Answers to today’s Starter Questions

These were taken from the 2008 Section 1.

1a(i)Describe how bit-mapped images are stored. 1 KU
  • An array/grid of pixels
  • Each dot/pixel has a binary value
  • Each pixel stored as a bit/byte/binary value/black=1 & white=0
  • Accept black=1 and white=0 type answer but not the colour of each pixel
  • Any one from above 1 mark (Not “the colour of pixels are stored” or “individual pixels” or “pixel by pixel”)

1a(ii) Describe how vector images are stored. 1 KU

  • As a number/list of objects (each of which has attributes defining the objects)
  • Objects are defined by attributes/mathematical description
  • Accept an example object used to describe eg rectangle and attributes
  • Any other valid
  • 1 mark for any of the above

1b Is the above image bit-mapped or vector? Justify your answer.2 PS

  • Bit-mapped (1 mark)
  • Composed of grid of (individual) pixels
  • Does not contain/is not comprised of (collection of discrete) objects
  • It is pixelated
  • It is a photograph/taken with a digital camera
  • 1 mark for any valid bullet point (Not painting or resized)

2a Explain how the heuristic detection technique is used to detect a virus.1 KU

  • It looks for a suspicious pattern of behaviour (which was previously associated with a virus)
  • Accept use of a valid example to illustrate concept
  • Any other valid
  • 1 mark

2b Explain why a trojan horse is not classified as a computer virus. 1 PS

  • A trojan horse is not self replicating
  • Does not infect other files
  • 1 mark for any one of the above (do not accept a description of what a trojan horse does)

Introduction to Multimedia

So we got started on booklet 1. In this unit we will focus more on the technical aspects of multimedia.

Today we looked at the development process of multimedia and the key thing you should have taken away was this idea of target audiences. Any multimedia application must be focused on it’s target audience. A multimedia application for a primary school child will look far different than one created for a University student.

We then went on to HTML and how a WYSIWYG editor differs from a text editor.

Tomorrow you will be working with these notes.

Higher Computing – Networking: Protocols, IP addresses and the OSI model

This is more aimed at the Networking optional unit. However, it might be of use though as it will cover the Networking section of the Computer Systems unit.
Presented by: Ian King, SCHOLAR Online Tutor for Computing.
When:              Wednesday 5 March 7.30 – 8.15pm
Theme:            Higher Computing – Networking:  Protocols, IP addresses and the OSI model
Adobe Link (sign in as a guest on the day):   http://heriot-watt.adobeconnect.com/scholarhomework
There will be an opportunity for students to participate in a Q&A session at the end of the presentation.

Coltness High School

Report a Glow concern
Cookie policy  Privacy policy