0% found this document useful (1 vote)
2K views

Predicted IGCSE Computer Science Paper 2025

The document contains a series of predicted multiple-choice questions for the IGCSE Computer Science exam scheduled for May/June 2025. It covers various topics including data storage, binary arithmetic, operating systems, data transmission, and emerging technologies. Each question is designed to assess knowledge in computer science concepts relevant to the curriculum.

Uploaded by

omerabid999999
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
2K views

Predicted IGCSE Computer Science Paper 2025

The document contains a series of predicted multiple-choice questions for the IGCSE Computer Science exam scheduled for May/June 2025. It covers various topics including data storage, binary arithmetic, operating systems, data transmission, and emerging technologies. Each question is designed to assess knowledge in computer science concepts relevant to the curriculum.

Uploaded by

omerabid999999
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

IGCSE Computer Science (Predicted Questions) - May/June 2025

Section A: Multiple Choice

1. Which of the following is an example of secondary storage?


A) RAM
B) CPU
C) Hard Disk
D) Cache Memory
(1 mark)

2. What is the result of performing the binary addition 1011 + 1101?


A) 10100
B) 11000
C) 10000
D) 10110
(1 mark)

3. What does the acronym "URL" stand for?


A) Universal Resource Locator
B) Uniform Resource Locator
C) Uniform Regional Locator
D) Universal Regional Locator
(1 mark)

4. Which of the following describes the use of a firewall in computer networks?


A) It stores data on a remote server.
B) It monitors and filters incoming and outgoing network traffic.
C) It manages user access to a database.
D) It encrypts data over the internet.
(1 mark)

5. Which logic gate produces an output of 1 when both inputs are different?
A) AND
B) OR
C) XOR
D) NOT
(1 mark)

6. Which of the following best defines "cloud computing"?


A) Storing data on a local server.
B) Using remote servers to store, manage, and process data.
C) Using software without an internet connection.
D) Directly accessing data from the internet without security.
(1 mark)

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


7. Which of these data structures is best for storing a collection of unique elements?
A) List
B) Array
C) Dictionary
D) Set
(1 mark)

8. What is the primary function of the ALU in a CPU?


A) Perform calculations and logical operations
B) Store data temporarily
C) Control input and output operations
D) Fetch instructions from memory
(1 mark)

9. Which of the following best describes the role of the ALU in a computer system?
A) It manages input and output operations.
B) It executes arithmetic and logical operations.
C) It stores data temporarily.
D) It coordinates the fetching and decoding of instructions.

10. What is the hexadecimal equivalent of the binary number 11110000?


A) F0
B) 0F
C) 00
D) FF

11. Which of the following is an example of a lossless image compression format?


A) JPEG
B) PNG
C) MP3
D) AVI

12. Which of the following is a function of an operating system?


A) Translates high-level programming languages to machine code.
B) Manages hardware resources and provides a user interface.
C) Compresses files to save space on storage devices.
D) Stores data in secondary memory.

13. Which of the following is a key feature of cloud computing?


A) Data is stored and processed on local machines.
B) Software is installed on each user’s computer.
C) Users access services and data over the internet.
D) The internet is not required for cloud computing to function.

14. What is the purpose of a primary key in a database?


A) It stores data that is unique to each record.
B) It links different tables in the database.
C) It stores multiple entries for the same data.
D) It indexes the data in a table for faster searches.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


15. Which of the following best defines a syntax error in programming?
A) An error in the program’s logic that causes incorrect results.
B) An error caused by using incorrect formatting in the code.
C) An error when a program exceeds its memory limits.
D) An error that prevents the program from running due to invalid input.

16. Which of the following describes the fetch-decode-execute cycle?


A) The process of transferring data between primary and secondary storage.
B) The process used by the CPU to process instructions.
C) The sequence of events in a network data transmission.
D) The process used by a compiler to convert source code to machine code.

17. Which of the following is a characteristic of primary memory?


A) It is non-volatile.
B) It stores data permanently.
C) It is faster than secondary storage.
D) It is cheaper than secondary storage.

18. What is the binary equivalent of the hexadecimal number 9C?


A) 10011000
B) 10011100
C) 11001100
D) 11001000

19. Which of the following is NOT a function of the Control Unit (CU)?
A) Fetches instructions from memory.
B) Decodes instructions.
C) Executes arithmetic and logical operations.
D) Coordinates the activities of the CPU.

20. Which of the following storage devices is the fastest?


A) Hard Disk Drive (HDD)
B) Solid-State Drive (SSD)
C) Optical Disc
D) Magnetic Tape

21. Which of the following is an example of a lossy compression technique?


A) PNG
B) ZIP
C) JPEG
D) GIF

22. Which of the following is the primary function of an Operating System (OS)?
A) To perform arithmetic operations.
B) To execute user programs only.
C) To manage hardware resources and provide an interface for user interaction.
D) To secure the system from malware.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


23. Which of the following is a logic gate?
A) NAND
B) Array
C) Loop
D) Module

24. Which of the following is a valid use of the AND logic gate?
A) The output is true if both inputs are true.
B) The output is true if one input is true.
C) The output is false if both inputs are false.
D) The output is false if one input is true.

25. Which of the following is an example of a secondary storage device?


A) RAM
B) CPU Cache
C) Hard Disk
D) Register

26. Which of the following describes the role of DNS in computer networking?
A) It translates domain names into IP addresses.
B) It controls access to files over a network.
C) It encrypts data during transmission.
D) It compresses data for faster transfer.

27. What is the purpose of secondary storage in a computer system?


A) It holds data that is actively being used by the CPU.
B) It stores data for long-term use.
C) It performs calculations required by the program.
D) It stores the operating system and system files.

28. Which of the following is an example of an input device?


A) Monitor
B) Printer
C) Keyboard
D) Speaker

29. What is the difference between serial and parallel data transmission?
A) Serial sends multiple bits at once, while parallel sends one bit at a time.
B) Parallel is faster than serial.
C) Serial uses more wires than parallel.
D) Parallel sends data in a sequential order.

30. Which of the following is a type of malware that spreads by copying itself to other
programs or files?
A) Trojan
B) Worm
C) Spyware
D) Adware

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


31. Which of the following is an advantage of using cloud computing?
A) Data is stored locally on physical devices.
B) It allows users to store large amounts of data at low cost.
C) Cloud computing does not require an internet connection.
D) It offers unlimited free storage.

32. Which of the following is an example of an ethical issue in computing?


A) Unauthorized access to personal data.
B) Installing new software on a system.
C) Updating operating systems.
D) Using open-source software.

33. Which of the following is the purpose of an IP address?


A) It identifies devices on a network.
B) It stores data on a computer.
C) It encrypts communication between devices.
D) It regulates the flow of data on a network.

Multiple-Choice Questions: Data Transmission

1. Which of the following is an example of serial data transmission?

A) Data is transmitted over multiple channels simultaneously.

B) Data is transmitted one bit at a time over a single channel.

C) Data is transmitted using optical fiber cables.

D) Data is transmitted using electrical signals over a bus.

2. Which of the following is a disadvantage of parallel data transmission?

A) It is faster than serial transmission over long distances.

B) It is more susceptible to signal degradation and interference.

C) It uses less power than serial transmission.

D) It requires fewer wires than serial transmission.

3. What is the role of the parity bit in data transmission?

A) To check the integrity of data by detecting errors.

B) To increase the speed of data transfer.

C) To encrypt the transmitted data.

D) To reduce the size of the data being transmitted.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


4. Which of the following is a method of error detection used in data transmission?

A) Buffering

B) Parity check

C) Compression

D) Handshaking

5. In asynchronous data transmission, how is data sent?

A) Data is transmitted without any start or stop bits.

B) Data is transmitted with a fixed clock signal.

C) Data is transmitted one character at a time with start and stop bits.

D) Data is sent in a continuous stream without breaks.

6. Which of the following transmission methods is typically used for long-distance communication?

A) Parallel transmission

B) Serial transmission

C) Full-duplex transmission

D) Half-duplex transmission

7. What is the primary disadvantage of serial data transmission?

A) It is slower than parallel transmission over short distances.

B) It requires more wires to connect the devices.

C) It is prone to data corruption due to noise.

D) It is only used in local area networks (LANs).

8. Which of the following is true about full-duplex data transmission?

A) Data can be transmitted in both directions, but not simultaneously.

B) Data can be transmitted in both directions simultaneously.

C) Data can only be transmitted in one direction at a time.

D) It uses two channels for transmitting and receiving data.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


9. Which of the following is NOT a characteristic of error correction in data transmission?

A) It can correct errors in data even after transmission.

B) It uses techniques such as Hamming code or Reed-Solomon.

C) It ensures that the data received is identical to the data sent.

D) It detects but does not correct errors during transmission.

10. What is the difference between synchronous and asynchronous data transmission?

A) Synchronous transmission uses start and stop bits, while asynchronous does not.

B) Synchronous transmission has a constant clock signal, while asynchronous transmission does not.

C) Asynchronous transmission requires less bandwidth than synchronous.

D) Asynchronous transmission is faster than synchronous.

11. Which of the following describes the checksum technique used in error detection?

A) A method that checks for errors after transmission by adding extra bits.

B) A method that checks for errors before transmission using parity bits.

C) A technique that counts the total number of transmitted bytes.

D) A method that transmits data in small packets with sequential numbering.

12. What is the function of the TCP protocol in data transmission?

A) It establishes and maintains the connection for secure transmission.

B) It checks for errors in the data being transmitted.

C) It breaks the data into packets and ensures they are correctly received.

D) It provides the final delivery of data to the application layer.

13. What is the key difference between half-duplex and full-duplex data transmission?

A) Half-duplex allows data to flow in both directions, but only one direction at a time.

B) Full-duplex allows data to flow in only one direction at a time.

C) Half-duplex is more efficient than full-duplex.

D) Full-duplex uses a single channel for both sending and receiving data.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


14. Which of the following protocols is responsible for sending web pages from a web server to a
web browser?

A) FTP

B) SMTP

C) HTTP

D) POP3

15. What is the main purpose of a web browser?

A) To create websites and web applications.

B) To manage and send emails over the internet.

C) To allow users to access, view, and interact with websites on the World Wide Web.

D) To monitor the security of internet data traffic.

16. What does the term IP address stand for?

A) International Processor Address

B) Internet Protocol Address

C) Internet Page Address

D) Internet Path Address

17. Which of the following is a disadvantage of using the internet for communication?

A) It allows for instant communication worldwide.

B) It provides a wide range of communication tools, such as email, video calls, and social media.

C) It makes it easy to share large amounts of data with many people.

D) It can expose personal information to hackers and other malicious users.

18. What is the role of a DNS (Domain Name System)?

A) It encrypts the data sent between users and websites.

B) It resolves domain names into IP addresses so users can access websites by typing domain names
instead of IP addresses.

C) It stores data on a server and makes it available to the internet.

D) It checks the security of websites.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


19. Which of the following is an example of a use of the Internet in the field of education?

A) Using a search engine to find online tutorials or learning resources.

B) Streaming movies on video platforms.

C) Making voice calls through mobile networks.

D) Downloading music from online platforms.

20. What is the role of a firewall in network security?

A) To allow unrestricted access to the internet for all devices.

B) To prevent unauthorized access to or from a private network while allowing legitimate traffic.

C) To convert domain names into IP addresses.

D) To encrypt communication between users and websites.

Chapter 6: Automated and Emerging Technologies

21. What is an example of artificial intelligence (AI) being used in the real world?

A) Automatic sorting of packages in a warehouse.

B) Human workers assembling products on a production line.

C) Manual calculations of business data.

D) Human-driven cars in traffic.

22. Which of the following best describes the concept of machine learning in AI?

A) AI systems that can perform human-like tasks by following pre-programmed instructions.

B) AI systems that learn from data to improve their performance over time without explicit
programming.

C) Machines that are programmed to replace human workers.

D) Machines that can only perform specific tasks assigned by humans.

23. Which of the following is an example of augmented reality (AR)?

A) A computer simulation of a car race.

B) A smartphone app that allows users to see virtual furniture in their room using the camera.

C) A virtual world where users can interact through avatars.

D) A video game that does not require an internet connection.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


24. What is the role of 3D printing in modern technology?

A) It allows users to print documents and images from their computer.

B) It creates three-dimensional objects from digital models by adding material layer by layer.

C) It speeds up the process of drawing 2D graphics on a computer screen.

D) It allows users to print physical books from e-books.

25. Which of the following technologies is used in self-driving cars?

A) Augmented reality (AR)

B) Artificial intelligence (AI)

C) Blockchain

D) Virtual reality (VR)

26. Which of the following is a potential risk of using automated technologies in industries?

A) Increased efficiency in production.

B) Loss of jobs as machines replace human workers.

C) Decreased accuracy in data processing.

D) Improved safety in work environments.

27. Which of the following is an example of emerging technology used to detect and prevent fraud
in banking?

A) Voice recognition systems

B) Magnetic stripe cards

C) Optical character recognition (OCR)

D) Blockchain technology

28. In the context of robotics, what is automation?

A) The use of robots to perform tasks without human intervention.

B) The process of designing robots for educational purposes.

C) The replacement of robots with manual labor.

D) The development of robots with human-like emotions.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


29. What is the impact of blockchain technology in industries like finance?

A) It makes transactions faster and reduces the need for banks.

B) It ensures that transactions are secure, transparent, and immutable.

C) It reduces the cost of hardware used in transactions.

D) It replaces the need for regulatory bodies in finance.

30. Which of the following is a feature of secure websites using HTTPS?


A) The website uses a static IP address.
B) Data exchanged between the user and the website is encrypted.
C) The website's content is stored in a local cache.
D) It can only be accessed by certain IP addresses.

Section B: Short-Answer Questions

(Each question is worth 3-4 marks)

11. Convert the decimal number 156 into binary.

12. What is the difference between RAM and ROM? Provide one example of each type of
memory.

13. Describe the function of a compiler and how it differs from an interpreter in programming.

14. What is meant by the term cloud storage? Name one advantage and one disadvantage of
using cloud storage.

15. Write an Algorithm function that takes a list of numbers and returns the largest even
number. If no even number is found, return None.

16. What is the difference between serial and parallel transmission in terms of data
communication?

17. Describe the concept of encryption. What are the two types of encryptions?

18. What is the role of a bus in a computer system?

Section C: Extended Response Questions

(Each question is worth 6-8 marks)

21. (a) Explain the role of the Control Unit (CU) and the Arithmetic Logic Unit (ALU) in the central
processing unit (CPU).
(b) Describe how the clock speed affects the performance of the CPU.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


22. (a) What is meant by data representation in computer systems?
(b) Describe how text, images, and sound are represented in a computer system. Provide
examples of how each data type is stored.

23. (a) Write an algorithm in pseudocode to perform a linear search on an unsorted list of
integers.
(b) What are the advantages and disadvantages of using a linear search compared to a binary
search?

24. (a) You are asked to design a database for a small online bookstore. Identify at least three
entities that would be part of this database and explain the relationships between them.
(b) Write an SQL query to retrieve the titles of all books published by a specific author.

25. (a) What are logic gates, and how are they used in computer systems?
(b) Draw the truth table for the following circuit:

o A AND (B OR NOT C)

26. (a) What are the differences between file compression and file encryption?
(b) Provide an example of when you might use file compression and when you might use file
encryption.

Section B: Short-Answer Questions

(Each question is worth 3-4 marks)

26. Convert the binary number 101101 to its decimal equivalent.

27. What is the difference between serial and parallel transmission? Which one is typically
used for long-distance communication and why?

28. What is the difference between compiler and interpreter? Provide one advantage and one
disadvantage of each.

29. Explain the term lossy compression and provide an example of a file type that uses it.

Section C: Extended Response Questions

(Each question is worth 6-7 marks)

36. (a) Explain the fetch-decode-execute cycle of the CPU.


(b) Describe how the Control Unit (CU) and Arithmetic Logic Unit (ALU) work together during
this cycle.

37. (a) Describe the role of logic gates in computing.


(b) Draw the truth table for the following logic circuit:

o (A XOR B) AND (B OR NOT C)

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


Section B: Short Answer Questions (20 marks)

11. Explain the difference between primary and secondary storage.


(2 marks)

12. What is the purpose of an operating system in a computer system?


(2 marks)

13. Write an Algorithm snippet that takes a number as input and prints whether it is even or
odd.
(3 marks)

14. Convert the decimal number 45 into binary and hexadecimal.


(2 marks)

IGCSE & O-Level Algorithm, Flowchart, and Pseudocode Questions

Section B: Short-Answer Questions

(Each question is worth 3-4 marks)

1. Flowchart Design
Create a flowchart to perform the following task:
Task: Given an integer n, check if n is a positive number, zero, or negative number. The program
should output:

• "Positive" if n is greater than 0.

• "Zero" if n is equal to 0.

• "Negative" if n is less than 0.

2. Pseudocode
Write pseudocode to find the smallest of three numbers entered by the user. The pseudocode
should use the following steps:

• Read the three numbers: a, b, and c.

• Compare the numbers and display the smallest one.

3. Flowchart for Even or Odd


Design a flowchart to determine if a given number x is even or odd. The program should output:

• "Even" if the number is divisible by 2.

• "Odd" if the number is not divisible by 2.

4. Pseudocode for Factorial Calculation


Write pseudocode to calculate the factorial of a number n. The program should:

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


• Take an integer n as input.

• Calculate n! (n factorial) using a loop.

• Output the factorial.

Example:
For n = 5, the output should be 120 (i.e., 5! = 5 × 4 × 3 × 2 × 1).

5. Flowchart for Sum of Natural Numbers


Design a flowchart to calculate the sum of the first n natural numbers (i.e., the sum of numbers
from 1 to n). The program should output the total sum.
Formula:
Sum = n * (n + 1) / 2

6. Pseudocode for Prime Check


Write pseudocode that takes a number x and determines if it is a prime number. The pseudocode
should:

• Check if x is divisible by any number other than 1 and itself.

• Output "Prime" if the number is prime, otherwise output "Not Prime".

7. Flowchart for Number Range Check


Design a flowchart that checks if a number n is within a specified range.

• The program should prompt the user for n.

• If n is between 10 and 50 (inclusive), output: "In range".

• If n is outside the range, output: "Out of range".

Section C: Extended Response Questions

(Each question is worth 6-7 marks)

9. Pseudocode for Sorting a List


Write pseudocode to implement a Bubble Sort algorithm to sort a list of n numbers in ascending
order.
The pseudocode should:

• Take an input list of numbers.

• Sort the numbers using the bubble sort method (repeatedly swapping adjacent elements if
they are in the wrong order).

• Output the sorted list.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668


10. Flowchart for Temperature Conversion
Design a flowchart to convert temperature in Celsius to Fahrenheit and Fahrenheit to Celsius.
The flowchart should:

• Prompt the user to choose the conversion type (Celsius to Fahrenheit or Fahrenheit to
Celsius).

• If Celsius to Fahrenheit, use the formula:


Fahrenheit = (Celsius * 9/5) + 32

• If Fahrenheit to Celsius, use the formula:


Celsius = (Fahrenheit - 32) * 5/9

• Output the converted temperature.

12. Pseudocode for a Simple Calculator


Write pseudocode for a simple calculator program that:

• Takes two numbers as input.

• Takes an operator (+, -, *, /) as input.

• Performs the specified operation.

• Outputs the result.

13. Flowchart for Reverse an Array


Design a flowchart to reverse an array of n integers.

• The program should prompt the user for the number of elements and the elements
themselves.

• Output the array in reverse order.

15. Pseudocode for Largest Number in Array


Write pseudocode to find the largest number in a list of n numbers.

• The program should iterate through the array and keep track of the largest value found so
far.

• Output the largest number.

CS Practice Questions 2025 M Shoaib Ishtiaq 03004377668

You might also like