WJEC GCSE Computer Science Paper 1 June 2022 QP
WJEC GCSE Computer Science Paper 1 June 2022 QP
Surname
Number Number
First name(s) 0
GCSE
3500U10-1 Z22-3500U10-1
COMPUTER SCIENCE
Unit 1: Understanding Computer Science
1 hour 45 minutes
For Examiner’s use only
Maximum Mark
Question
Mark Awarded
1. 4
2. 4
3. 7
3 5 0 0 U101
4. 10
01
5. 6
6. 14
7. 7
8. 4
9. 7
10. 19
11. 6
12. 3
13. 9
INSTRUCTIONS TO CANDIDATES
Total 100
Use black ink or black ball-point pen.
Write your name, centre number and candidate number in the spaces at the top of this page.
Answer all questions.
Write your answers in the spaces provided in this booklet.
If you run out of space, use the continuation page(s) at the back of the booklet, taking care to
number the question(s) correctly.
1. Tick (√) one box only for each device to show if it is used for input, output or storage. [4]
4 bits = 1 nybble
2 = 1 byte
1024 = 1 kilobyte
1024 kilobytes = 1
1024 megabytes = 1
3 5 0 0 U101
03
Form of Cyberattack
Description
SQL
Worm Spyware Trojan
Injection
A program that appears to perform
a useful function but also provides
a ‘backdoor’ that enables data to be
stolen.
A program installed by opening
attachments that can be used to
collect stored data without the
user’s knowledge.
Self-replicating program that
identifies weaknesses in operating
systems and enables remote control
of the infected computer.
3 5 0 0 U101
05
BLANK PAGE
CPU
ALU
Register Control
Unit
Main Memory
(a) Using the components shown in the diagram, describe the fetch-decode-execute cycle.
[4]
(b) Describe how a RISC type processor differs from a CISC type processor. [2]
3 5 0 0 U101
07
Input Output
A B C
0 0 0
1 0 1
0 1 1
1 1 1
(b) Tick (√) one box only to show the Boolean expression that represents the function
described by each truth table.
(i) (ii)
P Q R X Y Z
0 0 1 0 0 1
1 0 1 1 0 0
0 1 1 0 1 0
1 1 0 1 1 1
[1] [1]
R = P.Q Z = X.Y
R = P.Q Z = X ⊕Y
R = P.Q Z = X ⊕Y
R=P+Q Z = X.Y
A + (B + C)
A B C B+C A + (B + C)
3 5 0 0 U101
09
[3]
(a) Complete the following sentences about the TCP/IP 5-layer model using only the words
given:
3 5 0 0 U101
11
3 5 0 0 U101
13
BLANK PAGE
(iii) Give one reason why hexadecimal notation is used as shorthand for binary
numbers. [1]
(c) State the effect of arithmetic shift functions by one place. [2]
LEFT SHIFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
RIGHT SHIFT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The following 600 × 500 pixels 8-bit colour image has been created.
(a) State the range and number of different colours in denary that can be represented using
this colour model. [2]
BLANK PAGE
(a) (i) State why an array would not be suitable for storing this data. [1]
(ii) Give a suitable example of data that may be stored by Bettys B&B using an array.
[2]
(b) Design different types of validation check for three of the fields from the booking data
table. Do not use presence check in your answer. [6]
Validation check 1
Field: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Type of check: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rule:
Field: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Type of check: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rule:
Validation check 3
Field: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Type of check: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rule:
(c) As Betty’s B&B is storing personal data on a computer system, they should be aware of
the dangers of storing data and the need to keep data secure.
(i) Describe the dangers that organisations face from using computers to store
personal data. Do not include malware in your answer. [4]
Identify three errors in the program and name each error type. [6]
Error 1
Error: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Line: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Error Type: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Error 2
Error: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Line: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Error Type: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Error 3
Error: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Line: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Error Type: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
END OF PAPER
© WJEC CBAC Ltd. (3500U10-1)
25
Examiner
only
For continuation only.
BLANK PAGE