FOR OFFICIAL USE National Qualifications Mark Duration — 1 hour and 30 mins Fill in these boxes and read what is printed below. Town Full name of centre Forenames(s) Number of seat Surname Date of birth Scottish candidate number Day Month Year D D M M Y Y Total marks – 90 Attempt ALL questions in this section. SECTION 2 – 70 marks Attempt ALL questions in this section. Read all questions carefully before attempting. Write your answers in the spaces provided, using blue or black ink. Show all workings. Before leaving the examination room you must give this booklet to the invigilator. If you do not, you may lose all marks for this paper. SECTION 1 – 20 marks © 2016 Perfect Papers – All rights reserved Computing Science CS(N5)16B MARKS 1. 2. 3. SECTION 1 – 20 marks Attempt ALL questions Convert the decimal number 153 into the equivalent 8-bit binary number. 1 Vanessa is viewing a webpage on her smartphone. Name the software on Vanessa’s smartphone that allows her to do this. 1 State the purpose of the ^ operator in this section of code. 1 result = sides ^ capacity 4. Pseudocode is often used when creating the design of a program. (a) (b) State another design notation that could be used when designing a program. 1 Describe one advantage of using this design notation instead of pseudocode. 1 Page two DO NOT WRITE IN THIS MARGIN MARKS 5. 2 Property 1: Property 2: 6. State two properties of an audio file can be changed to reduce its size. 7. Paul is ordering cinema tickets online and is presented with the following drop down menu: State one advantage of this type of user interface for the purpose of booking tickets. 1 Explain the purpose of lines 10 to 13 in this pseudocode. 2 … Line 9 Line 10 Line 11 Line 12 Line 13 SET account TO “SQA29128” REPEAT SEND “Please enter your PIN” TO DISPLAY RECEIVE user_pin FROM (STRING) KEYBOARD UNTIL user_pin = master_pin Page three DO NOT WRITE IN THIS MARGIN MARKS 8. Describe one advantage for her of the wired network over the wireless network. 9. 10. 1 A computer program is created to store data about the number of animals in an animal sanctuary. State the most suitable data type for the total. 1 The pseudocode shown below uses a loop with a simple condition. 2 REPEAT RECEIVE member_class FROM (STRING) KEYBOARD UNTIL member_class = “GOLD” Sally has both wired and wireless networks in her home. The wireless network allows her to use her Smartphone, laptop and tablet devices anywhere in her home. Create a complex condition that will end the loop when any of the following values is used for member_class: “GOLD”, “SILVER”, “BRONZE” 11. State the standard algorithm that is used to ensure that data entered is acceptable. Page four 1 DO NOT WRITE IN THIS MARGIN MARKS 12. Describe how keylogging can be an online security risk. 13. A civil servant from MI5 has lost a laptop storing details of secret military intelligence. (a) (b) 14. Identify one security precaution that would prevent unauthorised access to the details on the laptop. 1 Identify one other security precaution that would ensure that the details were unreadable even if the laptop was accessed. 1 Jenna moves all her data for work from her desktop computer to the cloud. Explain two possible risks for Jenna now that she is using cloud services. Risk 1: Risk 2: 1 Page five 2 DO NOT WRITE IN THIS MARGIN MARKS SECTION 2 – 70 Marks Attempt ALL questions 15. Amber is at Edinburgh Waverley Railway Station and is using the TrainTimes App on her Smartphone. The app shows information about train departures from her location. Operator (a) (b) Destination Time Platform Details North Berwick 16:33 16 Details Dunblane 16:33 14 Details Helensburgh Central 16:33 10 Details London Kings Cross 16:51 18 Details Aberdeen 16:51 13 Details Stirling 17:00 18 Details Manchester 17:00 15 Details Dundee 17:00 13 Details Dunblane 17:05 12 Details The list above has been sorted by the app. Describe how this list is sorted. 2 Describe two advantages of running this app on a mobile device rather than a desktop PC. 2 Page six DO NOT WRITE IN THIS MARGIN MARKS 15. (continued) (c) When the app was developed, the programmer had a choice of the following images to use for the “ScotRail” logo. Image Properties: Mime Type: image/gif Dimensions: 136 pixels x 53 pixels File size: 2.17 KB Bit depth: 4 bit Image Properties: Mime Type: image/png Dimensions: 136 pixels x 53 pixels File size: 7.83 KB Bit depth: 24 bit scotrail1 scotrail2 Explain why scotrail1 was used in the app rather than scotrail2. (d) Amber is running the app and then this error appears on screen. Identify the type of error that has occurred. (e) 2 1 A smartphone makes use of both RAM and ROM. (i) State what RAM stands for. 1 (ii) State what ROM stands for. 1 Page seven DO NOT WRITE IN THIS MARGIN MARKS 15. (continued) (f) Amber’s smartphone has a GPS tracker which provides her location. The tracker is connected to an interface with in the smartphone Describe two purposes of an interface. 2 Purpose 1: Purpose 2: (g) Amber’s phone has a number of biometric sensors. (i) Describe two features of the smartphone that could make use of “biometric sensors”. 2 Feature 1: Feature 2: (ii) Describe one security concern as a result of using “biometric sensors”. Page eight 1 DO NOT WRITE IN THIS MARGIN MARKS 16. A program is required to calculate the number of square tiles required for a mosaic. The program will ask the user to enter the dimensions of the small square mosaic and the dimensions of the large square mosaic. The dimensions of a single square tile will also be entered. 5 mm will be added onto the dimensions of the tile to allow for tile cement between the tiles. Area of a square is calculated by the length of a side multiplied by itself. A design for the program is shown below. Line 1 RECEIVE smlMosaicSide FROM (REAL) KEYBOARD Line 2 RECEIVE lrgMosaicSide FROM (REAL) KEYBOARD Line 3 RECEIVE tileSide FROM (REAL) KEYBOARD Line 4 SET tileSide TO tileSide + 5 Line 5 <calculated the quantity of tiles needed> Line 6 SEND [“The number of tiles needed is – “ numberOfTiles] TO DISPLAY Page nine DO NOT WRITE IN THIS MARGIN MARKS 16. (continued) (a) A tile side must be greater than 50 and less than 200. Using pseudocode or a programming language of your choice, show how input validation could be used to ensure a valid tile side is entered by the user. 3 Pseudocode OR Programming Language (b) Using the information obtained in Lines 1 to 4. Use pseudocode or a programming language of your choice to show how Line 5 would be implemented. Pseudocode OR Programming Language Page ten 5 DO NOT WRITE IN THIS MARGIN 16. (continued) (c) MARKS The program is tested and gives the following output. The number of tiles needed is: 420.78 The number of tiles that need to be ordered is 421. (d) (e) Describe how a pre-defined function could be used to ensure that the correct number of tiles is ordered. 2 Explain how the value in the variable numberOfTiles will be stored in the computer. 2 Tile cement is required to hold the tiles in place. The following calculation will be used to calculate the amount of tile cement required. tileCement = (3 * silica ) + adhesive + water State the number of variables required. Page eleven 1 DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN MARKS 17. Skateskool employs a number of tutors to run courses for clients. Here is an example of the data stored about each tutor and the courses they run. The Courses are available at one of three levels: beginner, intermediate and advanced. First Last Photo Course Tutor Expertise Title Level ID Name Name Ref 651 Davy Welsh Vert CourseDate V12 BasicVert Beginner 12/03/2016 S01 Bumpsand Rails Intermediate 12/03/2016 C02 Urban101 Beginner 13/03/2016 D42 SpeedControl Advanced 14/03/2016 F12 Olliesand Jumps Intermediate 14/03/2016 652 Pam White Street 653 Gemma Jones Cruising 654 Shaun Bolt Downhill 655 Amanda Stoker Freestyle Thisdataisheldinadatabase. (a) Describeonereasonwhyadatabasewithlinkedtableswouldbebetterthanaflat fileforstoringthisdata. (b) AdesignwithaTUTORtableandaCOURSEtableiscreated. (i) Identifyasuitableprimarykeyforeachtable. PrimarykeyforTUTOR: PrimarykeyforCOURSE: (ii) Explainwhyitisnecessarytohaveaforeignkey. Page twelve 1 2 1 17. (continued) (c) (d) (e) (f) MARKS State the field type used for each of these fields. Photo CourseDate WritetwovalidationrulesthatcouldbeappliedtothefieldLevel. Validation1 Validation2 Aprogramisusedtoreadfromthedatabaseandprintnamebadgesforeach instructor.Somepseudocodeforthisprogramisshownbelow. … Line 23 SET firstName TO (STRING) DATABASE VALUE (First Name) Line 24 SET lastName TO (STRING) DATABASE VALUE (First Name) Line 25 SET displayName TO firstName & “ “ & lastName … NametheoperationthatisbeingcarriedoutinLine25. Skateskool must adhere to the health and safety legislation for employees using computer systems regularly. 2 DO NOT WRITE IN THIS MARGIN 2 1 Ergonomically designed keyboards allow staff to comfortably type and prevent repetitive strain injury. Name one other workstation feature and describe how it reduces a risk to health. Page thirteen 1 MARKS 18. The pseudocode below shows how a program could store and process the race times for a downhill skateboarding competition. Line 1 Line 2 Line 3 Line 4 Line 5 Line 6 Line 7 Line 8 SET raceTimes TO [ 10.23, 10.20, 9.97, 10.79, 11.02, 9.95 ] SET bestTime TO raceTimes [0] FOREACH time FROM raceTimes IF time < bestTime THEN SET bestTime TO time END IF END FOR SEND [“The best time was : “, bestTime] TO DISPLAY (a) State the data structure shown in Line 1. 2 (b) State the type of loop shown on Line 3. Explain why this type of loop would be used. 2 Type of Loop Explanation (c) (i) (ii) (iii) State the line of pseudocode that contains a conditional statement. 1 Explain the purpose of this conditional statement in the program. 2 State the part of the processor that compares the values in the conditional statement. 1 Page fourteen DO NOT WRITE IN THIS MARGIN 18. (continued) (d) The program requires both the source code and the translator to be MARKS present so that it can run. (e) (i) Name the type of translator being used. 1 (ii) State one advantage of using this type of translator. 1 The skateboarder with the best time is presented with the following certificate. The certificate is saved as an image file. It is 6 inches by 8 inches with a resolution of 600 dpi and 24-bit colour depth. Calculate the file size of the certificate. Page fifteen 3 DO NOT WRITE IN THIS MARGIN MARKS 19. A ski accommodation website is used successfully by customers using desktop computers to book somewhere to stay for their holidays. (a) The company has received complaints from some customers that the website is difficult to use on a tablet or smartphone. Identify two reasons why the webpage above would be unsuitable for such portable devices. Reason 1 Reason 2 Page sixteen 2 DO NOT WRITE IN THIS MARGIN 19. (continued) (b) The web site is hosted on a web server. (i) (ii) MARKS State the domain name used by the web server. The “Virtual Tour” button opens a page on the VR-Cities website in a new window. Explain why the HTML code for this link uses absolute addressing. (iii) 1 The “Download Video” button will download a video file called “tour.mp4” from the same folder as the web page. Write the HTML code to link the button to the video. The code for the button image is already provided below. 1 3 <img src=”downloadvideo.png” alt=”Download Video” /> (c) JavaScript is used on the page to add interactivity. Describe two examples from this page where JavaScript could be used. Example 1 Example 2 Page seventeen 2 DO NOT WRITE IN THIS MARGIN MARKS 19. (continued) (d) When this site was developed it was tested using a number of different web browsers. Explain why the website pages appear the same in most web browsers. 1 (e) Before going live the website SkiFinder Chalets website was tested to ensure that all the links worked as expected. Describe one other type of testing that the developer would have carried out. 1 (f) SkiFinder Chalets are making use of cloud services instead of local storage for storing their data. State one benefit of using cloud based storage instead of local storage. Page eighteen 1 DO NOT WRITE IN THIS MARGIN MARKS 20. Anisa has a small photography business. (a) She is writing a small program to calculate how many images she can store on a solid state storage device. Line 1 RECEIVE bitDepth FROM (______________) KEYBOARD Line 2 RECEIVE deviceCapacity FROM (______________) KEYBOARD … The above extract from her design should show the type of data being entered by keyboard in Lines 1 and 2. State the most appropriate data types for the following variables. 2 bitDepth deviceCapacity (b) A further extract from her program is shown below … Line 16 SET numberOfImages = deviceCapacity / imageSize … A number of parts of basic computer architecture are used to process the above statement. Name the part that will carry out each of the following tasks during the execution of this code. (i) Carries the location of numberOfImages in main memory. 1 (ii) Transfers the value of imageSize from mainMemory to the processor. 1 Stores the value of numberOfimages temporarily before it is transferred to main memory. 1 (iii) Page nineteen DO NOT WRITE IN THIS MARGIN MARKS 20. (continued) (c) Another extract from Anisa’s program is shown below. … Line 27 PROCEDURE manipulateUnits (deviceCapacity, units) … State the name given to the items inside the brackets () in this statement. (d) Asina has a 64 Gb solid state storage device and images which are 4 Mb in size taken with her digital camera. Calculate how many images she can store on this storage device. [END OF QUESTION PAPER] 1 Page twenty 2 DO NOT WRITE IN THIS MARGIN MARKS ADDITIONAL SPACE FOR ANSWERS Page twenty-one DO NOT WRITE IN THIS MARGIN MARKS ADDITIONAL SPACE FOR ANSWERS Page twenty-two DO NOT WRITE IN THIS MARGIN
© Copyright 2026 Paperzz