CS(N5)16B - Glow Blogs

FOR OFFICIAL USE
National
Qualifications
Mark
Duration — 1 hour and 30 mins
Fill in these boxes and read what is printed below.
Town
Full name of centre
Forenames(s)
Number of seat
Surname
Date of birth
Scottish candidate number
Day
Month
Year
D D
M M
Y Y
Total marks – 90
Attempt ALL questions in this section.
SECTION 2 – 70 marks
Attempt ALL questions in this section.
Read all questions carefully before attempting.
Write your answers in the spaces provided, using blue or black ink.
Show all workings.
Before leaving the examination room you must give this booklet to the invigilator. If you
do not, you may lose all marks for this paper.
SECTION 1 – 20 marks
© 2016 Perfect Papers – All rights reserved
Computing Science
CS(N5)16B
MARKS
1.
2.
3.
SECTION 1 – 20 marks
Attempt ALL questions
Convert the decimal number 153 into the equivalent 8-bit binary number.
1
Vanessa is viewing a webpage on her smartphone. Name the software on
Vanessa’s smartphone that allows her to do this.
1
State the purpose of the ^ operator in this section of code.
1
result = sides ^ capacity
4.
Pseudocode is often used when creating the design of a program.
(a)
(b)
State another design notation that could be used when designing a
program.
1
Describe one advantage of using this design notation instead of
pseudocode.
1
Page two
DO NOT
WRITE IN
THIS
MARGIN
MARKS
5.
2
Property 1:
Property 2:
6.
State two properties of an audio file can be changed to reduce its size.
7.
Paul is ordering cinema tickets online and is presented with the following drop
down menu:
State one advantage of this type of user interface for the purpose of booking
tickets.
1
Explain the purpose of lines 10 to 13 in this pseudocode.
2
…
Line 9
Line 10
Line 11
Line 12
Line 13
SET account TO “SQA29128”
REPEAT
SEND “Please enter your PIN” TO DISPLAY
RECEIVE user_pin FROM (STRING) KEYBOARD
UNTIL user_pin = master_pin
Page three
DO NOT
WRITE IN
THIS
MARGIN
MARKS
8.
Describe one advantage for her of the wired network over the wireless
network.
9.
10.
1
A computer program is created to store data about the number of animals in
an animal sanctuary.
State the most suitable data type for the total.
1
The pseudocode shown below uses a loop with a simple condition.
2
REPEAT
RECEIVE member_class FROM (STRING) KEYBOARD
UNTIL member_class = “GOLD”
Sally has both wired and wireless networks in her home. The wireless network
allows her to use her Smartphone, laptop and tablet devices anywhere in her
home.
Create a complex condition that will end the loop when any of the following
values is used for member_class: “GOLD”, “SILVER”, “BRONZE”
11.
State the standard algorithm that is used to ensure that data entered is
acceptable.
Page four
1
DO NOT
WRITE IN
THIS
MARGIN
MARKS
12.
Describe how keylogging can be an online security risk.
13.
A civil servant from MI5 has lost a laptop storing details of secret military
intelligence.
(a)
(b)
14.
Identify one security precaution that would prevent unauthorised access
to the details on the laptop.
1
Identify one other security precaution that would ensure that the details
were unreadable even if the laptop was accessed.
1
Jenna moves all her data for work from her desktop computer to the cloud.
Explain two possible risks for Jenna now that she is using cloud services.
Risk 1:
Risk 2:
1
Page five
2
DO NOT
WRITE IN
THIS
MARGIN
MARKS
SECTION 2 – 70 Marks
Attempt ALL questions
15.
Amber is at Edinburgh Waverley Railway Station and is using the TrainTimes
App on her Smartphone. The app shows information about train departures
from her location.
Operator
(a)
(b)
Destination
Time
Platform
Details
North Berwick
16:33
16
Details
Dunblane
16:33
14
Details
Helensburgh Central
16:33
10
Details
London Kings Cross
16:51
18
Details
Aberdeen
16:51
13
Details
Stirling
17:00
18
Details
Manchester
17:00
15
Details
Dundee
17:00
13
Details
Dunblane
17:05
12
Details
The list above has been sorted by the app. Describe how this list is
sorted.
2
Describe two advantages of running this app on a mobile device rather
than a desktop PC.
2
Page six
DO NOT
WRITE IN
THIS
MARGIN
MARKS
15.
(continued)
(c)
When the app was developed, the programmer had a choice of the
following images to use for the “ScotRail” logo.
Image Properties:
Mime Type: image/gif
Dimensions: 136 pixels x 53 pixels
File size: 2.17 KB
Bit depth: 4 bit
Image Properties:
Mime Type: image/png
Dimensions: 136 pixels x 53 pixels
File size: 7.83 KB
Bit depth: 24 bit
scotrail1
scotrail2
Explain why scotrail1 was used in the app rather than scotrail2.
(d)
Amber is running the app and then this error appears on screen.
Identify the type of error that has occurred.
(e)
2
1
A smartphone makes use of both RAM and ROM.
(i) State what RAM stands for.
1
(ii) State what ROM stands for.
1
Page seven
DO NOT
WRITE IN
THIS
MARGIN
MARKS
15. (continued)
(f)
Amber’s smartphone has a GPS tracker which provides her location. The
tracker is connected to an interface with in the smartphone
Describe two purposes of an interface.
2
Purpose 1:
Purpose 2:
(g)
Amber’s phone has a number of biometric sensors.
(i) Describe two features of the smartphone that could make use of
“biometric sensors”.
2
Feature 1:
Feature 2:
(ii)
Describe one security concern as a result of using “biometric
sensors”.
Page eight
1
DO NOT
WRITE IN
THIS
MARGIN
MARKS
16.
A program is required to calculate the number of square tiles required for a
mosaic. The program will ask the user to enter the dimensions of the small
square mosaic and the dimensions of the large square mosaic. The dimensions
of a single square tile will also be entered. 5 mm will be added onto the
dimensions of the tile to allow for tile cement between the tiles. Area of a
square is calculated by the length of a side multiplied by itself.
A design for the program is shown below.
Line 1 RECEIVE smlMosaicSide FROM (REAL) KEYBOARD
Line 2 RECEIVE lrgMosaicSide FROM (REAL) KEYBOARD
Line 3 RECEIVE tileSide FROM (REAL) KEYBOARD
Line 4 SET tileSide TO tileSide + 5
Line 5 <calculated the quantity of tiles needed>
Line 6 SEND [“The number of tiles needed is – “ numberOfTiles] TO DISPLAY
Page nine
DO NOT
WRITE IN
THIS
MARGIN
MARKS
16. (continued)
(a) A tile side must be greater than 50 and less than 200.
Using pseudocode or a programming language of your choice, show how
input validation could be used to ensure a valid tile side is entered by
the user.
3
Pseudocode
OR Programming Language
(b) Using the information obtained in Lines 1 to 4.
Use pseudocode or a programming language of your choice to show how
Line 5 would be implemented.
Pseudocode
OR Programming Language
Page ten
5
DO NOT
WRITE IN
THIS
MARGIN
16.
(continued)
(c)
MARKS
The program is tested and gives the following output.
The number of tiles needed is: 420.78
The number of tiles that need to be ordered is 421.
(d)
(e)
Describe how a pre-defined function could be used to ensure that the
correct number of tiles is ordered.
2
Explain how the value in the variable numberOfTiles will be stored in the
computer.
2
Tile cement is required to hold the tiles in place. The following
calculation will be used to calculate the amount of tile cement required.
tileCement = (3 * silica ) + adhesive + water
State the number of variables required.
Page eleven
1
DO NOT
WRITE IN
THIS
MARGIN
DO NOT
WRITE IN
THIS
MARGIN
MARKS
17.
Skateskool employs a number of tutors to run courses for clients. Here is an
example of the data stored about each tutor and the courses they run. The
Courses are available at one of three levels: beginner, intermediate and
advanced.
First
Last
Photo
Course
Tutor
Expertise
Title
Level
ID
Name
Name
Ref
651
Davy
Welsh
Vert
CourseDate
V12
BasicVert
Beginner
12/03/2016
S01
Bumpsand
Rails
Intermediate
12/03/2016
C02
Urban101
Beginner
13/03/2016
D42
SpeedControl
Advanced
14/03/2016
F12
Olliesand
Jumps
Intermediate
14/03/2016
652
Pam
White
Street
653
Gemma
Jones
Cruising
654
Shaun
Bolt
Downhill
655
Amanda
Stoker
Freestyle
Thisdataisheldinadatabase.
(a) Describeonereasonwhyadatabasewithlinkedtableswouldbebetterthanaflat
fileforstoringthisdata.
(b) AdesignwithaTUTORtableandaCOURSEtableiscreated.
(i) Identifyasuitableprimarykeyforeachtable.
PrimarykeyforTUTOR:
PrimarykeyforCOURSE: (ii) Explainwhyitisnecessarytohaveaforeignkey.
Page twelve
1
2
1
17.
(continued)
(c)
(d)
(e)
(f)
MARKS
State the field type used for each of these fields.
Photo
CourseDate WritetwovalidationrulesthatcouldbeappliedtothefieldLevel.
Validation1 Validation2 Aprogramisusedtoreadfromthedatabaseandprintnamebadgesforeach
instructor.Somepseudocodeforthisprogramisshownbelow.
…
Line 23 SET firstName TO (STRING) DATABASE VALUE (First Name)
Line 24 SET lastName TO (STRING) DATABASE VALUE (First Name)
Line 25 SET displayName TO firstName & “ “ & lastName
…
NametheoperationthatisbeingcarriedoutinLine25.
Skateskool must adhere to the health and safety legislation for
employees using computer systems regularly.
2
DO NOT
WRITE IN
THIS
MARGIN
2
1
Ergonomically designed keyboards allow staff to comfortably type and
prevent repetitive strain injury.
Name one other workstation feature and describe how it reduces a risk
to health.
Page thirteen
1
MARKS
18.
The pseudocode below shows how a program could store and process the race
times for a downhill skateboarding competition.
Line 1
Line 2
Line 3
Line 4
Line 5
Line 6
Line 7
Line 8
SET raceTimes TO [ 10.23, 10.20, 9.97, 10.79, 11.02, 9.95 ]
SET bestTime TO raceTimes [0]
FOREACH time FROM raceTimes
IF time < bestTime THEN
SET bestTime TO time
END IF
END FOR
SEND [“The best time was : “, bestTime] TO DISPLAY
(a)
State the data structure shown in Line 1.
2
(b)
State the type of loop shown on Line 3. Explain why this type of loop
would be used.
2
Type of Loop
Explanation
(c)
(i)
(ii)
(iii)
State the line of pseudocode that contains a conditional
statement.
1
Explain the purpose of this conditional statement in the program.
2
State the part of the processor that compares the values in the
conditional statement.
1
Page fourteen
DO NOT
WRITE IN
THIS
MARGIN
18. (continued)
(d)
The program requires both the source code and the translator to be
MARKS
present so that it can run.
(e)
(i)
Name the type of translator being used.
1
(ii)
State one advantage of using this type of translator.
1
The skateboarder with the best time is presented with the following
certificate.
The certificate is saved as an image file. It is 6 inches by 8 inches with a
resolution of 600 dpi and 24-bit colour depth. Calculate the file size of
the certificate.
Page fifteen
3
DO NOT
WRITE IN
THIS
MARGIN
MARKS
19. A ski accommodation website is used successfully by customers using desktop
computers to book somewhere to stay for their holidays.
(a)
The company has received complaints from some customers that the
website is difficult to use on a tablet or smartphone.
Identify two reasons why the webpage above would be unsuitable for
such portable devices.
Reason 1
Reason 2
Page sixteen
2
DO NOT
WRITE IN
THIS
MARGIN
19.
(continued)
(b)
The web site is hosted on a web server.
(i)
(ii)
MARKS
State the domain name used by the web server.
The “Virtual Tour” button opens a page on the VR-Cities website in
a new window.
Explain why the HTML code for this link uses absolute addressing.
(iii)
1
The “Download Video” button will download a video file called
“tour.mp4” from the same folder as the web page.
Write the HTML code to link the button to the video. The code for
the button image is already provided below.
1
3
<img src=”downloadvideo.png” alt=”Download Video” />
(c)
JavaScript is used on the page to add interactivity. Describe two
examples from this page where JavaScript could be used.
Example 1
Example 2
Page seventeen
2
DO NOT
WRITE IN
THIS
MARGIN
MARKS
19.
(continued)
(d)
When this site was developed it was tested using a number of different
web browsers.
Explain why the website pages appear the same in most web browsers.
1
(e) Before going live the website SkiFinder Chalets website was tested to
ensure that all the links worked as expected.
Describe one other type of testing that the developer would have carried
out.
1
(f) SkiFinder Chalets are making use of cloud services instead of local
storage for storing their data.
State one benefit of using cloud based storage instead of local storage.
Page eighteen
1
DO NOT
WRITE IN
THIS
MARGIN
MARKS
20. Anisa has a small photography business.
(a) She is writing a small program to calculate how many images she can
store on a solid state storage device.
Line 1 RECEIVE bitDepth FROM (______________) KEYBOARD
Line 2 RECEIVE deviceCapacity FROM (______________) KEYBOARD
…
The above extract from her design should show the type of data being
entered by keyboard in Lines 1 and 2. State the most appropriate data
types for the following variables.
2
bitDepth
deviceCapacity
(b)
A further extract from her program is shown below
…
Line 16 SET numberOfImages = deviceCapacity / imageSize
…
A number of parts of basic computer architecture are used to process the
above statement.
Name the part that will carry out each of the following tasks during the
execution of this code.
(i)
Carries the location of numberOfImages in main memory.
1
(ii)
Transfers the value of imageSize from mainMemory to the
processor.
1
Stores the value of numberOfimages temporarily before it is
transferred to main memory.
1
(iii)
Page nineteen
DO NOT
WRITE IN
THIS
MARGIN
MARKS
20. (continued)
(c)
Another extract from Anisa’s program is shown below.
…
Line 27 PROCEDURE manipulateUnits (deviceCapacity, units)
…
State the name given to the items inside the brackets () in this
statement.
(d)
Asina has a 64 Gb solid state storage device and images which are 4 Mb in
size taken with her digital camera.
Calculate how many images she can store on this storage device.
[END OF QUESTION PAPER]
1
Page twenty
2
DO NOT
WRITE IN
THIS
MARGIN
MARKS
ADDITIONAL SPACE FOR ANSWERS
Page twenty-one
DO NOT
WRITE IN
THIS
MARGIN
MARKS
ADDITIONAL SPACE FOR ANSWERS
Page twenty-two
DO NOT
WRITE IN
THIS
MARGIN