0% found this document useful (0 votes)
24 views27 pages

WJEC GCSE Computer Science Paper 1 June 2022 QP

Uploaded by

Leon Morris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views27 pages

WJEC GCSE Computer Science Paper 1 June 2022 QP

Uploaded by

Leon Morris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Centre Candidate

Surname
Number Number
First name(s) 0

GCSE
3500U10-1 Z22-3500U10-1

FRIDAY, 27 MAY 2022 – AFTERNOON

COMPUTER SCIENCE
Unit 1: Understanding Computer Science
1 hour 45 minutes
For Examiner’s use only
Maximum Mark
Question
Mark Awarded
1. 4
2. 4
3. 7

3 5 0 0 U101
4. 10

01
5. 6
6. 14
7. 7
8. 4
9. 7
10. 19
11. 6
12. 3
13. 9
INSTRUCTIONS TO CANDIDATES
Total 100
Use black ink or black ball-point pen.
Write your name, centre number and candidate number in the spaces at the top of this page.
Answer all questions.
Write your answers in the spaces provided in this booklet.
If you run out of space, use the continuation page(s) at the back of the booklet, taking care to
number the question(s) correctly.

INFORMATION FOR CANDIDATES


The number of marks is given in brackets at the end of each question or part-question.
You are reminded of the need for good English and orderly, clear presentation in your answers.
The total number of marks is 100.
Some questions will require you to draw on your knowledge from multiple areas of your course of
study.
© WJEC CBAC Ltd. SW*(S20-3500U10-1)
2
Examiner
only
Answer all questions.

1. Tick (√) one box only for each device to show if it is used for input, output or storage. [4]

Device Input Output Storage

© WJEC CBAC Ltd. (3500U10-1)


3
Examiner
only
2. Complete the tables to show the relationship between the data storage units.
The first row has been completed for you. [4]

No. Unit No. Unit

4 bits = 1 nybble

2 = 1 byte

1024 = 1 kilobyte

1024 kilobytes = 1

1024 megabytes = 1

3 5 0 0 U101
03

© WJEC CBAC Ltd. (3500U10-1) Turn over.


4
Examiner
only
3. (a) Tick (√) one box only to match the correct description with the form of cyberattack. [3]

Form of Cyberattack
Description
SQL
Worm Spyware Trojan
Injection
A program that appears to perform
a useful function but also provides
a ‘backdoor’ that enables data to be
stolen.
A program installed by opening
attachments that can be used to
collect stored data without the
user’s knowledge.
Self-replicating program that
identifies weaknesses in operating
systems and enables remote control
of the infected computer.

(b) Describe the following two methods of identifying vulnerabilities.

(i) Footprinting [2]

(ii) Penetration testing [2]

© WJEC CBAC Ltd. (3500U10-1)


5

3 5 0 0 U101
05
BLANK PAGE

© WJEC CBAC Ltd. (3500U10-1) Turn over.


6
Examiner
only
4. This is a diagram of a Von Neumann type architecture computer, with a single core Central
Processing Unit (CPU).

CPU

ALU

Register Control
Unit

Main Memory

(a) Using the components shown in the diagram, describe the fetch-decode-execute cycle.
[4]

(b) Describe how a RISC type processor differs from a CISC type processor. [2]

© WJEC CBAC Ltd. (3500U10-1)


7
Examiner
only
(c) Describe the role of each of the following.

(i) Graphics card (GPU). [2]

(ii) Motherboard. [2]

3 5 0 0 U101
07

© WJEC CBAC Ltd. (3500U10-1) Turn over.


8
Examiner
only
5. (a) State the logical operator used in the following truth table. [1]

Input Output

A B C

0 0 0

1 0 1

0 1 1

1 1 1

(b) Tick (√) one box only to show the Boolean expression that represents the function
described by each truth table.

KEY: + = OR · = AND ⊕ = XOR ˉ = NOT

(i) (ii)

Input Output Input Output

P Q R X Y Z

0 0 1 0 0 1

1 0 1 1 0 0

0 1 1 0 1 0

1 1 0 1 1 1

[1] [1]

R = P.Q Z = X.Y

R = P.Q Z = X ⊕Y

R = P.Q Z = X ⊕Y

R=P+Q Z = X.Y

© WJEC CBAC Ltd. (3500U10-1)


9
Examiner
only
(c) Complete the truth table for the following Boolean expression:

A + (B + C)

A B C B+C A + (B + C)

3 5 0 0 U101
09
[3]

© WJEC CBAC Ltd. (3500U10-1) Turn over.


10
Examiner
only
6. The TCP/IP 5-layer model defines how applications can communicate over a network.

(a) Complete the following sentences about the TCP/IP 5-layer model using only the words
given:

TRANSPORT BOOLEAN APPLICATION SUSPENSION

GATEWAY NETWORK PHYSICAL DATA LINK

(i) The . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . layer provides interfaces to the software to allow it


to use the network. [1]

(ii) The . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . layer ensures that data is transferred from one


point to another reliably and without errors. [1]

(iii) Addressing and routing is provided by the . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . layer. [1]

(iv) The . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . layer prepares data to be passed to the physical


layer. [1]

(v) The . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . layer transmits the raw data. [1]

(b) (i) Draw a diagram of a star network topology. [1]

© WJEC CBAC Ltd. (3500U10-1)


11
Examiner
only
(ii) Give two advantages of a star network topology. [2]

(iii) Give one disadvantage of a star network topology. [1]

3 5 0 0 U101
11

© WJEC CBAC Ltd. (3500U10-1) Turn over.


12
Examiner
only
(c) Describe the typical contents of an acceptable use policy. [5]

© WJEC CBAC Ltd. (3500U10-1)


13

3 5 0 0 U101
13
BLANK PAGE

© WJEC CBAC Ltd. (3500U10-1) Turn over.


14
Examiner
only
7. (a) (i) Convert 011010102 into hexadecimal. [1]

(ii) Convert B916 into binary. [1]

(iii) Give one reason why hexadecimal notation is used as shorthand for binary
numbers. [1]

(b) Using binary addition, add 101010112 to 001101102.

Show your workings. [2]

(c) State the effect of arithmetic shift functions by one place. [2]

LEFT SHIFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

RIGHT SHIFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

© WJEC CBAC Ltd. (3500U10-1)


15
Examiner
only
8. When graphics are stored using a certain computer system, every colour pixel is created using
a combination of the three primary colours: red, green and blue.

The following 600 × 500 pixels 8-bit colour image has been created.

(a) State the range and number of different colours in denary that can be represented using
this colour model. [2]

(b) Calculate the storage requirements of this image in kilobytes. [2]

© WJEC CBAC Ltd. (3500U10-1) Turn over.


16
Examiner
only
9. Clearly showing each step, simplify the following Boolean expressions using Boolean algebra
and identities:

(a) A.(B + B) [2]

(b) A.(A + B) + B.(A + B) [5]

© WJEC CBAC Ltd. (3500U10-1)


17

BLANK PAGE

© WJEC CBAC Ltd. (3500U10-1) Turn over.


18
Examiner
10. Betty’s B&B wants to store booking data on a computer system. only

This table shows the booking data to be stored by Betty’s B&B.

Booking Customer Check in Number Room


Customer Name Cost Paid
ID Title Date of nights Type
RM10001 Mrs Anaya Patel 05/11/2020 7 Double £349.93 Y
RM10002 Miss Shania Williams 09/11/2020 1 Single £49.99 Y
RM10003 Mr Michael Jones 10/12/2020 3 Twin £149.97 N
RM10004 Mrs Susan Isaac 05/02/2021 4 Single £199.96 Y
RM10005 Ms Deborah Evans 31/10/2020 7 Twin £349.93 N
RM10006 Miss Megan Williams 20/11/2020 14 Double £699.86 N
… … … … … … … …

(a) (i) State why an array would not be suitable for storing this data. [1]

(ii) Give a suitable example of data that may be stored by Bettys B&B using an array.
[2]

(b) Design different types of validation check for three of the fields from the booking data
table. Do not use presence check in your answer. [6]

Validation check 1

Field: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Type of check: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Rule:

© WJEC CBAC Ltd. (3500U10-1)


19
Examiner
only
Validation check 2

Field: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Type of check: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Rule:

Validation check 3

Field: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Type of check: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Rule:

(c) As Betty’s B&B is storing personal data on a computer system, they should be aware of
the dangers of storing data and the need to keep data secure.

(i) Describe the dangers that organisations face from using computers to store
personal data. Do not include malware in your answer. [4]

© WJEC CBAC Ltd. (3500U10-1) Turn over.


20
Examiner
only
(ii) Explain the need for organisations to make backups and to maintain generations
of files. [4]

(iii) Describe the need to archive files. [2]

© WJEC CBAC Ltd. (3500U10-1)


21
Examiner
only
11. The following program is intended to add together two numbers and output the answer, but it
contains errors.

1 set firstNumber as integer


2 set secondNumber as integer
3
4 input firstNumber
5 imput secondNumber
6
7 output “The sum is, FirstNumber - secondNumber

Identify three errors in the program and name each error type. [6]

Error 1

Error: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Line: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Error Type: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Error 2

Error: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Line: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Error Type: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Error 3

Error: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Line: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Error Type: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

© WJEC CBAC Ltd. (3500U10-1) Turn over.


22
Examiner
only
12. Describe the environmental impact of digital technology on wider society. [3]

© WJEC CBAC Ltd. (3500U10-1)


23
Examiner
only
13. Describe the principal stages of the compilation process. [9]

© WJEC CBAC Ltd. (3500U10-1) Turn over.


24
Examiner
only

END OF PAPER
© WJEC CBAC Ltd. (3500U10-1)
25
Examiner
only
For continuation only.

© WJEC CBAC Ltd. (3500U10-1) Turn over.


26
Examiner
only
For continuation only.

© WJEC CBAC Ltd. (3500U10-1)


27

BLANK PAGE

© WJEC CBAC Ltd. (3500U10-1)

You might also like