Computer Fundamentals. FRIDAY 15 MAY 2009: ... Candidates answer on the
question paper .... (d) The operator of the machine can alter the thickness from 5
...
This unit will enable learners to understand a range of computer systems in terms
of .... The P.C. support handbook: the configuration and systems guide.
2 of 164. AS Level Accounting. Contents. Contents. 2. Introduction. 3. Budgeting
and Budgetary Control. 5. Standard Costing and Variance Analysis. 33. Stock.
Mathematics B (Linear). General Certificate of Secondary Education. Component
J567/02: Mathematics Paper 2 (Foundation). Mark Scheme for March 2013 ...
This Vocabulary List accompanies the OCR GCSE Classical Greek specification
for teaching from September 2009 ... Oxford, Cambridge and RSA Examinations
...
Oxford Cambridge and RSA Examinations. GCSE. Mathematics B. General
Certificate of Secondary Education. Unit J567/04: Paper 4 (Higher Tier).
Oxford Cambridge and RSA Examinations. GCSE. Chemistry A. Unit A171/02:
Modules C1, C2, C3 (Higher Tier). General Certificate of Secondary Education.
OCR (Oxford Cambridge and RSA) is a leading UK awarding body, providing a ...
All Examiners are instructed that alternative correct answers and unexpected ...
Using the Client Design Brief for a engineered product the candidate: ... The current version of this form will be avail
game design and development will be acquired during the completion of this unit.
.... passing), code annotation, use of IDE/code snippets, debugging, game ...
The company is called MStreamIT and is the idea of entrepreneur Adam.
Weinberg. MStreamIT has thousands of movies which can be streamed to any TV
, ...
OCR 2010. 1. Unit Title: Adobe visual communication using Photoshop. OCR unit
number. A220. Sector unit number. 9.3. Level: 2. Credit value: 3.
Unit F582: The National and International Economy. Mark ... This mark scheme is
published as an aid to teachers and students, to indicate the requirements of.
LO3 Be able to manage project processes and procedures 3.1 design the project organisation with reference to prepared project management plans
GCE. Oxford Cambridge and RSA Examinations. Unit F584: Transport
Economics. Advanced GCE. Economics. Mark Scheme for January 2011 ...
10 What is P.G. Wodehouse making us laugh about in The Code of the Woosters
? How does he do it? TRAVEL WRITING. 11 Select two or more pieces from ...
GCSE. Unit B451: An Introduction to Physical Education. General Certificate of
Secondary Education. Physical .... Which of the following is an example of a test
protocol when setting up a fitness test? .... Three cheers at the end of a game. [3].
GCSE (9-1) Computer Science is the only Ebacc subject which has non-examination assessment (NEA). As awarding organisati
OCR (Oxford Cambridge and RSA) is a leading UK awarding body, ... AS/A
Levels, Diplomas, GCSEs, OCR Nationals, Functional Skills, Key Skills, Entry ....
Use of common idioms (eg j'ai faim, il fait beau, ich habe Hunger, tengo frio) does
not.
(a) A gardener notices that the pond in her garden has turned green and all of the fish have ...... idea that DNA is a u
1. University of Essex, Colchester, UK. Monday 16th March 2009. Agenda.
Fundamentals of Computer Networks. Basics of Wireless Networks. ▫ PHY:
Wireless ...
PHYSICS A. Unit A183: Module P7 (Higher Tier). Duration: 1 ..... 7. (b) The graph
shows the speed at which some galaxies are moving away from the Earth. 0.
Subject-specific Marking Instructions for GCE Mathematics Decision strand a.
Annotations should be used whenever appropriate during your marking. The A,
M ...
Oxford Cambridge and RSA Examinations. GCE. Mathematics. Advanced GCE
4732. Probability and Statistics 1. Mark Scheme for June 2010 ...
Candidates answer on the Question Paper. OCR supplied materials: None. Other
materials required: None. *F429950112*. Duration: 1 hour 30 minutes ...
Monday 16 January 2012 – Afternoon AS GCE COMPUTING F451/01
Computer Fundamentals
* F 4 2 9 9 5 0 1 1 2 *
Candidates answer on the Question Paper.
Duration: 1 hour 30 minutes
OCR supplied materials: None Other materials required: None
*
F
4
5
1
0
1
*
INSTRUCTIONS TO CANDIDATES • • • • •
•
Write your name, centre number and candidate number in the boxes above. Please write clearly and in capital letters. Use black ink. HB pencil may be used for graphs and diagrams only. Answer all the questions. Read each question carefully. Make sure you know what you have to do before starting your answer. Write your answer to each question in the space provided. Additional paper may be used if necessary but you must clearly show your candidate number, centre number and question number(s). Do not write in the bar codes.
INFORMATION FOR CANDIDATES • • •
The number of marks is given in brackets [ ] at the end of each question or part question. The total number of marks for this paper is 100. This document consists of 16 pages. Any blank pages are indicated.
(b) When data is input manually into a computer it needs to be verified. Explain why verification is not required when data is read automatically into a computer. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Explain the double entry method of data verification for data entered manually. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... [4]
A manufacturing company employs a large number of workers. The times when each worker comes to work and leaves at the end of the day are recorded. These times are then used to produce the payroll. (a) (i)
Describe the process of producing the payroll. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [5]
(ii)
Explain why a batch processing system is appropriate for this application. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [5]
7 (b) The workers are worried because so much information is being stored about them on the computers of the company. (i)
Explain what information would be stored in order for the payroll system to work. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [3]
(ii)
Describe the fears that the workers may have and explain what the company can do to allay those fears. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [5]
Describe what is meant by a LAN. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2]
(ii)
When a computer on a network wishes to communicate with another device a handshake is used. Describe what a handshake is and explain why it is necessary. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [4]
(b) A protocol is a set of rules necessary to ensure that data is properly transferred between devices. Protocols can be divided into two types: logical and physical. Explain what is meant by each of the terms logical protocol and physical protocol and give an example of each, explaining why it is important. (i)
(a) State what is meant by the following terms: (i)
A buffer ........................................................................................................................................... ..................................................................................................................................... [1]
(ii)
An interrupt ........................................................................................................................................... ..................................................................................................................................... [1]
(b) Describe the transfer of data between primary memory and a hard disk drive. ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ................................................................................................................................................... ............................................................................................................................................. [5]
11 (c) The railway company uses systems software and generic applications packages in their computers. (i)
Describe the role of systems software. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2]
(ii)
The marketing department of the railway company uses various generic applications packages, including presentation software to prepare automatic presentations to be shown to passengers while they are on the trains. State three other types of generic applications package which could be used by the marketing department, giving an example of how each may be used. 1. ........................................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... 2. ........................................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... 3. ........................................................................................................................................ ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [6]
a binary number using 8 bits ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2]
(ii)
a number in hexadecimal notation ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2]
(b) Express the denary number –36 using a single 8 bit byte in (i)
two’s complement form ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2]
(ii)
sign and magnitude form ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [2]
13 (c) When data is transmitted between devices on a network it is liable to corruption. One way of checking data for corruption is to carry out a check sum. This involves adding the data bytes together at each end of the transmission to ensure that they give the same result. (i)
In a particular system the following three bytes were transmitted as a block. Add the binary values together showing your working.
01101101 00100111 l00101101l [3] (ii)
Explain another method of checking data to ensure that it has been transmitted without corruption. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ..................................................................................................................................... [3]
A new piece of software has been written to control a device which is used to test the reliability of valves in industry. State what will be included in the user guide. .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .......................................................................................................................................................... .................................................................................................................................................... [5]