0% found this document useful (0 votes)
90 views18 pages

June 2022 MS - Unit 3 WJEC Computer Science A-Level

The document provides the marking scheme for the 2022 WJEC A LEVEL COMPUTER SCIENCE exam. It includes an introduction, the marking scheme with answers and marks allocated, and concludes by saying it cannot discuss the marking scheme further.

Uploaded by

msalaad432
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views18 pages

June 2022 MS - Unit 3 WJEC Computer Science A-Level

The document provides the marking scheme for the 2022 WJEC A LEVEL COMPUTER SCIENCE exam. It includes an introduction, the marking scheme with answers and marks allocated, and concludes by saying it cannot discuss the marking scheme further.

Uploaded by

msalaad432
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

PMT

GCE A LEVEL MARKING SCHEME

SUMMER 2022

A LEVEL
COMPUTER SCIENCE - UNIT 3
1500U30-1

© WJEC CBAC Ltd.


PMT

INTRODUCTION

This marking scheme was used by WJEC for the 2022 examination. It was finalised after
detailed discussion at examiners' conferences by all the examiners involved in the
assessment. The conference was held shortly after the paper was taken so that reference
could be made to the full range of candidates' responses, with photocopied scripts forming
the basis of discussion. The aim of the conference was to ensure that the marking scheme
was interpreted and applied in the same way by all examiners.

It is hoped that this information will be of assistance to centres but it is recognised at the
same time that, without the benefit of participation in the examiners' conference, teachers
may have different views on certain matters of detail or interpretation.

WJEC regrets that it cannot enter into any discussion or correspondence about this marking
scheme.

© WJEC CBAC Ltd.


PMT

WJEC GCE A LEVEL COMPUTER SCIENCE - UNIT 3

SUMMER 2022 MARK SCHEME

Question Answer Mark AO1 AO2 AO3 Total


1. (a) Award one mark for each correct answer up to a 3 1b 4
maximum of three.

A stack is a data structure of items that are added and


removed according to the last-in first-out (LIFO) / first-
in last-out (FILO) principle.

Items can only be added and removed from the stack


from the top.

Push adds an item to the top of the stack, pop


removes the item from the top.

A stack can be used as a recursive data structure.

Underflow occurs when an attempt is made to pop an


empty stack / overflow occurs when an attempt is
made to add to a full stack.

Pointers are used to keep track of the top of the stack.


Award one mark for a correct example 1 1b

An example of the use of a stack would be to store


webpages for a back button in a web browser. Accept
any suitable example.

(b) (i) The value ‘.’ can be updated by setting alphabet [6,3] = 2
‘!’

1 mark for correct array assignment of char ‘!’ 1 2a


1 mark for correct indices 1 2a

Accept alphabet [3,6]


(ii) 0 1 2 3 2
0 ID firstname Surname Class
1 1 Finn Jackson 7b
2 2 Jakub Kowalski 7b
3 3 Molly Wilcox 7a
1 mark for suitable indices and structure of two- 1 2a
dimensional array.
1 mark for appropriate pupil data 1 2a

© WJEC CBAC Ltd.


1
PMT

Question Answer Mark AO1 AO2 AO3 Total


2. (a) An algorithm is a step by step set of instructions or 2 1b 2
rules (1 mark) which provides a solution to a specific
problem (1 mark)

(b) One mark for identifying a method and 1 mark for a 2 1b 2


description maximum of two marks

Flow charts can be used to define algorithms.


Flow charts are a diagrammatic visualisation of the
inputs, outputs and processes completed by an
algorithm.

Pseudocode can be used define algorithms.


Pseudocode is a generic programming language than
cannot be translated in to machine code but can be
interpreted by a developer.

Structured English can be used to define algorithms.


Structured English breaks down compiled algorithm
into simple English words to help show a step-by-step
solution.

(c) One mark for each correct answer up to a 4 1b 4


maximum of four

Recursive algorithms are more elegant than non-


recursive algorithms.

Non-recursive algorithms are less complex than


recursive algorithms to program.

Recursive algorithms generally use less code than


non-recursive algorithms.

Recursive algorithms can be more difficult to debug


than non-recursive algorithms.

© WJEC CBAC Ltd.


2
PMT

Question Answer Mark AO1 AO2 AO3 Total


3. (a) Correct answer can be established using different 6
steps / laws / rules / identities / dual relations.

Indicative content

(A + C). (A. C + A. C̅ ) + A. C
(A + C). A. (C + C̅ ) + A. C
(A + C). A. (1) + A. C
(A + C). A + A. C
A. (A + C) + C
A. (A + C)
A. A + A. C
A + A. C
A

Correctly applying identities to arrive at correct answer 6 2a


6 marks.
Correctly applying identities but arriving at wrong
answer 1 mark for each correct application with a max
of 5 marks.

(b) Correct answer can be established using different 5


steps / laws / rules / identities / dual relations.

Indicative content

̅̅̅̅̅
X. Y. (̅
X + Y) + Z̅
̅+Y
X ̅. X
̅+Y ̅. Y + Z̅
̅+Y
X ̅+Y ̅. Y + Z̅
̅
X+̅ Y. Y + Z̅
̅
X + 0 + Z̅
̅ + Z̅
X

Correctly applying De Morgan’s Law 1 mark. 1 2a


Correctly applying identities to arrive at correct answer
4 marks. 4
Correctly applying identities but arriving at wrong
answer
1 mark for each correct application with a max of 3
marks.

© WJEC CBAC Ltd.


3
PMT

Question Answer Mark AO1 AO2 AO3 Total


4. Indicative content 8

declare searchChar as char


declare first, last, m as integer
declare myArray[] as char[]

input searchChar
set first = 0
set last = len(myArray[])- 1

repeat
set m = (first + last) DIV 2
if searchChar < myArray[m] then
set last = m – 1
else
set first = m + 1
end if
until (myArray[m] = searchChar)
output m
Declare and initialise variables 1 3c
Use of outer loop 1 3c
Correct condition in outer loop 1 3c
Correct use of DIV or INT (to force m into an integer) 1 3c
Correct calculation to identify midpoint 1 3c
Set first using midpoint 1 3c
Set last using midpoint 1 3c
Output position 1 3c

© WJEC CBAC Ltd.


4
PMT

Question Answer Mark AO1 AO2 AO3 Total


5. (a) Indicative content 6 2a 6

Input Output
Invalid input e.g. 99 or error
1000 but not ‘a’
365 3
6
5
14
365

1 mark per row

(b) The purpose of the algorithm is to confirm the input (1 2 2a 2


mark) and output the digit sum (sum of the digits) (1
mark)

© WJEC CBAC Ltd.


5
PMT

Question Answer Mark AO1 AO2 AO3 Total


6. (a) (i) One mark for each correct response up to a 4
maximum of four.
Developers draft the design of a system up front and 1 1b
it does not change.
Only once the analysis and design stages are 1 1b
complete, developers cannot go back to a to make
any changes.
If the analysis or design of the project are inaccurate 1 1b
or incorrect in any way, the project will fail due to the
rigidness of the waterfall methodology.
Requires less communication between the client 1 1b
and the developer.
Client input is only required during analysis and at 1 1b
times the design stage.

(ii) One mark for each correct response up to a 4


maximum of four.
Developers start with a simple project design and 1 1b
requirements.
Iterative approach as analysis and design relies on 1 1b
each other.
Analysis informs design and the design informs 1 1b
further analysis to be undertaken.
Changes can be made after each phase of 1 1b
development, analysis can be revisited, and designs
changed.
Strong communication between the client and the 1 1b
developer should be regular
Clients are involved during all stages of development. 1 1b

© WJEC CBAC Ltd.


6
PMT

Question Answer Mark AO1 AO2 AO3 Total


(b) (i) Questionnaires 2
These should be undertaken by a variety of
stakeholders to support the analysis of the existing
system. These questionnaires should measure the
effectiveness of the current systems from the
viewpoints of various stakeholders.

Observations
Formal observations should be undertaken by the
analysis team. These observers should monitor the
interactions stakeholders have of the current systems, 1b
making relevant notes.

Requirements
After the analysis has been completed a formal set of
requirements should be produced for any proposed
changes of an existing system or implementation of a
new system.

1 mark for name and 1 mark for description. 2

(ii) Annotated code listings 2


To ensure effective maintenance of the source code
for any developer. A complete list of the annotated
source code is required to resolve issues or extend the
system.

Algorithm designs
A complete collection of all algorithm designs in
pseudocode or flow chart format should be required.
These can aide a future developer in following the
logic of a program for maintenance purposes. 1b

Data dictionaries
A data dictionary is a document that contains the
structures of all databases, data types and the
relationship between them. This is useful for
maintaining, debugging and extending the data within
the system

1 mark for name and 1 mark for description. 2b

© WJEC CBAC Ltd.


7
PMT

Question Answer Mark AO1 AO2 AO3 Total


7. <digit> ::= 0 |1|2 . . . 8|9 1 2b 6

<digits> ::= <digit><digit> 1 2b


<pub> ::= <digit><digit><digit><digit><digit> 1 2b
<prefix> ::= 978|979 1 2b
<separator>::= “ “| - 1 2b
<ISBN> ::= <prefix> <separator><digits>
<separator><pub> <separator><digits> <separator>< digit > 1 2b

Answer not correct if BNF notation used incorrectly.


Max of four marks.

© WJEC CBAC Ltd.


8
PMT

Question Answer Mark AO1 AO2 AO3 Total


8. (a) One mark for each correct response to a maximum 3 1b
of two and one mark for example.
Functional programming uses a series of function 1
definitions which are evaluated as a mathematical
expression to solve a problem.
Functional programming is a declarative language 1
which uses when programmer code what problem they
want to solve rather than how they are going to a
specific problem.
Functional programming is used in research and 1
testing.
An example of a functional programming language is 1
Haskell or SQL.

(b) One mark for each correct response to a maximum 3 1b 6


of two and one mark for example.

Logic programming is used to solve programming


problems using a specific knowledge base.

Logic programming takes a problem or question and


will produce a solution based on this knowledge base.

Logic programming is used in expert systems,


machine learning and artificial intelligence.

An example of a logic programming language is


PROLOG or Mercury.

© WJEC CBAC Ltd.


9
PMT

Question Answer Mark AO1 AO2 AO3 Total


9. (a) Award one mark for each correct response up to a 2 1b 2
maximum of two.

When new hardware or software is developed it needs


to ensure it is compatible with existing hardware and
software.

Products developed by different companies need to


meet standards to ensure combability across
platforms.

There must be interoperability between new products


and with existing products to exchange and use data.

Using standards ensures products can work as part of


larger system or network.

Examples of standardised computer languages are


HTML5, CSS3 and JavaScript which are maintained
by W3C (World Wide Web Consortium)

(b) Award one mark for each correct response up to a 2 1b 2


maximum of two.

All standards must be very detailed to ensure


consistency in their implementation which has high
costs in terms of time and money.

Companies and business will only agree to standards


when they are in their own best interests.

Many companies have different targets and goals, and


this can cause difficulties when agreeing on unified
standards.

Standards need to be broad enough to ensure they


meet the demands of a wide range of complex
problems but specific enough that they are
implemented correctly.

© WJEC CBAC Ltd.


10
PMT

Question Answer Mark AO1 AO2 AO3 Total


10. 4
A B A NOR B NOT (A NOR B) B AND NOT (A NOR B)
0 0 1 0 0
0 1 0 1 1
1 0 0 1 0
1 1 0 1 1

Award one mark for each correct column 3 2b


Award one mark for correct combinations of A and B 1 2b

© WJEC CBAC Ltd.


11
PMT

Question Answer Mark AO1 AO2 AO3 Total


11. (a) 1 mark for identifying i loop will execute n times 1 3c 5
1 mark for identifying j loop will execute n2 times 1 3c
1 mark for identifying k loop will execute n3 times 1 3c
1 mark for determining that the order will be dominated 1 3c
by n3 1 3c
1 mark for determining that the growth rate for time
performance is O(n3)

(b) The algorithm only uses two data structures, 2 three- 1 2b 2


dimensional arrays. Therefore, total storage
requirements = 1.

As there is no change to the amount of data structures 1 2b


being used, the growth rate for memory will be
constant O(1).

(c) 2
O(n3) polynomial complexity

Time and Size axes labelled correctly 1 2b


Correct gradient of line 1 2b

© WJEC CBAC Ltd.


12
PMT

Question Answer Mark AO1 AO2 AO3 Total


12. Data can be recovered from back-up of data simply by 1 1b 4
copying the back-up data back to the original location.

Temporary data can be searched to find an autosaved 1


version of any files or data.

Data may be recovered using specialist software to 1


deep search for any deleted or lost data.

Undergo a complete system restore to a previous point 1


in time where the data is still available.

Archived files kept off site could be used (eg after flood 1
or fire)

Returning to a previous version if data was lost during 1


an update then running the update again.

One mark for each correct response to a maximum


of four.

© WJEC CBAC Ltd.


13
PMT

Question Answer Mark AO1 AO2 AO3 Total


13. Indicative content 1b 12

A code of conduct is a formal written document that


outlines the acceptable workplace and ethical
standards to which employees must abide.

Each employee or stakeholder agrees to act according


to the clear guidelines outlines in a code of conduct
usually by signing a formal contract.

A code of conduct may include standards on privacy,


security, damage, access levels, copyright
infringement, ethics and wellbeing.

If an employee or stakeholder breaks a code of


conduct, then action can be taken against them for
breaching this contract.

Disciplinary proceedings and policies are usually


clearly laid out within a code of conduct which outline
what action is taken in a breach.

In software development when working with both


internal and external stakeholders abiding by a code of
conduct is essential.

There are other codes of conduct professionals should


adhere to outside of their employment based on their
chosen career.
The British Computer Society outlines its own code of
conduct for Computing and IT professionals to ensure
integrity in their profession.

The BCS code of conduct compromises of four key


principles: public interest, professional competence
and integrity, duty to relevant authority and duty to the
profession.

Each principle outlines standards to which each


professional should abide to ensure their professional
integrity in IT and Computing.

Public interest standards include having due regard for


public health, privacy, security, the environment and of
the wellbeing of others; conduct professional activity
without discrimination on the grounds of sex, sexual
orientation, nationality, ethnic origin etc.

During the analysis stage of development there will be


a lot of communication with external stakeholders such
as third-party businesses or clients. It is essential that
when dealing with the public that employees act with
this due regard.

© WJEC CBAC Ltd.


14
PMT

Question Answer Mark AO1 AO2 AO3 Total


Professional competence and integrity standards
include only undertaking work for that is in your
professional competence, not claim a level of skill you
do not possess and reject and not make offer or
bribery in your work.

During the analysis and design stages of the software


development process it is essential that a company or
professional only undertakes work of which they
capable and do not overpromise on what the can
deliver.

Professional competence and integrity standards


include only undertaking work for that is in your
professional competence, not claim a level of skill you
do not possess and reject and not make offer or
bribery in your work.

Duty to relevant authority standards include avoid any


situation that may cause a conflict of interest, accept
any responsibility for your work and not disclose any
confidential information for personal gain.

During design and testing stages of development is it


essentials that employees to not disclose any
confidential information, many software companies
include a non-disclosure agreement within their
employment contracts.

Duty to the profession standards include upholding the


reputation of the BCS, encourage others in
professional development and seek to improve
professional standards at all times.

Throughout all stage of the software development


process it is essential to continually reflect professional
develop and maintain recognised standards.

Other code of conducts with in the Computing


profession include Association for Computing
Machinery (ACM) code of ethics and professional
conduct.

Total 100

© WJEC CBAC Ltd.


15
PMT

Band Q12 AO1b - Max 12 marks


9 – 12 marks
The candidate has:
• written an extended response that has a sustained line of reasoning which is coherent,
relevant, and logically structured
• shown clear understanding of the requirements of the question and a clear knowledge of the
topics as specified in the indicative content. Clear knowledge is defined as responses that
3 provide relevant detailed points of the indicative content, which relate to an extensive amount
of the indicative content.
• addressed the question appropriately with minimal repetition and no irrelevant material
• has presented a balanced discussion and justified their answer with examples
• effectively drawn together different areas of knowledge, skills and understanding from all
relevant areas across the course of study
• used appropriate technical terminology confidently and accurately.
5 - 8 marks
The candidate has:
• written a response that has an adequate line of reasoning with elements of coherence,
relevance, and logical structure
• shown adequate understanding of the requirements of the question and a satisfactory
knowledge of the topics as specified in the indicative content. Satisfactory knowledge is
2
defined as responses that provide relevant points of the indicative content, which relate to the
indicative content.
• presented a discussion with limited examples
• drawn together different areas of knowledge, skills and understanding from a number of areas
across the course of study
• used appropriate technical terminology.
1- 4 marks
The candidate has:
• written a response that that lacks sufficient reasoning and structure
• produced a discussion which is not well developed
1 • attempted to address the question but has demonstrated superficial knowledge of the topics
specified in the indicative content. Superficial knowledge is defined as responses that provide
limited relevant points of the indicative content, which relate to a limited amount the indicative
content.
• used limited technical terminology.
0 Response not credit worthy or not attempted.

1500U30-1 WJEC GCE A Level Computer Science – Unit 3 MS S22/CB

© WJEC CBAC Ltd.


16

You might also like