets across the network.
Explain why serial data transmission is used to transmit the data packets.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
5 A computer uses both random access memory (RAM) and secondary storage.
...................................................................................................................................................
............................................................................................................................................. [1]
read only memory (ROM) secure digital (SD) card compact disk (CD)
Blu-ray disk universal serial bus (USB) drive solid-state drive (SSD)
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(d) The computer processes instructions using the fetch–decode–execute (FDE) cycle.
Draw and annotate a diagram to show the process of the fetch stage of the FDE cycle.
[4]
...................................................................................................................................................
............................................................................................................................................. [1]
............................................................................................................................................. [1]
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
Some of the terms in the list will not be used. You should only use a term once.
.............................................................. . [4]
BLANK PAGE
...................................................................................................................................................
............................................................................................................................................. [1]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
[3]
(c) The robot plants seeds and stops when it reaches a fence. It then turns and continues planting
seeds. The robot uses sensors and a microprocessor to know when it reaches a fence.
Explain how the robot uses sensors and a microprocessor to know it has reached a fence.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [6]
(d) Give two advantages of the farmer using an automated robot to plant seeds.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(e) Give two disadvantages of the farmer using an automated robot to plant seeds.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
9 A company owner has installed a new network. Data is correct before it is transmitted across the
network.
The company owner is concerned that data might have errors after transmission.
(a) Explain how the data might have errors after transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) The company owner decides to introduce an error detection system to check the data for
errors after transmission.
The error detection system uses an odd parity check and a positive automatic repeat query
(ARQ).
(i) Describe how the error detection system operates to check for errors.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [8]
© UCLES 2024 2210/11/M/J/24
11
(ii) Give two other error detection methods that could be used.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(c) The company owner also installs a firewall to help protect the network from hackers and
malware.
(i) Explain how the firewall operates to help protect the network.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [5]
(ii) Give two examples of malware that the firewall can help protect the network from.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.