0% found this document useful (0 votes)
74 views52 pages

Computer Science Topic 1.3 Questions

Uploaded by

BXR Studios
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views52 pages

Computer Science Topic 1.3 Questions

Uploaded by

BXR Studios
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Computer Science OCR A Level

1.3 Exchanging Data

Topic Questions

1.3.1 Compression, Encryption &


Hashing
1.3.2 Databases
1.3.3 Networks
1.3.4 Web Technologies
TOTAL MARKS - /149
Time Allowed - 2 Hours 40 minutes

Questions from 2017-2020


I won’t include every paper as you should save some questions for past papers
Although you can still do 2017-2020 papers even if you do this topic paper.

This document is to help consolidate knowledge and review topics after learning the
content. A time has been given if you want to time yourself you don’t need to and you
should do at your own pace if you wish. The time adds roughly 10 minutes extra just like
the exam. Aim for a mark a minute if doing this timed.

Some Questions may overlap with other topics. If you don’t know the
knowledge for that overlap question or cannot be asked just skip it.
I don’t have OCR ExamBuilder so I cannot do much about overlap questions
(same applies with the mark scheme at the end of the document)

Not all topics can be covered given the timeframe of papers I have used so it is still up to
you to go through the specification and practice content from the other papers.
2017 Questions 6
3 A charitable organisation is trying to make the works of William Shakespeare available to more
people.

(a) The organisation decides to make a copy of Shakespeare’s entire works available as a
downloadable text file from its website. It further decides to compress the file before making it
available to download.

(i) State an advantage to the website’s visitors of the file being compressed.

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [1]

(ii) Explain why the company should use lossless and not lossy compression.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(b)* The organisation looks at using either run length encoding or dictionary encoding to compress
the file described in part (a).

Discuss the two compression methods and justify which you would recommend. You may
refer to the extract of text below to illustrate your argument.

What’s in a name? that which we call a rose


By any other name would smell as sweet;
So Romeo would, were he not Romeo call’d, [12]

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© OCR 2017
7

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© OCR 2017 Turn over


14
7 A web forum stores all its content in a database.

(a) The forum stores details of its users in the table called Users. An extract of Users is shown
below.

userID username passwordHash locked


1 Zeus 8dfa46a79248037752bba6166fcb34f8 1
2 Hera 74d39d60507eb55e000c6ec5c1265891 0
3 Poseidon b015d770d0208ddcce2c2c719fe29371 0

Describe what is meant by the term ‘primary key’, giving an example from the table above.

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) The user’s password is passed to a function that generates a hash and the result is stored in
passwordHash.

(i) Describe what is meant by the term ‘hash’.

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [1]

(ii) Describe one advantage to storing the password as a hash.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© OCR 2017
15
(c) Write an SQL statement to get just the passwordHash and locked values of the user
Apollo.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(d) Sometimes users can have their accounts locked if they behave inappropriately. When this is
the case the locked field is set to 1 rather than 0.

Write an SQL statement that locks the account of the user Hades

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© OCR 2017 Turn over


16
(e) The function checkAccess takes in the password the user has entered (givenPassword)
along with the password hash (passwordHash) and locked value (locked).

passwordHash and locked have already been extracted from the database before being
passed to the function. It should return the value true if a user should be allowed access to
a system and false if they aren’t.

Your function should make use of the pre-written function hash() which takes in a string and
returns the hash of that string.

e.g.

hash("Hello") returns f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0

Complete the function checkAccess.

function checkAccess(givenPassword, passwordHash, locked)

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

endfunction

[4]

© OCR 2017
18
9 A website contains the following HTML:

<html>
<head>
<title>Boris' Cake Shop</title>
<link rel="stylesheet" type="text/css" href="style.css">
</head>
<body>
<h1>Boris' Cake Shop</h1>
<p id="intro">
Welcome to Boris' cake shop.
<script>
var hour = new Date().getHours();//gets the hour value of the
current time
if(hour>9 && hour<17)
{
document.write("We are currently open.");
}
else
{
document.write("We are closed, come visit us when we are
open (09:00 - 17:00).");
}
</script>
</p>
<div class="customerQuote">
Boris makes the best cupcakes I have ever tasted.
</div>
</body>
</html>

(a) Explain the difference between a HTML id attribute and a HTML class attribute.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© OCR 2017
19
(b) The html file is linked to the CSS file style.css

Text between h1 tags should be in the font Arial.

The customer quote should be on a background with the colour E8C3E1.

The introduction text should be dark red (using the named colour darkRed).

Write the code that should go in style.css to give this formatting.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(c) The code between the script tags is supposed to display a different message during the
shop’s opening hours of 09:00 and 17:00.

(i) State the name of the language used between the script tags.

...................................................................................................................................... [1]

Some users have reported that there is a bug and the site says the shop is closed when they
log on between 9 and 10 in the morning.

(ii) Explain how this bug can be fixed.

...........................................................................................................................................

...................................................................................................................................... [1]

(iii) Give one disadvantage of this code being run client side rather than server side.

...........................................................................................................................................

...................................................................................................................................... [1]
© OCR 2017 Turn over
2018 Questions 8
3 An airport holds details of flights in a database using the table Flight. An extract of the table is
shown below.

FlightID FlightNumber DestinationCode DestinationName DepartureDate DepartureTime


1355 OC0089 JFK John F. Kennedy 03/07/18 09:50
1453 CS1573 LHR Heathrow 03/07/18 10:30
1921 OC7750 JFK John F. Kennedy 04/07/18 08:30
1331 AM0045 YHZ Halifax 04/07/18 14:25
1592 HB0326 RTM Rotterdam 04/07/18 19:10
1659 CS0123 LHR Heathrow 04/07/18 07:20

(a) Describe what the SQL statement below does.

SELECT FlightNumber FROM Flight WHERE DestinationCode='JFK'

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

The airport cancels all its flights to Heathrow on 4th July 2018.

(b) The SQL statement below shows all the data for flights going to Halifax. Rewrite it so it instead
removes all flights to Heathrow on 4th July 2018.

SELECT * FROM Flight WHERE DestinationName='Halifax'

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© OCR 2018
9
(c) Tables often have primary and secondary keys.

(i) State why DestinationCode would not be a suitable primary key for the Flight
table.

...........................................................................................................................................

...................................................................................................................................... [1]

(ii) State why DestinationCode would be a suitable secondary key for the Flight table.

...........................................................................................................................................

...................................................................................................................................... [1]

(d) The airline wishes to ensure the database is normalised.

(i) Describe why the database can be considered to be in First Normal Form.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Describe why the database can be considered to be in Second Normal Form.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(iii) Describe why the database can not be considered to be in Third Normal form.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© OCR 2018 Turn over


10
(e) The airport wishes to allow airlines to be able to access the data it has on flights via the
internet.

Describe one format or method the airport could use to provide the data to the airlines so
they can use it in their own applications.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© OCR 2018
11
4 The internet can be considered an example of a WAN.

(a) Describe what is meant by the term ‘WAN’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) The internet uses a set of protocols referred to as the TCP/IP stack. The TCP/IP stack
consists of four different layers, each with its own set of protocols.

(i) Explain why protocols are important on a network.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) State the name of the four layers of the TCP/IP stack.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

4 ........................................................................................................................................
[4]

© OCR 2018 Turn over


18
8 A student writes a program to apply a symmetric encryption algorithm to work on messages of up
to 25 ASCII characters.

(a) Describe what is meant by the term ‘ASCII’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

The encryption algorithm works in the following way.


A message of up to 25 characters (spaces and punctuation are not included) is placed in a
5×5 array. Any leftover spaces are filled with random letters. The message I LOVE COMPUTER
SCIENCE becomes:

I L O V E
C O M P U
T E R S C
I E N C E
T O W R M

The key is a sequence of ten numbers.


In this example we will use 1 2 3 4 5 1 2 3 4 5. The first 5 numbers state how many spaces
the rows 0 to 4 must be rotated right.

A key with the first 5 digits 1 2 3 4 5 would result in

E I L O V
P U C O M
R S C T E
E N C E I
T O W R M

The next 5 digits state how many spaces down the columns 0 to 4 should be rotated.

Applying the last 5 digits 1 2 3 4 5 to the grid above would give

T N C O V
E O C T M
P I W E E
R U L R I
E S C O M

© OCR 2018
19
Part of the pseudocode for the algorithm is written below.

global array grid[5,5]


addMessage()
// letters and random letters have been entered
// into the 2D array, grid

for i = 0 to 4
x = getNextDigitInKey()
shiftRow(i,x)
next i

for i = 0 to 4
x = getNextDigitInKey()
shiftColumn(i,x)
next i

//Now reassemble array back into string.

(b) Show the result of running the algorithm on the grid and key below. [2]

KEY: 3 3 3 3 3 1 1 1 1 1

T O P S E
C R E T M
E S S A G
E Y R P L
U O G G Q

Grid after only the rows are shifted:

Grid after columns have also been shifted:

© OCR 2018 Turn over


20
(c) Write the procedure shiftRow.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© OCR 2018
21
(d)* Modern encryption is much stronger than the method described in the first part of this
question.
Discuss the impact of modern encryption on society. You should refer to:
• The importance of asymmetric encryption and how it differs from symmetric encryption.
• Different circumstances in which symmetric and asymmetric encryption may be used.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [9]

© OCR 2018 Turn over


2019 Questions 4
2 A survey is carried out to look at the types of vehicle that travel down a stretch of motorway.

For each vehicle that passes by, a letter is entered into the system.

For a car ‘C’ is entered.

For a motorbike ‘M’ is entered.

For a lorry ‘L’ is entered.

For any other vehicle ‘O’ is entered.

It is decided to compress the data that has been generated.

(a) State what is meant by the term ‘compression’.

...................................................................................................................................................

.............................................................................................................................................. [1]

It is decided that Run Length Encoding will be used.

(b) The following sequence has been compressed using Run Length Encoding.

3C3M4C

Show the result of decompressing the sequence.

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Show the result of using Run Length Encoding to compress the sequence:

CCCCOLLLCCCCCMOCCCCC

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© OCR 2019
5
The survey takers want to find out the longest continuous sequence of cars in any given chunk of
data. For example, in the data

CCMCCCCLLCCC

the longest sequence would be 4.

(d) Write the function longest which takes in a string of characters as an argument and returns
an integer representing the longest continuous sequence of Cs.

[5]

© OCR 2019 Turn over


17
7 RestaurantReview is a website that allows users to leave reviews and ratings for different
restaurants.

The website uses a database with the following structure.

User Review Restaurant

The database management system ensures referential integrity is maintained.

(a) Explain what is meant by referential integrity, giving an example which refers to the database
described above.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) Each review includes a score out of 5. When the score is entered on the website it is checked
in the browser to ensure a number no higher than 5 has been entered. It is then checked
again on the server.

(i) State what is meant by the term ‘server’.

...........................................................................................................................................

...................................................................................................................................... [1]

(ii) Explain why it is important that the review score that the user entered is also checked
server-side.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© OCR 2019 Turn over


18
Whenever a review is added to the system, the restaurant’s average rating is updated. This
transaction is ACID.

The A in ACID refers to Atomic.

(c) Describe what is meant by the term ‘Atomic’ in the context of ACID transactions. You should
refer to the example of a review being added.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(d) State what the letters CID refer to in ACID.

C ......................................................

I ......................................................

D ......................................................
[3]

The database previously stored reviews using the ASCII character set. ASCII uses 1 byte per
character. It is decided to switch to the Unicode UTF-32 character set which uses 4 bytes per
character.

(e) Give an advantage and disadvantage of changing character sets from ASCII to Unicode
UTF-32.

Advantage .................................................................................................................................

...................................................................................................................................................

Disadvantage .............................................................................................................................

...................................................................................................................................................
[2]

© OCR 2019
24
11 A web development company makes its money building websites for other companies.

(a)* The web development company is looking to recruit a programmer to build websites.

Discuss the technologies the programmer would need to know and use and the importance of
each one.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [9]

© OCR 2019
25
(b) Part of a website’s code is shown below.

<head>
<title>Orville's Oranges</title>
<link rel="stylesheet" type="text/css" href="mainStyle.css">
</head>

Explain the meaning of the code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) The site also contains the following code.

<div class="offer">All oranges 50% off.</div>

Complete the CSS code that would make any div elements of the class offer have an
orange border.

………………………………………{

border-style: solid;

………………………………………
}

[2]

© OCR 2019
2020 Questions 2
Answer all the questions.

1 A hotel uses a computer system to keep track of room bookings. The hotel staff are able to query
a database to discover which rooms are booked or which rooms are free.

(a) The hotel’s computer network uses a client-server model.

(i) Describe what is meant by the term ‘client-server’ in this context.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(ii) Give two advantages of client-server compared to peer-to-peer.

1 .........................................................................................................................................

...........................................................................................................................................

2 .........................................................................................................................................

...........................................................................................................................................
[2]

The hotel’s network uses multiple switches.

(b) Explain the purpose of a network switch.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© OCR 2020
3
(c)* The hotel is concerned about the security of its computer network.

Discuss the threats which potentially exist to the hotel’s computer network and how these
threats could be eliminated or reduced.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [9]
© OCR 2020 Turn over
4
(d) The hotel stores data about rooms, customers and bookings in a database. Each customer
can book multiple rooms and each room can be booked multiple times.

(i) Draw an Entity Relationship Diagram for this database.

[4]

(ii) Define what is meant by the term ‘foreign key’, giving one example of where a foreign
key would be used in the hotel booking database.

Definition ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Example ............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

© OCR 2020
5
(iii) Describe two different ways that hashing could be used in this database.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

The hotel booking database enforces referential integrity.

(e) Explain what is meant by the term ‘referential integrity’ and how this could potentially be
broken.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© OCR 2020 Turn over


2017 Mark Scheme
H446/01 Mark Scheme June 2017

ii Description can be written: 4

- Oxford pointer changed to bypass Birmingham and (AO2.1)


point to Manchester. (1)

- A node is created holding the data York/York is


placed is next free space/node/item (1) On diagram don’t penalise if the pointer from Birmingham is left intact. It
should be clear in both diagram and text that Oxford no longer points to
- Manchester remains in original position and pointer Birmingham.
changed to point to the York node. (1)
In diagram solution, London, Oxford and Manchester must remain in the
- The York node points to null (or terminator). (1) same positions.

OR via diagram eg.:

b A linked list requires every node to be checked (until 4 Some candidates may talk about time complexity: linked lists being
the desired record is found). (1) linear/O(n) and hash table being constant/O(1) Accept these as points 1& 2
A linked list will take longer to search (as more nodes (AO1.2 - 2 and 3 & 4 conjoined i.e. full marks.
are added). (1) marks
A hash table enables direct access to the location of
the record. (1) AO2.2 -
A hash table will take the same time to search (as
more nodes are added)/It takes no longer as more 2 marks)
records are added. (1)

3 a i Downloads quicker. (1) 1 Do not accept ‘saves the user space on their device’.
Saves user money by using less bandwidth/ on data
usage. (1)
(Max 1)
(AO1.2) 2017 MS Starts Here

6
H446/01 Mark Scheme June 2017

Ii Lossy takes away some of the information from the 3


original. (1) (AO1.1 – 2
Lossless preserves all the information from the marks
original. (1)
With text the loss of small amounts of information will AO2.1 -
make it unreadable. (1) 1mark)

7
H446/01 Mark Scheme June 2017

b Mark Band 3–High Level (9-12 marks) AO1.1 Points may include but aren’t limited to:

The candidate demonstrates a thorough knowledge and (2) AO1 Knowledge and Understanding
understanding of dictionary and run length encoding for
compression. The material is generally accurate and AO1.2 Run length encoding relies on consecutive pieces of data/characters being
detailed. the same.
(2)
The candidate is able to apply their knowledge and Each set of consecutive symbols can be represented by the symbol and its
AO2.1 number of occurrences
understanding directly and consistently to the context
provided. Evidence/examples will be explicitly relevant to e.g. AAAABBBBBCCC could be represented as 4A5B3C (or A4B5C3 or
(3)
the explanation. any sensible RLE encoding)
AO3.3
The candidate is able to weigh up both forms of In dictionary encoding frequently occurring pieces of data/groups of
compression and justify dictionary encoding being the (5) characters are replaced by symbols/tokens/smaller groups of
better choice. characters/indexes.

There is a well-developed line of reasoning which is clear A dictionary is then used to say which symbols/tokens/characters/indexes
and logically structured. The information presented is 12 match which groups of characters.
relevant and substantiated. When decompressed the dictionary is used to replace the tokens with the
original text.
Mark Band 2-Mid Level (5-8 marks)
The candidate demonstrates reasonable knowledge and AO2.1 Application
understanding of dictionary and run length encoding for
Run Length Encoding is very unsuitable for the example text
compression; the material is generally accurate but at
There are very few consecutive repeating symbols in the text.
times underdeveloped.
only instances being ll and ee
The candidate is able to apply their knowledge and these still require 2 characters to represent them 2l and 2e
understanding directly to the context provided although
Dictionary encoding is well suited.
one or two opportunities are missed. Evidence/examples
There are lots of repeating groups of characters
are for the most part implicitly relevant to the explanation.
For example ‘call’ ‘name’ ‘[SPACE]we’ ‘Romeo’
The candidate makes a reasonable attempt to come to a We could for example have:
conclusion as to which form of compression is better What's in53? that which2 15 rose

8
H446/01 Mark Scheme June 2017

suited. By5ny other3 would smell5s sweet;

There is a line of reasoning presented with some So4would,2re he not41’d


structure. The information presented is in the most part
relevant and supported by some evidence. 1:call

Mark Band 1-Low Level (1-4 marks) 2:[space]we

The candidate demonstrates a basic knowledge of 3:[space]name


dictionary and run length encoding for compression; the
4:[space]Romeo[space]
material is basic and contains some inaccuracies. The
candidate makes a limited attempt to apply acquired 5:[space]a
knowledge and understanding to the context provided.
(NB candidates are unlikely to show full compression, just a demonstration
The candidate provides nothing more than an of the principle is sufficient. The best candidates are likely to show an
unsupported assertion. awareness that space is a character that can be used in compression and
that upper and lowercase letters are different. Demonstrating this is
0 marks
No attempt to answer the question or response is not indicative of but not a requisite of the band.)
worthy of credit.
AO3.3: Evaluation

Run length encoding is not suited to natural language (more likely to be


used in simple images).

Applying it to the example the resulting text would be the same size as the
original/worse than the original (if we use 1s to represent every individual
instance of a character).

Dictionary encoding works well. We can already see benefit on small piece
of text. Would fare substantially better on full works.

Dictionary encoding is the best compression method for this scenario.

9
H446/01 Mark Scheme June 2017

ii 11010100 1

(AO1.2)

c Shift Right (1) 2 Allow one mark for correct number of places but wrong direction.

Two Places (1) (AO1.2)

d Binary point: shifted four places gives: 6 Correct answer with clear binary subtraction/2’s complement addition
01001.0 (1) calculation gives full marks.
Binary point shifted two places gives: (AO1.2)
010.010 (1)

Subtraction carried out …


01001.000 -
010.010
(1)

…‘Borrowing’ shown… (1)

…Answer: 0110.110 (1)

Normalised to: Mantissa 011011 (1)

Exponent 0011 (1)

7 a A field which has a unique value for every record/A 2


unique identifier. (1)
(AO1.1 –
2017 MS Continues Here

13
H446/01 Mark Scheme June 2017

E.g. userID (1) 1 , AO2.1


-1)

b i A result generated by applying an algorithm/numeric 1


process to a value. (1)
(AO1.1)

ii Hash functions are one way/can’t be reverse (1) 2

If someone gains access to the database they cannot (AO1.2 1


access user’s password. (1) mark,

AO2.1

1 mark)

c SELECT passwordHash, locked (1) 3 Do not award first mark for SELECT *
FROM Users (1)
(AO 3.2)
WHERE username=’Apollo’ (1)

d UPDATE Users (1) 3 Allow other updating method e.g. a DELETE statement followed by an
SET locked=1(1) INSERT statement, for full marks e.g.
(AO 3.2)
WHERE username=’Hades’ (1)
DELETE FROM Users
WHERE username = ‘Hades’ (1 mark)

INSERT INTO Users (1 mark)


VALUES (<userID value>,’Hades’,<passwordHash value>,1)
(1 mark)

14
H446/01 Mark Scheme June 2017

e Takes a hash of givenPassword (NB this may be 4 Example code:


done inline e.g. temp = hash(givenPassword)
if hash(givenPassword)==passwordHash and loc (AO 3.2) if temp==passwordHash and locked==0 then
ked==0 then (1) return true
else
Returns true if password is correct and account is return false
unlocked. (1) endif

Candidates may have taken a different approach – any solution that fulfils
Returns false if account is locked (1)
the criteria on the left should get them marks.
Returns false if password is incorrect (1)

8 Mark Band 3–High Level (7-9 marks) AO1.1 Points may include but aren’t limited to:
The candidate demonstrates a thorough
knowledge and understanding issues around (2) AO1 Knowledge and Understanding
computers and the workforce and Artificial
Intelligence. The material is generally accurate AO1.2 Artificial Intelligence (AI) is the study of computers displaying intelligent
and detailed.
behaviour (usually characterised by decision making).
(2)
The candidate is able to apply their knowledge
Ignore and understanding directly and consistently to
the context provided. Evidence/examples will be
AO2.1
AI techniques include neural networks, evolutionary computation, Bayesian
networks etc.
explicitly relevant to the explanation. (2)
Computers are well suited to certain jobs and as AI techniques improve the
The candidate provides a thorough discussion AO3.3 range of jobs they can do is likely to increase.
which is well balanced. Evaluative comments are
consistently relevant and well-considered. (3) AO2.1 Application

There is a well-developed line of reasoning 9 For the argument:


which is clear and logically structured. The
information presented is relevant and Many jobs have already been taken over by computers.
substantiated.
Manual job such as work in the automotive industry has been replaced by
Mark Band 2-Mid Level (4-6 marks) robots.
The candidate demonstrates reasonable

15
H446/01 Mark Scheme June 2017

worthy of credit. human…

…Most believe this is still well beyond our current understanding.


Laws would need changing as currently people have the right to have
automated decisions checked over by humans (DPA)

AO3.3 Evaluation

Candidate should have come to a well reasoned conclusion for or against


the argument. They could come down on either side, the important thing is
they have considered both points of view and based their conclusion on the
evidence they have discussed.

9 a Only one element can have a given id/id is unique. 2


(1)
(AO1.1)
Class can be used assigned to multiple
elements/used multiple times. (1)
2017 MS Continues Here

b h1{ (1 mark for open and close) 6

font-family:Arial(;) (1 mark) (AO3.1) .customerQuote must have . and opening and closing { } for 3rd mark.
}

.customerQuote{ (1 mark)
#intro must have # and opening and closing { } for 4th mark
background-color: #E8C3E1(;) (1 mark)

}
Must match case sensitivity, except for ‘Arial’ and ‘darkRed’ and
#intro{ (1 mark) colour code

(font-)color: darkRed(;) (1 mark) Allow quotes around Arial and darkRed


}

17
H446/01 Mark Scheme June 2017

c i JavaScript 1 Cao do not accept Java

(AO1.1)

ii - Change line if(hour>9 && hour<17) … 1 Accept Change ‘greater than’ to ‘great than or equal to’ or similar
… To
if(hour>8 && hour<17) (1 Mark) (AO3.3)
or
… if(hour>=9 && hour<17) (1 Mark)

iii - i - Won’t work if JavaScript is disabled. (1) 1


i
- Shows incorrect message if user’s computer’s (AO2.2)
clock is wrong/in different time zone. (1)

- (Source) code is visible allowing it to be


copied/modified. (1) 2017 MS Ends Here
(Max 1)

10 a - - Prototype is created (1) 4

- (Evaluated and) feedback used to inform next (AO1.1)


iteration (1)

- Any changes are made (1)

- Process repeated until…(1)

… prototype becomes final product. (1)

(Max 4)

18
2018 Mark Scheme
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


3 a - Gets/selects/outputs the flight numbers from the 2
‘Flight’ table (AO2.2)
- Of flights with the destination JFK
- It returns OC0089 and OC7750
2018 MS Starts Here
(1 Mark per -, Max 2)

b - SELECT * changed to DELETE 3 DELETE FROM Flight WHERE


(AO3.2 DestinationName='Heathrow' AND
- Halifax changed to Heathrow DepartureDate=4/7/18
DestinationName='Heathrow' /
DestinationCode='LHR' Accept quotation marks or #s around the date.

- Added AND DepartureDate=4/7/18 Do not give first mark if asterisk is kept (i.e. DELETE *)

(1 Mark per -, Max 3) The Departure Date condition could be placed before
the Destination Name.

c i It is not unique/ the same value can appear in multiple 1


records (AO2.1)

ii It is likely to be used to search for / index / sorted on 1


(AO2.1)
d i -No Repeating fields/data 2
-Data is atomic (AO2.1)
-Has a primary Key

(1 Mark per -, max 2)

17
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


ii -Is in First Normal Form 2
-Every field is dependent on the primary key. (AO2.1)

(1 Mark per -, max 2)


iii - Has a transitive relationship/ A non-key field 2
depends on another non-key field. (AO1.2)
- DestinationName depends on
DestinationCode
(1 Mark per -, max 2)
e - CSV/Comma Separated Value (file)… 2 Other examples include:
- A (text) file/format with values separated by (AO2.1) - RSS/Really Simple Syndication/Rich Site
commas (or some other delimiter) Summary…
- ….A URL is given which points to an XML file
- XML/eXstensible Markup Language… which is periodically checked by a
- …A markup language that uses tags to denote browser/program.
data. - API/Application Programming Interface…
- …A prewritten set of subroutines/interfaces that
- SQL/Structured Query Language… provide access to the company’s data.
- …A language for creating/querying databases
- JSON/JavaScript Object Notation…
- …text format that can easily be changed to and
Accept any reasonable answer. 1 mark for naming from JavaScript Objects.
method, 1 mark for valid description.

Candidates may provide other valid answers (e.g.


REST, SOAP etc.).

Descriptions may differ from those given. Accept any


valid description.

18
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


4 a - Wide Area Network 2
- Collection of connected computers/devices over a (AO1.1)
large geographical area
- Often using 3rd party communications channels
(1 Mark per -, max 2)
b i - Allowing them to communicate 2
- By ensuring all devices follow the same (AO1.2)
rules/standards
- So they interpret data/signals in the same way
(1 Mark per -, max 2)
ii -Application 4
-Transport (AO1.1)
-Internet
-Network Interface/(Data) Link/Physical
(1 Mark per -, max 4)

19
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


8 a - American Standard Code for Information 2
Interchange (AO1.1)
- A character set
- Maps values to characters
- Uses 7-bits/ 8-bits per character
(1 Mark per -, Max 2)

b Row shift as below (1 Mark) 2 cao


(AO1.2)
P S E T O
E T M C R

S A G E S

R P L E Y

G G Q U O

Column Shift as below (1 Mark)

G G Q U O

P S E T O

E T M C R

S A G E S
R P L E Y

28
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


c - Procedure correctly defined with parameters. 4 When checking to see if out of bounds exception keep in
- Procedure manipulates the correct row of grid. (AO3.1) mind that in some languages the loop boundaries are
- Sensible use of for loop to iterate through the exclusive. When unsure give the benefit of the doubt. The
array without generating out of bounds final mark is meant to offer stretch and challenge. Be
cautious of wrong answers on face value seems to work. For
exception.
example, the following will not work:
- Correctly shifts each row.
(1 Mark per -, Max 4) procedure shiftRow(rowNumber, places)
for i = 0 to places
grid[rowNumber,i+1]= grid[rowNumber,i]
next i
endprocedure

Possible solutions include…


procedure shiftRow(rowNumber, places)
array temp[5]
for i=0 to 4
temp[i]=grid[rowNumber,i]
next i
for i=0 to 4
newPos=(i+places)MOD 5 //% is the same
as MOD
grid[rowNumber,newPos]=temp[i]
next i
endprocedure

And..
procedure shiftRow(rowNumber, places)
for i=1 to places
temp1=grid[rowNumber, 4]
temp2=0
for j =0 to 4
temp2=grid[rowNumber,j]
grid[rowNumber,j]=temp1
temp1=temp2
next j
next i
end procedure
Note: within solutions, allow for columns to be referenced first
eg grid[i,rowNumber]

29
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


d Mark Band 3–High Level (7-9 marks) 9 AO1
The candidate demonstrates a thorough knowledge and Modern encryption is many orders stronger than that
understanding of modern encryption and the difference AO1.1 used in a pre-computer era.
between symmetric and asymmetric encryption. The (2) Asymmetric encryption uses different keys for
material is generally accurate and detailed. AO1.2 encryption and decryption.
(2) Symmetric encryption uses the same key for encryption
The candidate is able to apply their knowledge and AO2.1 and decryption.
understanding directly and consistently to the context (2) Asymmetric encryption algorithms tend to involve more
provided. Evidence/examples will be explicitly relevant AO3.3 processing than symmetric algorithms.
to the explanation. (3)
AO2
The candidate provides a thorough discussion which is Modern encryption can be used without specialist
well balanced. Evaluative comments are consistently knowledge. Often users may not even be aware their
relevant and well-considered. data is being encrypted (e.g. HTTPS, messaging
systems)
There is a well-developed line of reasoning which is Asymmetric encryption is often used when exchanging
clear and logically structured. The information data.
presented is relevant and substantiated. For example credit card details over the internet.
Symmetric encryption is best suited when the same
Mark Band 2-Mid Level (4-6 marks) person is encrypting and decrypting.
The candidate demonstrates reasonable knowledge For example when backing up data.
and understanding of modern encryption and the
difference between symmetric and asymmetric
encryption; the material is generally accurate but at AO3
times underdeveloped. The strength and ease of use of encryption has made it
widely used on the Internet.
The candidate is able to apply their knowledge and E-Commerce would not be possible without it.
understanding directly to the context provided although Governments are no longer able to easily crack
one or two opportunities are missed. encrypted messages they intercept (as far as we know).
Evidence/examples are for the most part implicitly This gives individuals unprecedented levels of privacy
relevant to the explanation. But also means those communicating for nefarious
purposes can do so undetected.

2018 MS Ends Here

30
2019 Mark Scheme
H446/01 Mark Scheme June 2019

c i 2 Accept any sensible representation of True or False


AO1.2

1 Mark for first 2 rows, 1 Mark for second 2


rows.

ii -P going into not Gate 3


-S going into AND gate…
-…NOT P going into AND gate, L coming out AO3.1
of it and no additional gates or connections.
(1 per -, max 3)

d − more than one processing unit in a 2


(single) processor
− …which can independently process AO1.1
instructions at the same time.
2 a (The process of) making a file smaller/take up 1
less storage
AO1.1
2019 MS Starts Here
b Full answer CCCMMMCCCC 2

− CCC AO1.2
− ... followed by MMMCCCC
(1 per -, max 2)
H446/01 Mark Scheme June 2019

c 4C1O3L5C1M1O5C 3 Accept answer without 1s

− 4C1O AO1.2
− Followed by 3L5C
− Followed by 1M1O5C
d − Correct function name and parameter 5 E.g.
AND the function returns a value. function longest(sequence)
− Use of a loop to correctly iterate AO3.2 currentRun = 0
through the sequence biggestRun = 0
− Adds one to a running total when a C is for i = 0 To sequence.length - 1
encountered if sequence.substring(i, 1) == "C" then
− -when character changes from a C if currentRun = currentRun + 1
running total is > maximum, overwrites else
maximum… if currentRun > biggestRun then
− …correctly reset running total biggestRun = currentRun
end if
1 mark per -, max 5 currentRun = 0
endif
next i
return biggestRun
endfunction

3 a Input Output 3
1 1
2 4 AO3.3 Ignore Q3
3 9
1 per row, max 3
b Squares a number / multiplies a number by 1
itself AO3.3
c − The value 16 is copied to the MAR 2
− The contents of the of the ACC (i.e. 9)
are copied to the MDR AO2.2
− The value 9 is copied to location
16/count
1 per -, max 2
H446/01 Mark Scheme June 2019

7 a − Ensuring that changes are consistent 3


across a database
− if a record is removed all references to AO1.1
it are removed (2)
− A foreign key value must have a AO2.1
corresponding Primary key value in (1)
another table.

− In this case, a user being removed will 2017 MS Continues Here


result in their reviews being removed/ a
restaurant being removed will result in
its reviews being removed.
(1 mark per -, max 2 marks for explanation)
b i − A device which provides a central point 1
of control/access AO1.1

ii − Client side processing can be modified 2


− And can sometimes be disabled on the AO2.1
browser (1)
− To prevent malicious code (such as an AO2.2
SQL injection/XSS) (1)
− To prevent a non-validated review (one
with a score of over 5) being sent to
the server

(1 mark per -, max 2)


c − A transaction/review can only fully 2
complete or not complete / cannot AO1.1
partially complete (1)
− In this case, it should not be possible AO2.1
for the review to be added without the (1)
(average) rating being updated.

(1 mark per -, max 2)


H446/01 Mark Scheme June 2019

d − Consistency 3
− Isolation AO1.1
− Durability
(1 mark per -, max 3)
e Advantage 2
− More characters can be represented AO1.2
− may include foreign alphabets
− may include emojis

Disadvantage
− Reviews take up more storage (4 times
their previous storage size).

(1 mark max for advantage, 1 mark max for


disadvantage.)
8 a 30 goes into 100 3 times/3 1
AO3.3 Ignore Q8
b integer 1
AO1.2
c Boolean 1
AO1.2
d String 1
AO1.2
e − Calculates remainder 2 remainder = 100 – (num*count)
− Displays remainder AO3.2 print(remainder)

OR

(1 mark per -, max 2) remainder=(100 MOD num)


print(remainder)
2019 MS Continues Here
H446/01 Mark Scheme June 2019

11 a Mark Band 3–High Level (7-9 marks) 9 HTML…


The candidate demonstrates a ..they understand how to write (i.e. define the structure of ) web pages.
thorough knowledge and AO1.1 CSS..
understanding of the technologies (2) … they understand how to define the formatting of websites.
required for web development. The AO1.2 JavaScript...
material is generally accurate and (2) ..they understand how to write client side code
detailed. AO2.1 …allowing them to add interactivity to the website
(2)
The candidate is able to apply their AO3.3
knowledge and understanding directly (3) Understanding of HTML/CSS and JavaScript is essential for the role. Without knowing
and consistently to the context HTML it is impossible to handcode webpages.
provided. Evidence/examples will be Whilst WYSIWYG tools exist these often produce inefficient code and at any rate it will
explicitly relevant to the explanation. be necessary at some point to hand tweak the code. (As the role is ‘programmer’ it is
reasonable to expect that the site will be coded.)
The candidate provides a thorough
discussion which is well balanced. CSS is nearly as essential. Whilst HTML can be used for a lot of the formatting, this is
Evaluative comments are consistently considered bad practice. CSS will allow them to make consistent looking sites.
relevant and well-considered.
JavaScript is also essential as most websites have an interactive element (e.g.
There is a well-developed line of validation of forms)
reasoning which is clear and logically
structured. The information presented Knowledge of Server-side processing/PHP/ASP etc…
is relevant and substantiated. …allowing them to write dynamic websites.
This is important if the company wants to produce websites with content that changes
Mark Band 2-Mid Level (4-6 marks)
The candidate demonstrates
reasonable knowledge and
understanding of the technologies Databases…
required for web development; the …allowing them to allow websites to store and retrieve data.
material is generally accurate but at Some knowledge of databases will be useful if writing dynamic sites. This will largely
times underdeveloped. be focussed around SQL.

The candidate is able to apply their


knowledge and understanding directly
to the context provided although one or Photo editing…
two opportunities are missed. …allowing them to prepare images for the website.
Evidence/examples are for the most This is less essential as in many cases the assets will be pre-prepared. A basic
H446/01 Mark Scheme June 2019

part implicitly relevant to the knowledge (e.g. resizing would be expected).


explanation.
Knowledge of software engineering practices…
The candidate provides a sound …allowing them to work as part of a team when building the website.
discussion, the majority of which is The importance of this will depend on the size of the team working on the site.
focused. Evaluative comments are for
the most part appropriate, although May mention more advanced technologies e.g. AJAX, SOAP, JSON etc.
one or two opportunities for
development are missed.

There is a line of reasoning presented


with some structure. The information
presented is in the most part relevant
and supported by some evidence.

Mark Band 1-Low Level (1-3 marks)


The candidate demonstrates a basic
knowledge of the technologies required
for web development; the material is
basic and contains some inaccuracies.
The candidate makes a limited attempt
to apply acquired knowledge and
understanding to the context provided.

The candidate provides a limited


discussion, which is narrow in focus.
Judgments if made are weak and
unsubstantiated. The information is
basic and communicated in an
unstructured way. The information is
supported by limited evidence and the
relationship to the evidence may not be
clear.

0 marks
No attempt to answer the question or
response is not worthy of credit.
H446/01 Mark Scheme June 2019

b − The head contains information about 2


the page and needed to set the page AO3.3
up
− Orville’s Oranges is displayed in the
title bar/tab of the page.
− The page is linked to the style sheet
mainStyle.css
(1 per -, max 2)
c .offer{ 2 Accept div. offer
AO3.2 Accept hex/RGB codes that would provide a shade of orange.
border-style: solid;
Closing ; is optional
border-color: orange;
}

2019 MS Ends Here


H446-01 Mark Scheme November 2020
Level 2
Level 3

2020 Mark Scheme


Question Answer Mark Guidance
1 (a) i • Client computers connect to server 3
• Server provides access to a resource/service
• In this case hotel staff use client computers to AO1.2
connect to database on server (or other sensible
example).

ii e.g. 2
• only one point of failure
• easier to manage users/access AO1.1
• Easier to backup
• Easier to keep data secure.
• Technicians can more easily remotely install /
monitor.

(b) • Joins computers/devices together on a LAN 3


• Receives packets/data
• Recipient’s address is given in packet header/it AO1.1
uses the mac address
• Send packets/data
• Out the correct port /to the specific computer
device
H446-01 Mark Scheme November 2020

(c) Mark Band 3–High Level (7-9 marks) 9 AO1


The candidate demonstrates a thorough knowledge Malware and viruses are software that can have a negative impact
and understanding of network security. The material AO1.1 on computer systems
is generally accurate and detailed. (2) Spyware and keyloggers can record information entered and send
AO1.2
(2) back to a third party
The candidate is able to apply their knowledge and AO2.1 Phishing attacks attempt to steal data by fraudulently appearing as
understanding directly and consistently to the (2) legitimate emails asking for secure information
context provided. Evidence/examples will be AO3.3 Denial of Service Attacks can overload a computer system with
(3)
explicitly relevant to the explanation. traffic and effectively disable access for legitimate users

The candidate provides a thorough discussion which


is well balanced. Evaluative comments are AO2
consistently relevant and well-considered. Hotel’s systems could be disrupted by DDOS attacks so no external
bookings able to be made.
There is a well-developed line of reasoning which is Phishing and spyware attacks may compromise visitor security and
clear and logically structured. The information result in financial loss
presented is relevant and substantiated. Malware, viruses could destroy hotel data
Theft of customer data would be an issue under Data Protection Act
Mark Band 2-Mid Level (4-6 marks) / GDPR for which the hotel could be prosecuted
The candidate demonstrates reasonable knowledge
and understanding of network security; the material AO3
is generally accurate but at times underdeveloped. Education for staff and customers is important to deal with
recognising and dealing with threats
The candidate is able to apply their knowledge and Up to date software, limitations of use of devices such as USB sticks
understanding directly to the context provided and restricted access to wireless networks can all limit risks.
although one or two opportunities are missed. Use of Firewall to restrict traffic entering and leaving the network.
Evidence/examples are for the most part implicitly Should be balanced against customer experience; will customers
relevant to the explanation. return if they have no access to It facilities?

The candidate provides a sound discussion, the


majority of which is focused. Evaluative comments
are for the most part appropriate, although one or
two opportunities for development are missed.

There is a line of reasoning presented with some


structure. The information presented is in the most
part relevant and supported by some evidence.
H446-01 Mark Scheme November 2020
iii • Hashing for security 4
• …e.g. hash passwords in database
• …to make sure they cannot be read if they AO1.2
(2)
are stolen AO2.2
• Hashing for direct access (2)
• …e.g. Customer/Room/Booking records can
be quickly accessed
• …by using hash of index as address
(e) • Database/relationships are consistent // each 2 Accept example that is not related to the database given (as this is
foreign key links to an existing/valid primary an AO1 question)
key AO1.1
(1)
• Suitable example of being broken (e.g. if AO1.2
primary key is deleted/updated, foreign keys (1)
are no longer valid / changes should be
cascaded)

You might also like