Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The 1D array StudentName[] contains the names of students in a class. The 2D array StudentMark[] contains the mark for each subject, for each student.


The 1D array StudentName[] contains the names of students in a class. The 2D array StudentMark[] contains the mark for each subject, for each student. The position of each student's data in the two arrays is the same, for example, the student in position 10 in StudentName[] and StudentMark[] is the same. The variable ClassSize contains the number of students in the class. The variable SubjectNo contains the number of subjects studied. All students study the same number of subjects. The arrays and variables have already been set up and the data stored. Students are awarded a grade based on their average mark.


Average mark Grade awarded
greater than or equal to 70 distinction
greater than or equal to 55 and less than 70 merit
greater than or equal to 40 and less than 55 pass
less than 40

fail



Formulate a program that meets the following requirements: calculates the combined total mark for each student for all their subjects calculates the average mark for each student for all their subjects, rounded to the nearest whole number outputs for each student: - name - combined total mark - average mark - grade awarded calculates, stores and outputs the number of distinctions, merits, passes and fails for the whole class. You must use pseudocode or program code and add comments to explain how your code works. You do not need to initialise the data in the array.


Question 2;

The variables X, Y and Z are used to store data in a program: X stores a string Y stores a position in the string (e.g. 2) Z stores the number of characters in the string. (a) Form pseudocode statements to declare the variables X, Y and Z.





B.(b) The function Length(X) finds the length of a string X. The function SubString(X,Y,Z) finds a substring of X starting at position Y and Z characters long. The first character in X is in position 1. Form pseudocode statements to: store the string "Programming is fun" in X find the length of the string and output it extract the word fun from the string and output it


Question 3:

0 An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on its website. Describe the process of SSL and explain how it provides a secure connection


Question 4:

Complete the sentences about symmetric encryption. Use the terms from the list. Some of the terms in the list will not be used. You should only use a term once. algorithm cipher copied delete key plain private public standard stolen understood unreadable The data before encryption is known as .................................................. text. To scramble the data, an encryption .................................................., which is a type of .................................................., is used. The data after encryption is known as .................................................. text. Encryption prevents the data from being .................................................. by a hacker.


Question 5:

Draw a diagram to represent how virtual memory is created and used.

b)) A student is using software to create 3D models. This process often requires the use of virtual memory. Explain why virtual memory is needed for this process.


Question 6:

Robots are used in a factory to build cars. (a) One characteristic of a robot is its mechanical structure. State two other characteristics of a robot.

(b) Suggest two advantages of using robots, instead of humans, to build cars in the factory.


Question 7:

The Unicode character set is used to represent text that is typed into a computer. (a) Describe what is meant by a character set.


(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is that the text stored takes up more storage space. Give one reason why it takes up more storage space.


Question 8:

A programmer uses a high-level language to create a computer program.

(a) (i) Identify two advantages to the programmer of using a high-level language instead of a low-level language. 1

(ii) Suggest one disadvantage to the programmer of using a high-level language instead of a low-level language. ] (b) The programmer uses an integrated development environment (IDE) when creating the computer program. State what is meant by an IDE.


Question 9:

A computer has a Von Neumann architechure. (a) Circle three components that are part of the central processing unit (CPU) in this computer. accumulator (ACC) hard disk drive (HDD) memory address register (MAR) program counter (PC) random access memory (RAM) read only memory (ROM) sensor sold state drive (SSD) [3] (b) Describe the purpose of the control unit (CU) within this computer

(c) The computer has a single core CPU. (i) State one purpose of a core in a CPU.

(ii) The computer is upgraded to a dual core CPU. Explain how the upgrade can affect the performance of the computer


Question 10:

(a) A web server has an internet protocol (IP) address. (i) Give three characteristics of an IP address. 1 .


(ii) Identify the network component that uses the IP address to send data only to its correct destination. (b) The website has a uniform resource locator (URL). An example of a URL is given.

Complete the table to identify the name of each section of the URL. URL section Name

/index.html

URL Section Name
https
cambridgeassessment.org.uk
index.html

Question 11:

A company has a website that is stored on a web server. (a) The website data is broken down into packets to be transmitted to a user. Describe the structure of a data packet.


(b) The website hosts videos that users can stream. The company uploads new videos to the website. (i) The videos are compressed before they are uploaded to the website. choose one to show which statement is a benefit of compressing the videos.

A Data is encrypted.

B Duration of each video will be reduced.

C Less storage space on the web server is required.



D More bandwidth is required when viewing the videos.

[1] (ii) Give two methods of compression that could be used to compress the videos


(iii) The company uses parallel half-duplex data transmission to transmit the data for the new videos to the web server. Explain why parallel half-duplex data transmission is the most appropriate method.



c) The company is concerned about a distributed denial of service (DDoS) attack. (i) Describe what is meant by a DDoS attack.


(ii) Suggest one security device that can be used to help prevent a DDoS attack.



Question 12:

a)Create an algorithm, using pseudocode or flowchart only, which: inputs three numbers outputs the largest of the three numbers


(b)Create an algorithm, using pseudocode or flowchart only, which: inputs 1000 numbers outputs how many of these numbers were whole numbers (integers) (You may use INT(x) in your answer, e.g. y = INT(3.8) gives the value y = 3)



(c) Describe, with examples, two sets of test data you would use to test your algorithm


Question 13:

Read this section of program code that inputs twenty (20) numbers and then outputs the largest number input. 1 h = 0 2 c = 0 3 REPEAT 4 READ x 5 IF x > h THEN x = h 6 c = c + 1 7 PRINT h 8 UNTIL c < 20 There are three errors in this code. Locate these errors and suggest a corrected piece of code.



Step by Step Solution

3.39 Rating (149 Votes )

There are 3 Steps involved in it

Step: 1

Question 1 To answer Question 1 we need to create a program that calculates the combined total mark average mark and grade for each student in the class as well as keep track of the number of distinct... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Prelude To Programming

Authors: Stewart Venit, Elizabeth Drake

6th Edition

013374163X, 978-0133741636

More Books

Students also viewed these Programming questions

Question

7. What is the relationship between birth order and homosexuality?

Answered: 1 week ago

Question

5. What does the enzyme 5a-reductase 2 do?

Answered: 1 week ago