Topic 3 - 3.
2 Data representation
3.2.2 Understand how bitmap images are represented in binary (pixels, resolution,
colour depth).
Please write your answers showing all the working out and give detailed answers
Exam style questions
Q1) A bitmap image is made up of pixels.
•(i) An image has five colours. - we need 3 bits why? 3 bits -
1 bit = 2 Colours
2 bits = 4 Colours
3 bits = 8 Colours
4 bits = 16 Colours
•Complete the table by adding a unique binary pattern for each colour.
•Each pattern must use the same minimum colour depth.
(2)
Colour Binary pattern
Green 000
Black 001
White 010
Red 011
Blue 100
Q2)
Another image is 3579 pixels high and 6128 pixels wide.
•The image is stored with a 32-bit colour depth.
•The metadata for the image is 732 bytes.
•Construct an expression to show how the file size, in megabytes, is calculated.
Please show the calculation
H x W x Color Depth = file size
(((3579 x 6128 x 32) / 8) + 732) / 1000= 87.72918
701827584/8 + 732 =87729180
87729180/1000=87729.18
Write the formula // H x W x Color Depth = file size
Plug in the values //3579 X 6128 = 21,924,312
Add the 32 bit 32/4 = 4 bites per pixel 4 x 21924312= 87697248
Add the metadata // 87697248 + 732 = 87697980
Bytes - megabytes = 1024 x 1024 = 1048576
Do the calculation 87697980 / 1048576 = 83.635 MB
Q3)
Figure 1 shows a black and white bitmap image.
The pixels in row 5 are represented by the binary pattern 1001 1001
(i) State what is meant by the term pixel.
A single dot in a picture
The smallest block of color in an image
Picture element
(1)
(ii) Construct an expression to show the number of pixels in the image.
8 x 9 x 1 = 72
(1)
(iii) The image is changed so that any pixel can be one of 16 different colours.
State the minimum number of bits that would be needed to represent
one pixel.
(1)
(Total for Question 1 = 11 marks)
Homework Exam style questions - 20th January 2025
Operating systems often include compression software for reducing file sizes.
(i) Give two reasons for reducing file sizes.
(2)
1.Compressed files take up less disk space allowing for more efficient use of
file space.
2. Smaller file size means that files can be uploaded and downloaded faster
over WiFi more quickly.
(ii) Give two drawbacks of using compression software.
(2)
1.Compression and decompression can consume significant CPU resources,
slowing down the system or application performance
2. There can be a loss of quality; the photo can seem more pixelated with
lower resolution and color depth.
After applying compression to a file, the original contents cannot be
reconstructed fully.
State the type of compression used on the file.
(1)
Lossy compression is ??
A pixel is the smallest element in a bitmap image.
(i) Two images are displayed on the same screen.
One image is 1280 × 720 pixels. The second image is 1920 × 1080 pixels.
The second image has a higher resolution.
State one reason why the second image will be displayed in more detail.
(1
More pixels mean finer detail and more image clarity in the image as well because
there are more pixels to represent the image
A 10-colour bitmap image uses 15-bit colour depth. The image is 1028 pixels
wide and 640 pixels high.
Complete the expression to show the minimum file size for the image in MiB.
You do not have to do the calculation.
(4)To calculate the minimum file size, the formula is:
Width = 1028 pixels
Height = 640 pixels
Colour depth = 15 bits
The complete expression is:
1028 x 640 x 15 \ 8 \ 1024 \ 1024
HW - 25th February 2015
Answer the following question:
Q1)
A text file is stored on a hard disc.
The file holds information from one side of a sheet of paper.
The sheet of paper is represented as a grid, 80 columns wide and 66 rows long.
Each cell in the grid contains a single 2-byte Unicode character.
The file also contains 40 characters of metadata.
The hard disc allocates space in blocks of 1024 bytes.
Construct an expression to show the number of blocks required to store the file
Show the calculations
Digital Sound Questions
Homework and exam practice (25th January 2025)A
Q1) Raoul wants to record a song and store it as a digital sound file.
Figure 2 shows an overview of the process of recording a song and storing it
as a digital sound file
Describe the steps taken to convert the analogue sound to a digital sound file.
(3)
Q2) Raoul uses a lossy algorithm to compress the file.
•Give one reason why the sound quality of the compressed file may not be as
good as the uncompressed version. (1)
Complete this graph using the sample information from Figure 1 to show the digital
sound wave.
(3)
(ii) Give a suitable label for the X axis.
(1)
(iii) Give a suitable label for the Y axis.
(1)
Q4) Alyssa uploads music files to her cloud storage.
(i) She compresses the files before she uploads them using a lossless algorithm.
Give one disadvantage of using a lossless rather than a lossy algorithm for this
purpose
5th February 2024
Practice questions (Homework)
Q1) Complete the sentences about symmetric encryption. Use the terms from the list.
Some of the terms in the list will not be used. You should only use a term once.
algorithm
cipher
copied
delete
key
plain
private
public
standard
stolen
understood
unreadable
The data before encryption is known as plaintext. To scramble the data, an encryption
algorithm which is a type of cipher, is used. The data after encryption is known as
ciphertext. Encryption prevents the data from being understood by a hacker.
[5]
Q2) True or False?
i) The master key is never transmitted in wireless network encryption. true
ii) In asymmetric encryption, only the public key is needed to encrypt and decrypt
information.false
Q3) What is symmetric encryption? Symmetric encryption is a type of encryption where
the same key is used to encrypt and decrypt the data.
Q4) Define asymmetric encryption. Asymmetric encryption is a type of encryption where
there are two different keys used to encrypt the data that is public and private key.
Q5) Give two reasons why an unauthorised person cannot understand encrypted data
[2]
1)Key Requirement: Encrypted data can only be decrypted with the correct key.
Without the decryption key, an unauthorized person cannot convert the encrypted data
back to its original readable form.
2)Complex algorithms: Encryption uses complex algorithms to transform the data
Making it unreadable without the proper decryption process. These algorithms are
designed to prevent unauthorized individuals from easily reversing the encryption
without knowledge of the specific method or key used.
Q6)
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Answer: LAW
Q7
Answer
Pink pink
+7 wpur +5 unsp
-2 unsp
Binary Arithmatic Q
The addition of these two 8-bit binary patterns generates an error condition.
0 1 1 0 1 1 0 1
1 1 0 0 0 0 0 0 +
0 0 1 0 1 1 0 1
Explain this error condition.
(2)
Long answer questions (Please research and write answers)
Artificial intelligence (AI), in many forms, has an increasing impact on our lives.
Discuss this statement considering characteristics, uses and ethical issues. ≠(6)