Cambridge O Level: Computer Science 2210/12
Cambridge O Level: Computer Science 2210/12
Cambridge O Level: Computer Science 2210/12
* 0 1 9 0 3 8 4 7 8 1 *
1 hour 45 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen. You may use an HB pencil for any diagrams or graphs.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (CE/FC) 221490
© UCLES 2021 [Turn over
2
Tick (✓) one box to show whether denary is a base-2, base-10 or base-16 number system.
Tick
(✓)
Base-2
Base-10
Base-16
[1]
05 ......................................................
20 ......................................................
1A ......................................................
AB ......................................................
[4]
Working space
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Tick (✓) one box to show the correct 8-bit binary value for each hexadecimal value.
Tick
(✓)
00011001
00100101
10100001
[1]
Tick
(✓)
00011011
10110001
00011010
[1]
(d) (i) Give one way that hexadecimal is used in website development.
..................................................................................................................................... [1]
..................................................................................................................................... [1]
2 A train company wants to install a self-service ticket machine system for its train stations. When
the customer has purchased their tickets, the machine will provide a paper ticket.
(a) One output device that is used in the ticket machine is a display screen.
Identify one other output device that is used in the ticket machine system.
............................................................................................................................................. [1]
(b) The train company does not want users to use a keyboard or a mouse to enter their data,
when buying a ticket. The company is worried that they may be stolen or get too dirty.
Identify one other input device that would be suitable for use in the ticket machine system, to
allow users to enter their data.
............................................................................................................................................. [1]
Tick (✓) to show if each statement applies to serial simplex, parallel simplex, parallel
half-duplex or serial duplex data transmission. Some statements may apply to more than one
data transmission method.
(b) A Universal Serial Bus (USB) connection can be used to transmit data from a mobile device
to a computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
Complete the paragraph using the list of terms. Not all terms in the list need to be used.
• capacitive
• change
• circuit
• conductive
• coordinates
• grid
• heat
• infra-red
• insulating
• light
• manufacture
• pressure
• resistive
top layer of the screen and makes it connect with the bottom layer to complete a
............................................................................ .
5 Sammi works for a finance company and has a laptop that he uses for his work. He has confidential
data about his customers stored on his laptop.
(a) Sammi is concerned about his customers’ confidential data being viewed by other people in
his office.
Identify three other methods Sammi could use to prevent his customers’ confidential data
being viewed.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) Sammi creates videos for the finance company website that give customers advice about
their finances.
He uses lossy compression to reduce the file size of the videos for the website.
(i) Give three ways that lossy compression can reduce the file size of the videos.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(ii) Give one drawback of using lossy compression to reduce the file size of the videos.
...........................................................................................................................................
..................................................................................................................................... [1]
(c) Sammi could have used lossless compression to compress the videos for the website.
(i) Give one reason why he would use lossless compression, rather than lossy compression,
for the videos.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Give two disadvantages of Sammi using lossless compression, rather than lossy
compression, for the videos.
Disadvantage 1 .................................................................................................................
...........................................................................................................................................
Disadvantage 2 .................................................................................................................
...........................................................................................................................................
[2]
6 A programmer can use translators, such as an interpreter and a compiler, when developing a
computer program.
...................................................................................................................................................
............................................................................................................................................. [1]
Difference 1 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Difference 2 ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
............................................................................................................................................. [1]
Tick (✓) to show if each statement applies to a 3D scanner, barcode reader or a Quick Response
(QR) code reader. Some statements may apply to more than one type of device.
3D Barcode QR code
Statement scanner reader reader
(✓) (✓) (✓)
uses position and alignment markers for orientation
when scanning
8 An electronic game has three square mats that are coloured red, green and blue.
The player will see a colour displayed on a screen and has 1 second to hit the mat that matches
the colour. If the player hits the correct mat, within 1 second, a counter is incremented. When a
player hits an incorrect mat, the game ends.
The game uses sensors and a microprocessor to determine if the player hits the correct mat within
1 second.
Explain how the game uses sensors and a microprocessor to count the number of times a player
hits a correct mat within 1 second.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [7]
An interrupt is generated to inform the Central Processing Unit (CPU) that the application has
been opened.
(a) Give three other examples of when an interrupt signal could be generated.
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(b) State what would happen if interrupt signals were not used in a computer.
...................................................................................................................................................
............................................................................................................................................. [1]
10 Jermain uses the Secure Socket Layer (SSL) protocol for secure transmission when sending data
using the internet.
(a) Explain how the SSL protocol secures the data for transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Identify an alternative protocol that could be used for secure transmission of data using the
internet.
............................................................................................................................................. [1]
(c) Give two ways that a user can identify if a website uses secure data transmission.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
© UCLES 2021 2210/12/O/N/21 [Turn over
10
Do not attempt to simplify the logic statement. All logic gates must have a maximum of two
inputs.
B X
[5]
(b) Complete the truth table for the given logic statement.
A B C Working space X
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4]
(c) Identify two logic gates that are not included in the given logic statement.
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.