Practice Questions
Practice Questions
Exam Questions
Hard (1 question) /6
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 An office has an automated lighting system. When movement is detected in the office,
the lights are switched on. If movement is not detected for a period of two minutes, the
lights are switched off.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
2 (a) A printer is one example of an output device.
(3 marks)
(3 marks)
3 A farm has an automated drinking system for its animals. The drinking system has a
water bowl that contains the water. When the water bowl is empty, it is automatically
refilled.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
Medium Questions
1 The paragraph describes the use of output devices in a modern office.
Complete the paragraph using the most appropriate terms from the list. Not all of the
terms in the list need to be used.
actuator
inkjet printer
laser printer
speaker
3D printer
In a modern office setup, various devices are used to enhance productivity and
communication.
For displaying presentations and videos, a __________ (1) is commonly used as it projects
high-quality images onto a large screen.
When it comes to producing physical documents, a __________ (2) printer is preferred for
its fast and precise text printing, while an __________ (3) printer is chosen if budget is a
concern.
For outputting clear audio during meetings or multimedia sessions, a __________ (4)
ensures everyone can hear the sound clearly.
Additionally, a __________ (5) screen is often used in office monitors for its bright and
sharp display, making it ideal for daily work.
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
Hard Questions
1 A farm has an automated drinking system for its animals. The drinking system has a
water bowl that contains the water. When the water bowl is empty, it is automatically
refilled.
Describe how the sensor and the microprocessor are used to automatically refill the
water bowl.
(6 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
O Level Cambridge (CIE) Computer Science 12 mins 4 questions
Exam Questions
File Handling
File Handling
Medium (2 questions) /5
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 State the two actions from the list below that a program needs to take to store data in
a file.
activate
calculate
close
open
output
read
search
sort
write
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
2 State five file-handling operations from the list below:
calculate
close
count
create
input
open
output
read
sort
search
test
total
write
(5 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
Medium Questions
1 Explain why a program might need to store data in a file
(3 marks)
2 A program halted unexpectedly with the error message ‘File not found’ whilst trying to
read data from a file.
Outline the actions that the program needs to take to prevent this error occurring.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
O Level Cambridge (CIE) Computer Science 21 mins 7 questions
Exam Questions
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 The Unicode character set is used to represent text that is typed into a computer.
One disadvantage of using the Unicode character set, instead of the ASCII character set,
is that the text stored takes up more storage space.
(1 mark)
Tick( )
Video
Sound
Image
(1 mark)
3 A student has a sound file that is too large to be stored on their external secondary
storage device. The student compresses the sound file to make the file size smaller.
The compression method used reduces the sample rate and the sample resolution of
the sound file.
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
(2 marks)
Each square in the image represents one pixel, with three different colours being used
in the image.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
Medium Questions
1 The Unicode character set is used to represent text that is typed into a computer.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
Hard Questions
1 (a) A student is creating a range of documents for a school project.
(3 marks)
(b) Tick ( ) one or more boxes on each row to identify the effect(s) that each change will
have on the sound file.
Duration changes
from 10 minutes to 20
minutes
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
(3 marks)
2 Discuss the trade-offs between image quality and file size when choosing a bitmap
image's resolution and colour depth.
(8 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
O Level Cambridge (CIE) Computer Science 19 mins 6 questions
Exam Questions
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 Identify the type of data transmission used in a USB connection.
[1]
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
Medium Questions
1 Julia inputs personal data into her computer.
She stores three copies of the data using a hard disk drive (HDD), a solid state drive (SSD)
and a USB flash memory drive.
Julia uses a USB connection to transfer data onto her USB flash memory drive.
Benefit 1 .................................................................
Benefit 2 .................................................................
[2]
(3 marks)
2 A student has a sound file that is too large to be stored on their external secondary
storage device. The student compresses the sound file to make the file size smaller.
The compression method used reduces the sample rate and the sample resolution of the
sound file.
The student sends the sound file to a friend. The file is transmitted across a network that
uses packet switching.
Identify two pieces of data that would be included in the header of each packet.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
Hard Questions
1 A company has a website that is stored on a web server.
(4 marks)
2 The website hosts videos that users can stream. The company uploads new videos to the
website.
The company uses parallel half-duplex data transmission to transmit the data for the
new videos to the web server.
Explain why parallel half-duplex data transmission is the most appropriate method.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
3 A student has a sound file that is too large to be stored on their external secondary
storage device. The student compresses the sound file to make the file size smaller.
The student sends the sound file to a friend. The file is transmitted across a network that
uses packet switching.
(5 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
O Level Cambridge (CIE) Computer Science 7 mins 3 questions
Exam Questions
Robotics
Robotics
Medium (2 questions) /6
Total Marks /7
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 A company uses robots in its factory to manufacture large pieces of furniture.
Give one disadvantage to the company’s owners of using robots to manufacture large
pieces of furniture.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
Medium Questions
1 Robots are used in a factory to build cars.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
2 (a) A company uses robots in its factory to manufacture large pieces of furniture.
(2 marks)
(b) Give two advantages to company employees of using robots to manufacture large
pieces of furniture.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
O Level Cambridge (CIE) Computer Science 3 mins 2 questions
Exam Questions
Digital Currency
Digital Currency
Total Marks /3
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
1 Digital currency can be used to buy products from the world wide web.
(1 mark)
2 Digital currency can be used to buy products from the world wide web.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
O Level Cambridge (CIE) Computer Science 10 mins 3 questions
Exam Questions
Encryption
Encryption
Hard (1 question) /4
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 State what is given to a device when it connects to a wireless network using the SSID
and correct password.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
Medium Questions
1 Complete the sentences about symmetric encryption.
Some of the terms in the list will not be used. You should only use a term once.
algorithm
cipher
copied
delete
key
plain
private
public
standard
stolen
understood
unreadable
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
(5 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
Hard Questions
1 A company is setting up both wireless and wired networks for secure communication
between employees. The IT team must ensure that all data transmitted across the
networks is encrypted.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
O Level Cambridge (CIE) Computer Science 33 mins 10 questions
Exam Questions
Hard (2 questions) /6
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 Three Internet terms are browser, Internet Protocol (IP) address and Uniform Resource
Locator (URL).
Tick ( ) to show which statements apply to each Internet term. Some statements may
apply to more than one Internet term.
it is a type of software
it is a type of address
it stores cookies
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
(5 marks)
2 A student uses the internet for their schoolwork to research what is meant by harming.
(2 marks)
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
Medium Questions
1 A web server has an internet protocol (IP) address.
https://www.cambridgeassessment.org.uk/index.html
Complete the table to identify the name of each section of the URL.
https
cambridgeassessment.org.uk
/index.html
(3 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
2 Hexadecimal is used for Hypertext Markup Language (HTML) colour codes.
#2F15D6
(4 marks)
The table contains five terms or definitions that relate to the Internet
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
Term Definition
browser
Uniform Resource
Locator (URL)
cookie
(5 marks)
4 A student uses the internet for their schoolwork to research what is meant by harming.
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
(3 marks)
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 7
Hard Questions
1 Explain why presentation is often separated from structure when creating a web page.
(2 marks)
2 A student visits a website that uses session cookies, instead of persistent cookies.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 8
O Level Cambridge (CIE) Computer Science 1 hour 12 questions
Exam Questions
Number Systems
Computers & Binary / Number Systems / Converting Between Binary & Denary /
Converting Between Hexadecimal & Denary / Converting Between Hexadecimal &
Binary / Uses of Hexadecimal / Binary Addition / Binary Shifts / Two's Complement
Hard (1 question) /6
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 (a) Binary is a number system used by computers.
Tick ( ) one box to show which 8-bit binary value is the correct conversion for the
denary value 50.
A. 00101010
B. 00110010
C. 01001100
D. 01010000
(1 mark)
Tick ( ) one box to show which 8-bit binary value is the correct conversion for the
hexadecimal value 90.
A. 00001001
B. 01011010
C. 10010000
D. 01100100
(1 mark)
(c) Explain why a computer system can only process data in binary form
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
Add the two 8-bit binary values.
00111001
01001010
(3 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
2 (a) All data needs to be converted to binary data so that it can be processed by a computer.
(2 marks)
(b) The denary values 64, 101 and 242 are converted to 8‑bit binary values.
64 ................................
101 ................................
242 ................................
(3 marks)
42 .................
CE ..................
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
3 (a) Denary values are converted to binary values to be processed by a computer.
Draw one line from each denary value to the correctly converted 8‑bit binary value.
(3 marks)
Give the correct denary value for the 12‑bit binary value 000101010111
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
(2 marks)
#2F15D6
HTML colour codes and Media Access Control (MAC) addresses are two examples of
where hexadecimal is used in Computer Science.
Give two other examples of where hexadecimal can be used in Computer Science.
Example 1
Example 2
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
5 (a) A school network has several computers.
Each computer in the network has a media access control (MAC) address.
97–5C–E1
97
5C
(4 marks)
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 7
(c) Another value is stored as binary in a register.
0 1 0 1 0 0 1 0
Complete the binary register to show its contents after this logical left shift.
(2 marks)
(d) State one effect this logical shift has on the binary value.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 8
6 (a) Binary is a number system used by computers.
Tick ( ) one box to show which statement about the binary number system is correct.
A. It is a base 1 system
B. It is a base 2 system
C. It is a base 10 system
D. It is a base 16 system
(1 mark)
50 ...............................
102 ..............................
221 ...............................
(3 marks)
00110011
01100001
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 9
(3 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 10
Medium Questions
1 Negative denary numbers can also be represented as binary using two’s complement.
Register:
(2 marks)
State the name of this type of error and explain why this error occurs.
Error name:
Explanation:
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 11
(3 marks)
3 Two binary numbers are added by a computer and an overflow error occurs.
(2 marks)
#2F15D6
Give the 8 bit binary value that would be stored for each pair of hexadecimal digits.
2F
15
D6
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 12
(6 marks)
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 13
Hard Questions
1 Ron is attending a music concert. He has bought three tickets.
Complete the table to show the 12-bit binary values and the denary values for each
Hexadecimal ticket number
028
1A9
20c
(6 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 14
O Level Cambridge (CIE) Computer Science 36 mins 7 questions
Exam Questions
Automated Systems
Automated Systems
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 State two main components of an automated system.
(2 marks)
(2 marks)
3 Give one advantage and one disadvantage of using automated systems in industry.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
Medium Questions
1 Sensors and a microprocessor are used to maintain the correct conditions in a fish tank.
Describe how the sensors and the microprocessor are used to maintain the correct
conditions in the fish tank.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
Hard Questions
1 Jamelia has a greenhouse that she uses to grow fruit and vegetables. She needs to make
sure the temperature in the greenhouse stays between 25°C and 30°C (inclusive).
A system that has a temperature sensor and a microprocessor is used to maintain the
temperature in the greenhouse. The system will:
Describe how the system uses the temperature sensor and the microprocessor to
maintain the temperature in the greenhouse.
(8 marks)
2 A theme park has a game where a player tries to run from the start to the finish without
getting wet.
The system for the game uses sensors and a microprocessor to spray water at a player
as they run past each sensor.
Describe how the sensors and the microprocessor are used in this system.
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
(6 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
3 (a) A factory uses an automated system to control the temperature of its storage rooms.
Explain how the automated system maintains the desired temperature in the storage
rooms.
(8 marks)
(b) Discuss two advantages and two disadvantages of using such an automated system in
the factory.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
O Level Cambridge (CIE) Computer Science 23 mins 7 questions
Exam Questions
Methods of Error
Detection
Error Checking / Error Detection Methods / Check Digits / Automatic Repeat Query
(ARQ)
Hard (2 questions) /9
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 Identify two reasons why errors can occur when using wireless technology to transmit
data.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
Medium Questions
1 Four 7-bit binary values are transmitted from one computer to another. A parity bit is
added to each binary value creating 8-bit binary values. All the binary values are
transmitted and received correctly.
Identify whether each 8-bit binary value has been sent using odd or even parity by
writing odd or even in the type of parity column.
01100100
10010001
00000011
10110010
(4 marks)
2 The contents of three binary registers have been transmitted from one computer to
another.
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
No errors have been detected in Register A and Register C.
Complete the parity bit for each register to show the given outcome
(3 marks)
3 Victoria is entering data into a computer system. The data will be transmitted to cloud
storage.
A check digit is used to check whether data is correct when entered into the system.
Describe how a check digit can be used to make sure the data entered is correct.
(4 marks)
4 Why is it important for computers to check that data is in the expected format?
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
Hard Questions
1 Data will be checked using a checksum.
Describe how a checksum can be used to check that data entered into a system has
been transmitted correctly
(5 marks)
2 Explain how the Automatic Repeat reQuest (ARQ) protocol ensures data integrity during
transmission
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
O Level Cambridge (CIE) Computer Science 31 mins 10 questions
Exam Questions
Types of
Programming
Language, Translators
& Integrated
Development
Environments (IDEs)
Levels of Programming Languages / Assembly Language / Translators, Compilers &
Interpreters / Tools & Facilities in IDEs
Hard (1 question) /6
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 (a) A programmer uses a high-level language to create a computer program.
(2 marks)
(b) Suggest one disadvantage to the programmer of using a high-level language instead of
a low-level language.
(1 mark)
(1 mark)
One similarity between a compiler and an interpreter is that they both translate
high‑level language into machine code.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
4 Jason is a programmer who writes computer programs in a high level language.
(3 marks)
5 A programmer uses a low level language to write a computer program for a vending
machine.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
Medium Questions
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
1 Complete the statements about different types of programming language.
assembly
denary
executable file
instruction
storage
hexadecimal
high-level
low-level
machine code
protocol
source code
style
syntax
translator
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
When programs are written in this type of language they need a
............................................. to convert them into ............................................. .
(6 marks)
(3 marks)
One similarity between a compiler and an interpreter is that they both translate
high‑level language into machine code.
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
(4 marks)
Give two reasons why the programmer would choose to write the computer program in
a low level language instead of a high level language.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 7
Hard Questions
1 State three different features of a high-level programming language that a
programmer could use to make sure that their program will be easier to understand by
another programmer.
(6 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 8
O Level Cambridge (CIE) Computer Science 1 hour 15 questions
Exam Questions
Cyber Security
Cyber Security Threats / Keeping Data Safe
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 A company has a website that is stored on a web server.
Suggest one security device that can be used to help prevent a DDoS attack.
(1 mark)
2 A student is concerned about the threats to their computer when using the internet
The student wants to use some security solutions to help protect the computer from the threats.
Identify a security solution that could be used to protect the computer from a computer virus, hacking and spyware.
Computer virus
Hacking
Spyware
(3 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
3 (a) Adele chooses to set a biometric password for her mobile device, instead of a personal identification number (PIN).
(1 mark)
(b) Adele also encrypts the data on her mobile device to keep it more secure.
(1 mark)
Joelle uses a firewall to keep her data safe when she uses the Internet.
Tick ( )
(1 mark)
One security method to keep data safe from online attacks is a firewall.
Identify two other security methods that keep data safe from online attacks.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
6 (a) A manager at a company is concerned about a brute force attack on its employee user accounts.
One possible aim for carrying out a brute‑force attack is to install malware onto the company network.
(3 marks)
(b) Give two security solutions that could be used to help prevent a brute‑force attack being successful.
(2 marks)
7 A student uses the internet for their schoolwork to research what is meant by pharming.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
Medium Questions
1 A company has a website that is stored on a web server.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
2 (a) Adele chooses to set a biometric password for her mobile device, instead of a personal identification number (PIN).
Give two reasons why a biometric password is more secure than a PIN.
(2 marks)
(b) Adele has a software based firewall installed on her mobile device.
The firewall gathers data about the traffic coming into and going out of her mobile device.
Explain how the firewall uses the gathered data to keep the mobile device more secure.
(3 marks)
Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
4 (a) Millions of emails are sent between users on a daily basis.
Identify two online security attacks that can be carried out using email.
(6 marks)
One example of how data can be damaged accidentally is by shutting down a computer before saving data. To prevent this from happening
they have saved all data before shutting down a computer.
Complete the table by giving three other examples of how data can be damaged accidentally.
................................................................................................................................................ ..............................................................................................
................................................................................................................................................ ..............................................................................................
................................................................................................................................................ ..............................................................................................
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 7
5 (a) A manager at a company is concerned about a brute force attack on its employee user accounts
Describe how a brute‑force attack can be used to gain access to the employee user accounts.
(3 marks)
(b) A manager at a company is concerned about a brute force attack on its employee user accounts.
One possible aim for carrying out a brute‑force attack is to install malware onto the company network.
State two other aims for carrying out a brute‑force attack to gain access to the employee user accounts.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 8
Hard Questions
1 An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on its website.
Describe the process of SSL and explain how it provides a secure connection.
(6 marks)
2 A student is concerned about the threats to their computer when using the internet.
The student wants to use some security solutions to help protect the computer from the threats.
Describe how each of the following security solutions will help protect the computer.
Anti-malware
Two-step verification
Passwords
(6 marks)
3 A student uses the internet for their schoolwork to research what is meant by harming
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 9
O Level Cambridge (CIE) Computer Science 28 mins 9 questions
Exam Questions
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 A computer has a Von Neumann architechure.
Tick ( ) one box to show the part of a computer of which the bootstrap is an example.
A. application software
B. firmware
C. hard disk drive
D. MAC address
(1 mark)
2 Three types of storage media are magnetic, optical and solid state.
A business is creating a new mobile device that has an SSD as secondary storage.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
3 (a) Define the term 'operating system'.
(2 marks)
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
Medium Questions
1 In a computer system the operating system is run directly on the firmware.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
2 Complete the statements about different types of software.
Some of the terms in the list will not be used. You should only use a term once.
application
assembly language
bootloader
firmware
hardware
operating
output
system
user
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
3 Operating systems often provide user interfaces.
Describe the difference between a graphical user interface (GUI) and a command line
interface (CLI) and give an example of where each might be used.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
Hard Questions
1 One function of an operating system is to manage interrupts.
(2 marks)
(6 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 7
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 8
O Level Cambridge (CIE) Computer Science 33 mins 11 questions
Exam Questions
Computer
Architecture
The CPU & Microprocessors / Von Neumann Architecture / The Fetch-Decode-
Execute Cycle / Characteristics of the CPU / CPU Instruction Sets / Embedded
Systems
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 A computer has a Von Neumann architecture.
Circle three components that are part of the central processing unit (CPU) in this
computer.
(3 marks)
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
Medium Questions
1 A computer has a Von Neumann architecture
Describe the purpose of the control unit (CU) within this computer.
(2 marks)
Explain how the upgrade can affect the performance of the computer
(2 marks)
The laptop has a central processing unit (CPU) that performs the fetch–decode–execute
cycle.
The CPU has several components, including the memory data register (MDR) and the
arithmetic logic unit (ALU).
Describe how the MDR and the ALU are used in the fetch–decode–execute cycle.
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
(5 marks)
4 An office has an automated lighting system. When movement is detected in the office,
the lights are switched on. If movement is not detected for a period of two minutes, the
lights are switched off.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
5 (a) A computer is designed using the Von Neumann model for a computer system.
The CPU performs a cycle to process data. Fetch is the first stage in this cycle.
State the names of the second and third stages in the cycle.
(2 marks)
(b) Identify two components within the CPU that are used in the fetch stage of the cycle
(2 marks)
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
Hard Questions
1 An office has an automated lighting system. When movement is detected in the office,
the lights are switched on. If movement is not detected for a period of two minutes, the
lights are switched off.
Describe how the sensor and the microprocessor are used in this automated lighting
system.
(6 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 7
Instruction Mnemonic Binary Command
Code
2
1. LDA
2. ADD
3. STA
4. HLT
Explain what happens during the execution of this program, assuming it starts with an
initial value of 5 in the memory location loaded by the LDA instruction and the value to
add is 3.
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 8
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 9