Practice A1 Computer fundamentals with authentic IB Computer Science (First Exam 2027) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like programming concepts, algorithms, and data structures. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Complete the truth table for the following circuit: [4]
A B NOT B Output 0 0
0 1
1 0
1 1
Make it markdown format
Draw the logic gate symbol for an XOR gate. [1]
Construct a Boolean expression for the circuit: A AND (B OR C). [1]
Explain how a half-adder circuit can add two single-bit binary numbers. [2]
A smart home system integrates various computer components and systems.
Identify two types of sensors that might be used in a smart home system and state their functions.
The system uses 16-bit integers to store temperature readings. Calculate the range of temperatures that can be stored using signed representation.
Explain why the smart home system requires real-time processing capabilities.
Discuss whether compiled or interpreted code would be more suitable for the smart home's control software.
Programming languages require translation to execute on computer hardware.
Compare compilation and interpretation as methods of program translation.
State two advantages of using a compiler over an interpreter.
Explain why some programming languages use both compilation and interpretation.
A digital audio system processes sound data at different bit depths and sampling rates.
Calculate the file sizes and complete the table for one minute of audio:
| Bit Depth | Sampling Rate | Channels | File Size (MB) | Quality Level |
|---|---|---|---|---|
| -bit | CD Quality | |||
| -bit | ||||
| -bit | Studio Master |
Analyze how quantization affects audio quality and explain why higher bit depths reduce quantization noise.
Modern programming languages use sophisticated translation techniques.
Explain the concept of garbage collection and why it is important in memory management.
Compare mark-and-sweep with reference counting as garbage collection strategies.
State two programming languages that use automatic garbage collection.
A digital security system uses various logic circuits for access control.
Design and complete the truth table for a security system that grants access when: Card Reader AND (Fingerprint OR PIN) is satisfied:
| Card Reader | Fingerprint | PIN | Fingerprint OR PIN | Access Granted |
|---|---|---|---|---|
| 0 | 0 | 0 | ||
| 0 | 0 | 1 | ||
| 0 | 1 | 0 | ||
| 0 | 1 | 1 | ||
| 1 | 0 | 0 | ||
| 1 | 0 | 1 | ||
| 1 | 1 | 0 | ||
| 1 | 1 | 1 |
Construct Boolean expression and explain gate implementation.
A manufacturing company is upgrading their computer systems for controlling robotic assembly lines.
Compare the suitability of RISC and CISC processors for this application.
State the primary function of an interrupt in a computer system.
Describe how the fetch-decode-execute cycle processes an instruction.
A security system uses various data encoding methods.
Explain the difference between lossy and lossless data compression.
State one example each of lossy and lossless compression formats.
Outline why ASCII encoding is limited for international applications.
A gaming company is developing a new mobile game.
Compare the suitability of ARM and x86 processors for mobile gaming devices.
The game uses RGB color representation with 8 bits per channel. Calculate how many different colors can be displayed.
Explain how the mobile operating system manages memory allocation for the game.
A school is setting up a computer lab with different types of storage devices.
Compare SSD and HDD storage in terms of access speed and durability.
State one advantage and one disadvantage of cloud storage for the school.
Outline the role of the motherboard in a computer system.
Practice A1 Computer fundamentals with authentic IB Computer Science (First Exam 2027) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like programming concepts, algorithms, and data structures. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
Complete the truth table for the following circuit: [4]
A B NOT B Output 0 0
0 1
1 0
1 1
Make it markdown format
Draw the logic gate symbol for an XOR gate. [1]
Construct a Boolean expression for the circuit: A AND (B OR C). [1]
Explain how a half-adder circuit can add two single-bit binary numbers. [2]
A smart home system integrates various computer components and systems.
Identify two types of sensors that might be used in a smart home system and state their functions.
The system uses 16-bit integers to store temperature readings. Calculate the range of temperatures that can be stored using signed representation.
Explain why the smart home system requires real-time processing capabilities.
Discuss whether compiled or interpreted code would be more suitable for the smart home's control software.
Programming languages require translation to execute on computer hardware.
Compare compilation and interpretation as methods of program translation.
State two advantages of using a compiler over an interpreter.
Explain why some programming languages use both compilation and interpretation.
A digital audio system processes sound data at different bit depths and sampling rates.
Calculate the file sizes and complete the table for one minute of audio:
| Bit Depth | Sampling Rate | Channels | File Size (MB) | Quality Level |
|---|---|---|---|---|
| -bit | CD Quality | |||
| -bit | ||||
| -bit | Studio Master |
Analyze how quantization affects audio quality and explain why higher bit depths reduce quantization noise.
Modern programming languages use sophisticated translation techniques.
Explain the concept of garbage collection and why it is important in memory management.
Compare mark-and-sweep with reference counting as garbage collection strategies.
State two programming languages that use automatic garbage collection.
A digital security system uses various logic circuits for access control.
Design and complete the truth table for a security system that grants access when: Card Reader AND (Fingerprint OR PIN) is satisfied:
| Card Reader | Fingerprint | PIN | Fingerprint OR PIN | Access Granted |
|---|---|---|---|---|
| 0 | 0 | 0 | ||
| 0 | 0 | 1 | ||
| 0 | 1 | 0 | ||
| 0 | 1 | 1 | ||
| 1 | 0 | 0 | ||
| 1 | 0 | 1 | ||
| 1 | 1 | 0 | ||
| 1 | 1 | 1 |
Construct Boolean expression and explain gate implementation.
A manufacturing company is upgrading their computer systems for controlling robotic assembly lines.
Compare the suitability of RISC and CISC processors for this application.
State the primary function of an interrupt in a computer system.
Describe how the fetch-decode-execute cycle processes an instruction.
A security system uses various data encoding methods.
Explain the difference between lossy and lossless data compression.
State one example each of lossy and lossless compression formats.
Outline why ASCII encoding is limited for international applications.
A gaming company is developing a new mobile game.
Compare the suitability of ARM and x86 processors for mobile gaming devices.
The game uses RGB color representation with 8 bits per channel. Calculate how many different colors can be displayed.
Explain how the mobile operating system manages memory allocation for the game.
A school is setting up a computer lab with different types of storage devices.
Compare SSD and HDD storage in terms of access speed and durability.
State one advantage and one disadvantage of cloud storage for the school.
Outline the role of the motherboard in a computer system.