MOTHER TOUCH INTERNATIONAL SENIOR SCHOOL
Cambridge Lower Secondary
COMPUTER SCIENCE
Paper 1 Mid-Year Exams
Form 2 2025
You must answer on the answer sheet. 2hours
Instructions for section A
Answer all questions.
Each question carries 1 mark.
Choose the correct answer (A, B, C, or D) and write it in your answer booklet.
Instructions for section B
Answer all questions.
Write your answers clearly in the spaces provided
Section A: Multiple Choice Questions
1. What is the denary equivalent of the binary number 1101?
A) 10 B) 11 C) 12 D) 13
2. Which of the following is a benefit of using hexadecimal over binary?
A) Easier for humans to read B) Takes up more storage space C) Slower to process
D) Requires more bits
3. What is the result of the binary addition 1011 + 0110?
A) 10001 B) 1101 C) 1111 D) 1001
4. Which of the following is an example of an input device?
A) Printer B) Speaker C) Microphone D) Monitor
5. What is the purpose of the Arithmetic Logic Unit (ALU) in a CPU?
A) To store data permanently B) To perform calculations and logical operations C) To
display output D) To connect to the internet
6. Which type of memory is volatile?
A) ROM B) RAM C) SSD D) HDD
7. What is the function of an operating system?
A) To write programs B) To manage hardware and software resources C) To design
websites D) To encrypt data
8. Which of the following is an example of application software?
A) Windows OS B) Linux C) Microsoft Word D) BIOS
9. What is the purpose of a compiler?
A) To execute code line by line B) To translate high-level code into machine code
C) To debug programs D) To connect to a network
10. Which protocol is used to securely transfer web pages?
A) HTTP B) HTTPS C) FTP D) SMTP
11. What is the purpose of a MAC address?
A) To identify a device on a network B) To encrypt data C) To store files
D) To display web pages
12. Which of the following is a cyber security threat?
A) Firewall B) Phishing C) Encryption D) Authentication
13. What is the purpose of lossy compression?
A) To reduce file size without losing data B) To reduce file size by permanently
removing data C) To encrypt files D) To debug programs
14. Which sensor would be used to measure temperature?
A) Accelerometer B) Humidity sensor C) Thermistor D) Proximity sensor
15. What is the role of a router in a network?
A) To store data B) To connect devices and direct data packets C) To display web
pages D) To write programs
16. Which of the following is an example of an embedded system?
A) Laptop B) Smartphone C) Microwave oven D) Desktop computer
17. What is the purpose of a check digit?
A) To encrypt data B) To detect errors in data entry C) To connect to the internet
D) To store files
18. Which of the following is a characteristic of artificial intelligence?
A) It cannot learn from data B) It simulates human intelligence C) It is only used in
robotics D) It does not require data
19. What is the purpose of an interrupt in a computer system?
A) To shut down the computer B) To pause the current process and handle a higher-
priority task C) To display errors D) To connect to a network
20. Which of the following is an advantage of cloud storage?
A) Requires physical servers B) Accessible from anywhere C) Slower data retrieval
D) Less secure
21. What is the purpose of a firewall?
A) To encrypt data B) To block unauthorized access C) To store files
D) To debug programs
22. Which logic gate outputs true only if both inputs are true?
A) OR B) AND C) NOT D) XOR
23. What is the purpose of a domain name server (DNS)?
A) To translate domain names into IP addresses B) To encrypt data C) To store files
D) To debug programs
24. Which of the following is an example of a high-level programming language?
A) Assembly B) Python C) Machine code D) Binary
25. What is the purpose of an actuator in an automated system?
A) To sense the environment B) To perform physical actions C) To store data
D) To display output
26. Which of the following is a disadvantage of using robots in industry?
A) Increased efficiency B) High initial cost C) Reduced human error
D) Faster production
27. What is the purpose of two’s complement?
A) To represent negative numbers in binary B) To encrypt data C) To connect to the
internet D) To store files
28. Which of the following is an example of a utility software?
A) Microsoft Word B) Antivirus C) Windows OS D) Google Chrome
29. What is the purpose of a cookie in web browsing?
A) To store user preferences B) To encrypt data C) To debug programs D) To connect
to a network
30. Which of the following is a characteristic of blockchain technology?
A) Centralized control B) Immutable records C) Slow transactions D) Requires
human verification
Section B: Structured and Essay Questions
Question 1 (10 marks)
(a) Convert the hexadecimal number A3 to denary. (2 marks)
(b) Convert the denary number 45 to 8-bit binary. (2 marks)
(c) Perform a left shift on the binary number 00010110. (2 marks)
(d) Explain why hexadecimal is used in computing. (4 marks)
Question 2 (10 marks)
(a) Describe the fetch-decode-execute cycle. (4 marks)
(b) Explain the role of the following registers in the CPU:
Program Counter (PC)
Accumulator (ACC) (6 marks)
Question 3 (10 marks)
(a) Define the term "lossless compression" and give an example. (3 marks)
(b) Calculate the file size of a 10-second audio clip with a sample rate of 44.1 kHz and a
sample resolution of 16 bits. (4 marks)
(c) Explain one advantage of using lossy compression for images. (3 marks)
Question 4 (10 marks)
(a) Describe the structure of a data packet. (4 marks)
(b) Explain how packet switching works. (6 marks)
Question 5 (10 marks)
(a) Define the term "embedded system" and give two examples. (4 marks)
(b) Compare RAM and ROM in terms of volatility and purpose. (6 marks)
Question 6 (10 marks)
(a) Explain two methods of error detection in data transmission. (6 marks)
(b) Describe how symmetric encryption works. (4 marks)
Question 7 (10 marks)
Essay Question:
Discuss the advantages and disadvantages of artificial intelligence in modern society. Include
examples of where AI is used and its potential impact on jobs. (10 marks)