Topic 2 test [327 marks]
1. [Maximum mark: 3]
(a) Outline the purpose of the memory data register (MDR). [2]
(b) Outline the role of the arithmetic logic unit (ALU). [1]
2. [Maximum mark: 2]
(a) State the binary equivalent of the denary number 37. [1]
(b) State the hexadecimal equivalent of the binary number
10011110. [1]
3. [Maximum mark: 2]
Distinguish between two types of primary memory. [2]
4. [Maximum mark: 15]
(a) Define the NOR Boolean operator. [1]
A car has features that monitor its speed, direction and distance from the car in front.
This is shown in Figure 1.
Figure 1: Rules to control car motion
For example, if the car is travelling forward, input B would have a binary representation of
1.
(b) Construct a logic diagram with inputs A, B, and C and output Z
to represent the following scenario:
Output Z equals 1 when:
the car is travelling forward AND it is less than 20 metres
from the vehicle in front.
OR
the car speed is more than 130 km per hour.
In all other conditions, output Z equals 0. [4]
An additional row (input D) is to be added to assist when the car is in reverse or
stationary. Input D checks if there are obstructions less than 3 metres from the
rear of the car.
(c) State the rules that need to be added to Figure 1 to test this
condition. [2]
Information similar to that presented in Figure 1 could be used to construct
decisions and conditions in program design (see Figure 2).
Figure 2: Identifiers for car motion rules
(d) Determine the value of the following expression given that the
input values for F, S and T are:
F=5
S = 30
T = true
F >= 25 AND S >= 10 AND S <= 130 AND T = true
You must show your working. [2]
(e) Construct an algorithm in pseudocode that repeats the
following steps while the car is moving:
Input the value for the distance from the vehicle in front.
Input the value for the speed of the car.
Check the inputs and notify the user if either the distance
from the car in front is less than 20 metres or if the speed of
the car is more than 130 kilometres per hour.
The algorithm will only terminate when the car stops moving. [6]
5. [Maximum mark: 2]
(a) State the hexadecimal equivalent of the binary number
11111011. [1]
(b) State the binary equivalent of the denary number 89. [1]
6. [Maximum mark: 2]
Distinguish between two types of primary memory. [2]
7. [Maximum mark: 15]
(a) Define the NOR Boolean operator. [1]
A car has features that monitor its speed, direction and distance from the car in
front. This is shown in Figure 1.
Figure 1: Rules to control car motion
For example, if the car is travelling forward, input B would have a binary
representation of 1.
(b) Construct a logic diagram with inputs A, B, and C and output Z
to represent the following scenario:
Output Z equals 1 when:
the car is travelling forward AND it is less than 20 metres
from the vehicle in front.
OR
the car speed is more than 130 km per hour.
In all other conditions, output Z equals 0. [4]
An additional row (input D) is to be added to assist when the car is in reverse or
stationary. Input D checks if there are obstructions less than 3 metres from the
rear of the car.
(c) State the rules that need to be added to Figure 1 to test this
condition. [2]
Information similar to that presented in Figure 1 could be used to construct
decisions and conditions in program design (see Figure 2).
Figure 2: Identifiers for car motion rules
(d) Determine the value of the following expression given that the
input values for F, S and T are:
F = 40
S = 115
T = true
F >= 25 AND S >= 5 AND S <= 130 AND T = true
You must show your working. [2]
(e) Construct an algorithm in pseudocode that repeats the
following steps while the car is moving:
Input the value for the distance from the vehicle in front.
Input the value for the speed of the car.
Check the inputs and notify the user if either the distance
from the car in front is less than 15 metres or if the speed of
the car is more than 115 kilometres per hour. [6]
The algorithm will only terminate when the car stops moving.
8. [Maximum mark: 4]
(a) Outline the purpose of the memory address register (MAR). [2]
(b) Outline the role of the arithmetic logic unit (ALU). [2]
9. [Maximum mark: 2]
Outline the purpose of the memory data register (MDR). [2]
10. [Maximum mark: 2]
(a) State the binary equivalent of the denary number 37. [1]
(b) State the hexadecimal equivalent of the binary number
10011110. [1]
11. [Maximum mark: 15]
A large hotel chain runs hotels in many locations around the world. Data is kept
locally at each property, and centrally, so that the hotel chain can be managed.
Any computer system that stores data runs the risk of data loss.
(a) State two causes of data loss. [2]
(b) Outline one consequence for a hotel of the loss of its
reservations data. [2]
(c) Describe one method the hotel chain could use to prevent its
data from being lost. [2]
The hotel chain has implemented a significant upgrade to its computer system
that requires the data to be migrated from the legacy system to the new system.
(d) Outline one problem that may arise during the data migration
process. [2]
The hotel chain makes use of tablet computers for use around its hotels as well
as fixed desktop computer terminals at key locations. The resources available on
these computers include primary and secondary storage.
(e) Compare and contrast the primary and secondary storage
resources of tablet computers and desktop computers. [3]
(f.i) Identify one other hardware resource within tablet computers
and desktop computers. [1]
(f.ii) Explain why the network connectivity of a desktop computer is
different to the network connectivity of a tablet computer. [3]
12. [Maximum mark: 15]
(a) Define the NOR Boolean operator. [1]
A car has features that monitor its speed, direction and distance from the car in
front. This is shown in Figure 1.
Figure 1: Rules to control car motion
For example, if the car is travelling forward, input B would have a binary
representation of 1.
(b) Construct a logic diagram with inputs A, B, and C and output Z
to represent the following scenario:
Output Z equals 1 when:
the car is travelling forward AND it is less than 20 metres
from the vehicle in front.
OR
the car speed is more than 130 km per hour.
In all other conditions, output Z equals 0. [4]
An additional row (input D) is to be added to assist when the car is in reverse or
stationary. Input D checks if there are obstructions less than 3 metres from the
rear of the car.
(c) State the rules that need to be added to Figure 1 to test this
condition. [2]
Information similar to that presented in Figure 1 could be used to construct
decisions and conditions in program design (see Figure 2).
Figure 2: Identifiers for car motion rules
(d) Determine the value of the following expression given that the
input values for F, S and T are:
F=5
S = 30
T = true
F >= 25 AND S >= 10 AND S <= 130 AND T = true
You must show your working. [2]
(e) Construct an algorithm in pseudocode that repeats the
following steps while the car is moving:
Input the value for the distance from the vehicle in front.
Input the value for the speed of the car.
Check the inputs and notify the user if either the distance
from the car in front is less than 20 metres or if the speed of
the car is more than 130 kilometres per hour.
The algorithm will only terminate when the car stops moving. [6]
13. [Maximum mark: 2]
Outline the purpose of the memory address register (MAR). [2]
14. [Maximum mark: 2]
(a) State the hexadecimal equivalent of the binary number
11111011.
[1]
(b) State the binary equivalent of the denary number 89. [1]
15. [Maximum mark: 15]
(a) Define the NOR Boolean operator.
[1]
A car has features that monitor its speed, direction and distance from the car in
front. This is shown in Figure 1.
Figure 1: Rules to control car motion
For example, if the car is travelling forward, input B would have a binary
representation of 1.
(b) Construct a logic diagram with inputs A, B, and C and output Z
to represent the following scenario:
Output Z equals 1 when:
the car is travelling forward AND it is less than 20 metres
from the vehicle in front.
OR
the car speed is more than 130 km per hour.
In all other conditions, output Z equals 0.
[4]
An additional row (input D) is to be added to assist when the car is in reverse or
stationary. Input D checks if there are obstructions less than 3 metres from the
rear of the car.
(c) State the rules that need to be added to Figure 1 to test this
condition. [2]
Information similar to that presented in Figure 1 could be used to construct
decisions and conditions in program design (see Figure 2).
Figure 2: Identifiers for car motion rules
(d) Determine the value of the following expression given that the
input values for F, S and T are:
F = 40
S = 115
T = true
F >= 25 AND S >= 5 AND S <= 130 AND T = true
You must show your working. [2]
(e) Construct an algorithm in pseudocode that repeats the
following steps while the car is moving:
Input the value for the distance from the vehicle in front.
Input the value for the speed of the car.
Check the inputs and notify the user if either the distance
from the car in front is less than 15 metres or if the speed of
the car is more than 115 kilometres per hour.
[6]
The algorithm will only terminate when the car stops moving.
16. [Maximum mark: 15]
A large hotel chain runs hotels in many locations around the world. Data is kept
locally at each property, and centrally, so that the hotel chain can be managed.
Any computer system that stores data runs the risk of data loss.
(a) State two causes of data loss.
[2]
(b) Outline one consequence for a hotel of the loss of its
reservations data. [2]
(c) Describe one method the hotel chain could use to prevent its
data from being lost. [2]
The hotel chain has implemented a significant upgrade to its computer system
that requires the data to be migrated from the legacy system to the new system.
(d) Outline one problem that may arise during the data migration
process. [2]
The hotel chain makes use of tablet computers for use around its hotels as well
as fixed desktop computer terminals at key locations. The resources available on
these computers include primary and secondary storage.
(e) Compare and contrast the primary and secondary storage
resources of tablet computers and desktop computers. [3]
(f.i) Identify one other hardware resource within tablet computers
and desktop computers. [1]
(f.ii) Explain why the network connectivity of a desktop computer is
different to the network connectivity of a tablet computer. [3]
17. [Maximum mark: 15]
(a) Define the NOR Boolean operator.
[1]
A car has features that monitor its speed, direction and distance from the car in
front. This is shown in Figure 1.
Figure 1: Rules to control car motion
For example, if the car is travelling forward, input B would have a binary
representation of 1.
(b) Construct a logic diagram with inputs A, B, and C and output Z
to represent the following scenario:
Output Z equals 1 when:
the car is travelling forward AND it is less than 20 metres
from the vehicle in front.
OR
the car speed is more than 130 km per hour.
In all other conditions, output Z equals 0.
[4]
An additional row (input D) is to be added to assist when the car is in reverse or
stationary. Input D checks if there are obstructions less than 3 metres from the
rear of the car.
(c) State the rules that need to be added to Figure 1 to test this
condition. [2]
Information similar to that presented in Figure 1 could be used to construct
decisions and conditions in program design (see Figure 2).
Figure 2: Identifiers for car motion rules
(d) Determine the value of the following expression given that the
input values for F, S and T are:
F = 40
S = 115
T = true
F >= 25 AND S >= 5 AND S <= 130 AND T = true
You must show your working. [2]
(e) Construct an algorithm in pseudocode that repeats the
following steps while the car is moving:
Input the value for the distance from the vehicle in front.
Input the value for the speed of the car.
Check the inputs and notify the user if either the distance
from the car in front is less than 15 metres or if the speed of
the car is more than 115 kilometres per hour.
[6]
The algorithm will only terminate when the car stops moving.
18. [Maximum mark: 15]
A large hotel chain runs hotels in many locations around the world. Data is kept
locally at each property, and centrally, so that the hotel chain can be managed.
Any computer system that stores data runs the risk of data loss.
(a) State two causes of data loss.
[2]
(b) Outline one consequence for a hotel of the loss of its
reservations data. [2]
(c) Describe one method the hotel chain could use to prevent its
data from being lost. [2]
The hotel chain has implemented a significant upgrade to its computer system
that requires the data to be migrated from the legacy system to the new system.
(d) Outline one problem that may arise during the data migration
process. [2]
The hotel chain makes use of tablet computers for use around its hotels as well
as fixed desktop computer terminals at key locations. The resources available on
these computers include primary and secondary storage.
(e) Compare and contrast the primary and secondary storage
resources of tablet computers and desktop computers.
[3]
(f.i) Identify one other hardware resource within tablet computers
and desktop computers. [1]
(f.ii) Explain why the network connectivity of a desktop computer is
different to the network connectivity of a tablet computer. [3]
19. [Maximum mark: 3]
Construct a truth table for the following expression:
A OR NOT B AND C [3]
20. [Maximum mark: 2]
Identify three functions of the control unit (CU) in the central
processing unit (CPU). [2]
21. [Maximum mark: 15]
The staff at a doctor’s practice consist of a receptionist and a doctor.
The patients’ medical records and payments, the doctor’s appointment calendar,
and other important data are stored in a database on the central computer.
(a) Outline one security measure that can be taken to prevent
unauthorized access to the patients’ data stored on the central
computer. [2]
(b.i) Identify one cause of data loss. [1]
(b.ii) Describe one method that can be used to prevent data loss. [2]
A new vaccine has been distributed that would be of benefit to some of the
doctor’s patients. A large number of personalized letters need to be written to
these patients, inviting them to visit the doctor’s practice to be vaccinated.
(c) Describe how these letters could be automatically generated by
a word processing application. [3]
When the doctor visits a patient in their home, she needs to be able to access the
patient’s medical records stored on the central computer in the practice.
(d) Outline two reasons for the use of a virtual private network
(VPN) in this situation. [4]
A mobile data connection enables the doctor to access internet resources while
visiting patients in their homes. Sometimes the data transfer speeds are slow.
(e) Explain why the speed of data transmission across a mobile
network can vary. [3]
22. [Maximum mark: 15]
A systems analyst has been employed to make proposals on how to improve the
current operation of a design company.
To achieve this, the analyst decided to carry out interviews.
(a.i) Identify one other method of obtaining information from the
end-users. [1]
(a.ii) Outline one advantage of using the method identified in part
(a)(i) in preference to interviews. [2]
(b) Outline the purpose of prototypes. [2]
A software company has been employed to program and implement a new
system proposed by the systems analyst.
(c) Explain why software testing is important at all stages of
implementation. [3]
Using images in design may have ethical considerations.
(d) Explain one ethical problem associated with using images. [3]
Images are sometimes larger than the limit placed on email attachments. For
example, a 60 MB image file needs to be sent by email without losing quality, but
a file larger than 10 MB cannot be uploaded as an attachment.
(e.i) Describe how large image files can be sent by email. [3]
(e.ii) State one other hardware or software problem associated with
the use of images. [1]
23. [Maximum mark: 1]
Define the Boolean NAND operator. [1]
24. [Maximum mark: 3]
Identify three functions of the control unit (CU) in the central
processing unit (CPU). [3]
25. [Maximum mark: 15]
A systems analyst has been employed to make proposals on how to improve the
current operation of a design company.
To achieve this, the analyst decided to carry out interviews.
(a.i) Identify one other method of obtaining information from the
end-users.
[1]
(a.ii) Outline one advantage of using the method identified in part
(a)(i) in preference to interviews. [2]
(b) Outline the purpose of prototypes. [2]
A software company has been employed to program and implement a new
system proposed by the systems analyst.
(c) Explain why software testing is important at all stages of
implementation. [3]
Using images in design may have ethical considerations.
(d) Explain one ethical problem associated with using images. [3]
Images are sometimes larger than the limit placed on email attachments. For
example, a 60 MB image file needs to be sent by email without losing quality, but
a file larger than 10 MB cannot be uploaded as an attachment.
(e.i) Describe how large image files can be sent by email. [3]
(e.ii) State one other hardware or software problem associated with
the use of images. [1]
26. [Maximum mark: 15]
The staff at a doctor’s practice consist of a receptionist and a doctor.
The patients’ medical records and payments, the doctor’s appointment calendar,
and other important data are stored in a database on the central computer.
(a) Outline one security measure that can be taken to prevent
unauthorized access to the patients’ data stored on the central
computer.
[2]
(b.i) Identify one cause of data loss. [1]
(b.ii) Describe one method that can be used to prevent data loss. [2]
A new vaccine has been distributed that would be of benefit to some of the
doctor’s patients. A large number of personalized letters need to be written to
these patients, inviting them to visit the doctor’s practice to be vaccinated.
(c) Describe how these letters could be automatically generated by
a word processing application. [3]
When the doctor visits a patient in their home, she needs to be able to access the
patient’s medical records stored on the central computer in the practice.
(d) Outline two reasons for the use of a virtual private network
(VPN) in this situation. [4]
A mobile data connection enables the doctor to access internet resources while
visiting patients in their homes. Sometimes the data transfer speeds are slow.
(e) Explain why the speed of data transmission across a mobile
network can vary. [3]
27. [Maximum mark: 2]
Outline the function of a web browser. [2]
28. [Maximum mark: 2]
Outline one reason for using Unicode to represent data in a computer
system. [2]
29. [Maximum mark: 4]
Construct a truth table for the logic expression
A NAND (B NOR C) [4]
30. [Maximum mark: 4]
(a) Identify one characteristic of random access memory (RAM). [1]
(b) Explain the use of cache memory. [3]
31. [Maximum mark: 2]
Outline the function of a web browser. [2]
32. [Maximum mark: 2]
Outline one reason for using Unicode to represent data in a computer
system. [2]
33. [Maximum mark: 4]
(a) Identify one characteristic of random access memory (RAM). [1]
(b) Explain the use of cache memory. [3]
34. [Maximum mark: 4]
Construct a truth table for the logic expression
(A NAND B) NOR C [4]
35. [Maximum mark: 2]
Outline the function of a web browser. [2]
36. [Maximum mark: 2]
Outline one reason for using Unicode to represent data in a computer
system. [2]
37. [Maximum mark: 4]
Construct a truth table for the logic expression
A NAND (B NOR C) [4]
38. [Maximum mark: 2]
Distinguish between random access memory (RAM) and read-only
memory (ROM). [2]
39. [Maximum mark: 2]
Outline the function of a web browser. [2]
40. [Maximum mark: 2]
Outline one reason for using Unicode to represent data in a computer
system. [2]
41. [Maximum mark: 4]
Construct a truth table for the logic expression
A NAND (B NOR C)
[4]
42. [Maximum mark: 2]
Distinguish between random access memory (RAM) and read-only
memory (ROM). [2]
43. [Maximum mark: 2]
State two features of a web browser. [2]
44. [Maximum mark: 3]
Construct a truth table for the following expression:
(A XOR B) AND B [3]
45. [Maximum mark: 2]
Each pixel on a computer screen has three colour values associated with it: red,
green and blue. The range for each of the three colour values is from 0(10) to
255(10).
Colour values can also be represented in hexadecimal. For example, the colour
blue can be represented in hexadecimal as 0000FF.
(a) State the binary representation of the colour blue. [1]
(b) State the number of colours that can be represented in each
pixel on the computer screen. [1]
46. [Maximum mark: 2]
Define the Boolean operator XOR. [2]
47. [Maximum mark: 4]
Draw the truth table for the following logic circuit.
[4]
48. [Maximum mark: 1]
Identify one function of a single-user operating system. [1]
49. [Maximum mark: 1]
Define the term usability. [1]
50. [Maximum mark: 3]
Explain how cache memory affects system performance. [3]
51. [Maximum mark: 4]
(a) Calculate, showing your working in each case: the binary (base
2) value of the denary (base 10) number: 105.
[2]
(b) Calculate, showing your working in each case: the hexadecimal
(base 16) value of the denary (base 10) number: 200. [2]
52. [Maximum mark: 1]
State the hexadecimal representation of the binary number 10001010. [1]
53. [Maximum mark: 2]
Draw the logic circuit represented by the following truth table.
[2]
54. [Maximum mark: 2]
Calculate the denary (base 10) equivalent of the hexadecimal number
BF. [2]
55. [Maximum mark: 4]
Construct the truth table for the following logic circuit:
[4]
56. [Maximum mark: 4]
Construct a truth table for the following logical expression.
(A XOR B) AND NOT C [4]
57. [Maximum mark: 4]
The machine instruction cycle is a sequence of actions that a central processing
unit (CPU) performs to execute each machine code instruction in a program.
(a) State where the program is held. [1]
(b) State the part of the central processing unit (CPU) that performs
the decoding. [1]
(c) Outline the function of the memory address register (MAR). [2]
58. [Maximum mark: 15]
Website developers need to consider a range of usability factors when designing
a website.
(a) Identify two usability factors that need to be considered in the
design of a website. [2]
(b) Outline one reason why visual displays on a computer screen
can create difficulties for some people. [2]
A company promotes its products online. To make a purchase, customers are
required to register with the company and provide data like their name, date of
birth, age, gender and email address. Once registered, more than one customer is
able to access the server to retrieve and modify their data at the same time.
(c.i) State where the customer data is held during the process of
modifying their data. [1]
(c.ii) Explain how the operating system ensures that each customer’s
data is secure when multiple users are accessing the data at the
same time. [4]
(d) The company is considering sharing its customers’ data with
marketing organizations.
Explain why there could be ethical issues for the company
when sharing its customers’ data. [6]
59. [Maximum mark: 4]
Copy and complete the following truth table where:
X = A XOR B
Y = A NOR C
Z = X OR NOT Y
[4]
60. [Maximum mark: 3]
Colours are represented by a computer as a combination of the three primary
colours: red, green and blue.
Numerical values are used to represent the different shades of each primary
colour. These values range from 0 to 255 in decimal, or 00 to FF in hexadecimal.
(a) State why hexadecimal numbers are frequently used in
computing. [1]
(b) State the number of bits used to represent a non-primary
colour, such as yellow. [1]
(c) State the maximum number of colours that can be represented
in a computer pixel. [1]
61. [Maximum mark: 4]
(a) State the function of the control unit (CU) in the central
processing unit (CPU). [1]
(b) Explain the purpose of cache memory. [3]
62. [Maximum mark: 2]
Identify two features of a graphical user interface (GUI). [2]
63. [Maximum mark: 1]
State the hexadecimal equivalent of the following binary number:
11011111 [1]
64. [Maximum mark: 3]
Construct the truth table from the following logic circuit.
[3]
© International Baccalaureate Organization, 2025