[go: up one dir, main page]

0% found this document useful (0 votes)
54 views14 pages

Computer Science 22:01:22

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
54 views14 pages

Computer Science 22:01:22

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
= = a = = = = = = — OCR Oxford Cambridge and RSA Accredited GCSE (9-1) Computer Science J276/02 Computational thinking, algorithms and programming Sample Question Paper Date —- Morning/Afternoon Time allowed: 1 hour 30 minutes | | A You may not use: + a calculator Jovpulty : = Lala) GE"T4[49 (Cotas (Gert | Cy] \qumber INSTRUCTIONS Use black ink Complete the boxes above with your name, centre number and candidate number. ‘Answer all the questions. Write your answer fo each question in the space provided. \f additional space is required, use the: lined pagefs) at the end of this booklet. The question number(s) must be clearly shown + Donetwrite in the bar codes. INFORMATION + The total mark for this paper is 80. ocr sovessen ‘The marks for each question are shown in brackets [ J. This document consists of 16 pages. cd ropa 201s Turn over 2 Kofi uses his computer to record an audio fle of himself playing his guiter (a) Qutline what happens when the computer converts the music into a file an tell. faken Tegaler _snteetal - logthe, ark then... (b) Kofi increases the sample rate his computer is using to record his guitar. Expiain two effects this will have on Kof's recording. 3 hg Bite, lacger 1. ApeeauB Ord Tee a otha gushes Of Me scien iitl be batit bon Das si i hecawd?...100t. ACB ANC table. pe. Lecondl —-Ke...h. ts or acrudalt ia {e) Kofi is e-mailing his recording to a record label. He uses lessy compression to produce the mee Explain two reasons why using lossy compression is beneficial. .. theft id Ay loe fa. be headin eB a PME oe Babee Ghethtennd ope, 2lbpl.biwed . Lositlat..088..2ip. file. «fd... eeeoed need... Aeaatrcd. ye tha. ty. aed .. Me EP ccs 1) omar ans aren a 2 (a) Order the following units from smaliest to largest: GE bit PB byte nibble MB DUB goth He lB Rp PB (b) Convert the decimal number 191 into an & bit binary number. wd QANON OI s s ae a or {e) Conver the hexadecimal number 3E into a decimal number, You must show your working wih - SR woca 20 arena 4 (d) There is a subroutine, HEX(), that takes a denary number between 10 and 15 and retums the corresponding hexadecimal number. €.g. HEX(10) would retum “A*, HEX(15) would return = ‘Write an algorithm, using the subroutine HEX(), to convert any whole decimal number between O and 255 into & 2 digit hexadecimal number. Bee DNL EAN OK. Gant (13) © ouezo rena Turn over 5 (ey {®) Add together the following two 8 bit binary numbers. Express your response in an 8 bit binary form a11O/0lo yO 01101010 yl oeloro. (O seeue ol Olatra OL OlO (1) 3 (a) Complete a 2 place right shift on the binary number 11001011. OS CULO pie= ed oven KOON LO qt] (b) Explain the effect of performing a 2 place right shift on the binary number 11001011. ba, 1G t a fl (c) Complete the truth table below for the Boolean statement P= Not (2 AND B). = F FALSE TROE FALSE TVS TRUE, tons TRUE. FRUE, FALSE pocK 2015 Tum over 6 4 Johnny is writing a program lo create usemarties. The frst process he has developed is shown in the flowchart in Fig. 4 Fig. 1 Start INPUT sumame usemame = name + LEFT(sumame, 2) For example, using the process in Fig. 1, Tom Ward's user name would be Torri. (a) State, using the process in Fig. 1, the usemame for Rebecca Elis. 2.008 2018, waren 7 (b) Johnny has updated the process used to create usernames as follows: I the person is male, then their username is the last 3 letters of their eurmame and the first 2 letters of their fret namo. 30 then 05 print (‘Sony, that radius is inwalid’) 06 © else 07 area = 3.142 * (radius * 2) 08 print (area) 09 endif (a) Explain, using examples from the program, two ways Finn can improve the maintainability of the program. ‘ fit... Shad. ade........endeatittn The ALE cee bab eee an Seca B.. pse..10teh PI nel load Be nndbtolll be. a OA AE TOMS NOE NOL BO arse PS Piet. (Sond... 1 coca sas serene 4 (b) Identify two variables used in the program. TAS. sunmemmmenrenciee caxcg AIEN a ecccsnnnsennce a identify one item in the program that could have been written as a constant. wee BYR cose m Give one reasan why you have identified this tem as 3 constant. tls g)Pi..deeih...ch WY fo {@) Finn uses an IDE (Integrated Development Environment) to write his programs. Identify two features of an IDE that Finn might use: Pe dugg “4 a Miggoraapic.. J deatodien..08 pecenllas,...clese. a ogre sn76n2

You might also like