0% found this document useful (0 votes)
24 views23 pages

Exam Practise Booklet - Unit 1

WASDWADWQ

Uploaded by

18jobrien
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views23 pages

Exam Practise Booklet - Unit 1

WASDWADWQ

Uploaded by

18jobrien
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

GCSE Computer Science (9-1)

J277/01 – Computer Systems


(Exam Practise Booklet)
Name: ………………………………………………….

© OCR 2017. You may photocopy this page. Page 1 of 23 Created in ExamBuilder
1. Here are some statements about the CPU of a computer.
Tick one box in each row to show whether each of the following statements is true or false.

Statement True False


CPU stands for Central Processing Unit.
The CPU fetches and decodes instructions.
The speed of a CPU is usually measured
in GigaHertz (GHz).
If a CPU has many cores, this slows down the
computer.
The hard disk drive is part of the CPU.
[5]

2(a). A microwave oven is controlled by a small, specially built CPU.

The table below shows some CPU instructions and what they mean.

CPU instruction Meaning


00001000 00010100 Add 20 to the timer
00001000 00000001 Add 1 to the timer
00000100 00000001 Subtract 1 from the timer

Using examples from the instructions above, state what is meant by:

i. an opcode

[2]

ii. an operand

[2]

iii. The time displayed on the microwave oven is represented as two 8-bit binary numbers, one
for the minutes and one for the seconds.

For example;
“8:20” is stored as 00001000 00010100
“15:45” is stored as 00001111 00101101

© OCR 2017. You may photocopy this page. Page 2 of 23 Created in ExamBuilder
(b). Show how the time 5:30 will be stored.

[2]

(c). 00001000 00010100 can represent either the instruction for “Add 20 to the timer” or the data
for the time “8:20”.

Explain how the CPU can determine whether it represents an instruction or data.

[1]

3(a). Dipesh is thinking of buying a tablet computer to replace his old desktop computer.

Describe how the CPU and RAM work together to enable the tablet computer to operate.

[3]

(b). The tablet computer also uses cache memory. Describe the purpose of cache memory.

[2]

4(a). Quinn's current computer specification is shown in Fig. 4.

© OCR 2017. You may photocopy this page. Page 3 of 23 Created in ExamBuilder
Fig. 4

Describe the benefits of a dual core processor over a single core processor.

[2]

(b). Quinn is considering upgrading the RAM.

i. Describe two differences between RAM and ROM.

Difference
1

Difference
2

[4]

© OCR 2017. You may photocopy this page. Page 4 of 23 Created in ExamBuilder
ii. Quinn has decided to upgrade the RAM on his computer. Explain why this would
improve the computer's performance.

[2]

iii. *After upgrading the RAM, Quinn could make further changes to improve his computer's
performance.

Identify the changes and explain how these changes would improve performance.

The quality of your written communication will be assessed in your answer.

© OCR 2017. You may photocopy this page. Page 5 of 23 Created in ExamBuilder
[6]

5(a). The A computer sometimes uses virtual memory.

Describe what is meant by virtual memory and state why it is needed.

[3]

(b). A computer has 1024 megabytes of RAM.

State two items that will be stored in the RAM.

© OCR 2017. You may photocopy this page. Page 6 of 23 Created in ExamBuilder
2

[2]

6. Bob's computer has 512 kilobytes of ROM and 8 gigabytes of RAM.

i. Describe the purpose of the ROM in Bob's computer.

ii. Describe the purpose of the RAM in Bob's computer.

[4]

7. Apu has a handheld e-book reader that allows him to store and read electronic books.

Types of secondary storage devices are magnetic, optical or solid state.

© OCR 2017. You may photocopy this page. Page 7 of 23 Created in ExamBuilder
i. State which type of storage is most suitable for storing the electronic books inside the e-
book reader.

[1]

ii. Explain one reason why this type of storage is the most suitable.

[2]

8. Most computer systems use at least one storage device.

Explain one reason why a secondary storage device is needed in most computer systems.

[2]

9. A computer has 1024 megabytes of RAM.

How many gigabytes of RAM does the computer have?

[1]

10(a). Zoe is organising a LAN-party. Her friends will each bring a computer to the party so that they
can play games against each other.

Describe what is meant by a Local Area Network (LAN).

[2]

© OCR 2017. You may photocopy this page. Page 8 of 23 Created in ExamBuilder
(b). Zoe plans to use the star topology in the LAN.

Describe the star topology.

You may use a diagram.

[2]

(c). State two other topologies that can be used when creating a LAN.

2
[2]

11(a). A company, OCR Supermarkets, has supermarket stores throughout the country. The
computers for each store connect to the central office using a Wide Area Network (WAN).

Identify two differences between a WAN and a LAN (Local Area Network).

Difference
1:

Difference
2:

[2]

© OCR 2017. You may photocopy this page. Page 9 of 23 Created in ExamBuilder
(b). OCR Supermarkets use a client-server network to connect the checkout computers to the
store's server.

Describe two benefits to OCR Supermarkets of using a client-server network instead of a


peer-to-peer network.

Benefit
1:

Benefit
2:

[4]

12. A bank uses a local area network to connect all the computers in its head office.

Computers in the network can be identified using both IP addresses and MAC addresses.

Describe two differences between IP addresses and MAC addresses.

[4]

13. A school has all of its computers in a local area network (LAN).

State two benefits of a LAN.

1
© OCR 2017. You may photocopy this page. Page 10 of 23 Created in ExamBuilder
2

[2]

14. Apu has a handheld e-book reader that allows him to store and read electronic books.

The manufacturer of the e-book reader provides proprietary software, which Apu can use to
transfer the e-book from the CD-ROM to the e-book reader.

i. Describe what is meant by proprietary software.

[2]

ii. Explain one advantage to the manufacturer of providing proprietary software instead of
open source software.

[2]

15. *Lauren is a Computing teacher. She is building a website for her Computing class where they
can share ideas, send each other programs and discuss computing concepts. The students will
have individual accounts that they can log into.

Discuss the ethical and legal issues Lauren will have to consider when setting up the website.

The quality of your written communication will be assessed in your answer.

© OCR 2017. You may photocopy this page. Page 11 of 23 Created in ExamBuilder
[6]

16(a). Security on a computer can be provided directly by the operating system or by using utility
programs.

Utility programs include antivirus, file transfer, firewall and system clean-up.

State which two of these utilities can be used for security.

[2]

(b). Identify and describe two methods by which the operating system can provide additional
security directly.

© OCR 2017. You may photocopy this page. Page 12 of 23 Created in ExamBuilder
[4]

17. Amin buys a new computer with an operating system and some utilities.

State two functions of the operating system.

[2]

END OF QUESTION paper

© OCR 2017. You may photocopy this page. Page 13 of 23 Created in ExamBuilder
Mark scheme
Question Answer/Indicative content Marks Guidance

Tru Fals
Statement
e e
CPU stands for Central

Processing Unit
The CPU fetches and

decodes instructions
The speed of a CPU is Examiner's Comments
usually measured in ✓
1 5
GigaHertz (GHz) This question was generally well answered.
If a CPU has many
cores, this slows down ✓
the computer
The hard disk drive is

part of the CPU

One mark per row

Total 5

 (Part of the instruction which) specifies the


operation to be carried out
The answer must refer specifically to the operation to be
2 a i  e.g. 00001000 = add to timer / 00000100 = 2
carried out and not the instruction as a whole.
subtract from timer

 (Part of the instruction which) supplies the


data / address / value needed for an operation
 e.g. the number to be added / subtracted from
ii 2 For data, accept number / integer.
the timer / numerical example from the table
(00010100 or 00000001)

00000101 00011110
b 2 All 8 bits must be correct for each byte.
1 mark per byte

 Instructions and data are fetched at different Award the mark for:
points of the fetch execute cycle
c  Instructions and data are kept in separate parts 1  The program counter points to the address of
of the memory (by the operating system) instructions


Total 7

3 a  Instructions / programs(currently running) / data 3 If the candidate has described the functions of RAM and
are stored in the RAM… the CPU separately, only award the 2nd bullet if it is
 these are fetched from the RAM by the CPU / clearly stated that instructions are fetched from RAM.

© OCR 2017. You may photocopy this page. Page 14 of 23 Created in ExamBuilder
Processor
 … where the instructions are executed /
Mention of the fetch – execute cycle in the CPU is
instructions are processed / data is processed
enough to award bullet 3.

 To store instructions / data that is frequently


used / previously used / next to be used
b  Data does not need to be fetched from RAM 2
 Speeds up access

Total 5

MUST have given splitting tasks, or multi-tasking to allow


speed
2 from

 Tasks can split between the processors…


 …tasks / processes / software / can be Faster can only be given a mark if the first bullet(s) have
processed faster been given.
 …more processes completed per second
Examiner's Comments
4 a 2
 Allows multitasking /
Run more than one process / task / instruction / This question was answered fairly well, candidates were
data at a time / per clock cycle… able to express that two processes could be carried out at
 … tasks / processes / software / can be once, and they then often got a second mark for
processed faster identifying that this made it faster. Some candidates could
 …more processes completed per second not clearly express what was being processed, or simply
stated that it was faster which was insufficient as the
actual processes are not carried out faster, it is faster
because it is completing two processes at the same time.

Max 2 per difference, 1 for RAM, 1 for ROM e.g.

o RAM is volatile
o ROM is non-volatile Do not allow e.g. ROM is not for 2nd mark. Mark in pairs

Examiner's Comments

o RAM stores currently running This question was answered well, with candidates able to
instructions / programs / express the differences between RAM and ROM,
b i 4
applications / OS / data although many candidates gave a full description of one
o ROM stores boot-up instructions / in the first difference space, and a full description of the
bios second in the second difference space. Candidates
should be writing both sides of the difference in the given
space. Some candidates only gave one side of the
difference, or did not full describe both sides.
 RAM can be changed
 ROM (normally) cannot be changed

ii 2 from 2

 More instructions / programs / applications can Examiner's Comments


run at the same time / be held in RAM
 Open software faster / respond faster Many candidates were able to identify that virtual memory

© OCR 2017. You may photocopy this page. Page 15 of 23 Created in ExamBuilder
 More memory space for current programs
 Run more memory intensive programs /
relevant example e.g. computer games / would be relied on less. Fewer candidates could identify
graphic rendering that more programs could be open at once, a common
 reduces use of Virtual Memory error was that the computer could store more data or
 …..less use of hard drive which is slower to more programs which was referring to secondary storage.
access

iii e.g. 6 High Level Response (5–6):


Several upgrades are identified and there is a detailed
o Increase processor clock speed explanation of how each of these will impact the computer
o Run more FE cycles per second given in the example.
o Faster response There will be few if any errors in spelling, grammar and
o Smoother actions punctuation. Technical terms will be used appropriately
o Less likely to freeze and correctly.

o Add more cores


o Run more tasks simultaneously Medium Level Response (3–4):
o Better performance for programs Upgrades are identified, although how these would

that are programmed for multi-core improve the performance may be weak. There may be

systems occasional errors in spelling, grammar and punctuation.


 E.g. new computer Technical terms will be mainly correct.

games
o Increase cache size Low Level Response (1–2):
o Cache stores frequently used There is an attempt to identify upgrades that could be

instructions / programs / data made. There may be little or no explanation of how these
o Can store more so increase access improve performance. The points are poorly expressed or

speed to more frequently used are not related to the context. There is limited, if any, use

instructions / programs / data of technical terms. Errors in grammar, punctuation and


spelling may be intrusive.

Allow defragmentation and reducing the read time for the

 New graphics card hard disk.

 Can carry out more processes for CPU Do not allow hard drive if referring to secondary storage

 Can improve speed and quality of graphics size, allow for increasing amount of VM.

 Change hard disk drive to SSD Do not allow:


 faster read / write speed
 Increasing RAM
 Upgrading components that do not affect
performance (e.g. peripherals)

Examiner's Comments

This question was answered well by the majority of


candidates, who were able to give a structured response.
Most candidates could identify a number of different
improvements that could be made. A small number of
candidates did not answer the question, and gave a
description of how RAM improvers the computer,

© OCR 2017. You may photocopy this page. Page 16 of 23 Created in ExamBuilder
repeating their response to Q.6(b)(ii). Some candidates
described hardware that would not affect the
performance, such as using a touch screen and adding a
printer.

Total 14

Note that these points may be worded differently. E.g.


“items are taken from memory and stored on the hard
disk until needed” achieves the first two bullet points.
 Using the hard disk / secondary storage
 Used as RAM / to store the contents of RAM / Examiner's Comments
main memory
5 a 3
 Needed when there isn't enough physical Where candidates had explicitly studied the use of virtual
memory memory, they were able to give a detailed description to
gain 2 or 3 marks in this part. A number of candidates
appeared to be guessing the answer, the most common
wrong answers confusing virtual memory with cloud
storage.

Accept examples for the second and third bullet points as


long as it is clear that the programs / data are currently in
use
 Operating system
 Other programs that are running / in current Accept instructions for programs
b use 2
 Data in current use Examiner's Comments

The most common error made by candidates was that


they did not specify that programs and data/files are in
RAM while they are in use.

Total 5

Examiner's Comments
ROM

Many candidates demonstrated a good knowledge of


 Stores the boot program / bootstrap loader /
facts about the RAM and ROM, but some of these failed
6 i BIOS 4
to score well by being less discerning about the facts that
 Used to start the computer / Loads the
are relevant to answering the question. This part asked
operating system.
for the purpose of ROM and RAM, but several candidates
listed the characteristics.

RAM

 Stores the parts of the OS / programs that are


running…
ii
 Stores the data currently in use
 … for access by the CPU

(2 for each)

Total 4

 Solid state
7 i 1

© OCR 2017. You may photocopy this page. Page 17 of 23 Created in ExamBuilder
No follow through from (i). Candidates need to identify a
 Fast access…
relevant characteristic of solid state storage for the first
 … less delays when turning the device on /
mark, and expand by explaining why this is an advantage
turning pages etc…
in an e-book reader for the second mark.

Note that portable / capacity are not acceptable answers


here (as solid state storage is not particularly more
 No moveable parts / robust
portable / larger than other forms of storage for this
 … can be handled / manipulated / moved
application)
without damaging it

ii 2 Examiner's Comments

In this part, most candidates demonstrated an awareness


 Small / light enough…
of the key characteristics of different types of secondary
 … to fit within a hand held device
storage. The strongest candidates were able to clearly
link the characteristics of solid state storage to the
operational requirements of an e-book reader. Centres
should encourage candidates to answer such questions
 low power
positively, for example, by arguing why the characteristics
 … to extend battery life of reader
of solid state storage make it most suitable, rather than
why magnetic and optical storage are not suitable.

Total 3

Examiner's Comments

It was evident that a majority of the candidates did not


8 understand the term “secondary storage” and we suspect
that they guessed (rather than had been taught) that this
was some kind of backup storage medium in case the
hard drive failed, which is the answer that most gave.

 To store the files / e.g. operating system


 Even when the system is switched off / which
2
must be non-volatile.

Total 2

Accept 1.024
The units are not necessary
 1GB
9 1
Examiner's Comments

Was generally well answered.

Total 1

10 a  Computers are connected to each other 2 For the first bullet point candidates should be describing a
 Restricted to a small geographical area / site / network – just the idea that computers are connected to
other suitable example “something” is not enough.
 Dedicated wired or WiFi connections
For the third bullet point, just “connected by cables” is not
enough as there is no indication these are dedicated
cables for the network.

© OCR 2017. You may photocopy this page. Page 18 of 23 Created in ExamBuilder
Examiner's Comments

Required candidates to describe what is meant by a


Local Area Network, where one mark could be for
describing each of the concepts “local area” and
“network” in this context. Candidates who did not gain
both marks often reused these terms in their answers
instead of describing them.

Accept diagram which shows the points in the mark


scheme. Note that if the diagram is not annotated or
described one mark can still be given for the second
bullet point.
 One central hub / switch / router / server /
connection point
b  All computers / devices connected to this 2
Examiner's Comments
central point

Did not pose difficulties with most candidates although in


some cases, diagrams could have been more clearly
labelled.

Accept other standard names of topologies that are not


on the specification:

 – line, linear (only as an alternative for bus)


 – tree / hierarchical, mesh
 – hybrid
 – loop (only as an alternative to ring)

 bus
Do not accept serial or circle
c  ring 2

Examiner's Comments

This was also well answered – “bus” and “ring” are the
other two topologies specifically required by the
specification and this was the answer given by most
candidates. Some candidates gave the correct names of
other topologies not required by the specification and they
were duly credited for these alternative correct answers.

Total 6

11 a  WAN is over a large geographical area / needs 2 NB Examples of infrastructure / hardware are allowed for
to WAN e.g. satellite, phone lines, Internet
transmit over a large distance / Allow LAN as Ethernet for second bullet
a LAN is over a small geographical area.
 WAN uses external
hardware / infrastructure / cables / network / NOT wide area for WAN
LAN has its own
infrastructure / cables / network / hardware due Examiner's Comments

© OCR 2017. You may photocopy this page. Page 19 of 23 Created in ExamBuilder
Many candidates were able to correctly identify the
to distance / practicalities
difference in size between a WAN and a LAN. The better
candidates also identified the difference in hardware, or
ownership of the hardware used.

2 marks per benefit

E.g.

 All files can be stored centrally


 … so workers can access files from any
computer
 … all computers can update the central
database / file
 … Peer-to-peer files might be stored on their
own computers / spread across many
Do not allow:
computers
-easy to share data
-“more secure”
 Backups are central
 … all data is backed up each time
Examiner's Comments
 … individual computers do not need to backup
b 4
their own data
This question was not answered well, with few candidate
 … Peer-to-peer may need to perform their own
able to demonstrate an understanding of client-server
backups.
and peer-to-peer networks. The most common response
was the central storage of data, although this was often
 Monitor clients
not expanded to explain why this is a benefit.
 …to ensure they are working correctly

 Upgrade software centrally


 …so you do not have to install on each
computer individually
 Central security (antivirus / firewall)
 … do not need to install protection on all
computers
 …Peer-to-peer individual security may need to
be installed on individual computers

Total 6

12  IP addresses can be changed / are allocated 4 For bullets 3 and 4, accept answers where candidates
as needed refer to IPv6 being 16 bytes (128 bits). Award one mark if
 MAC addresses can't be changed / every candidates state that IP addresses and MAC addresses
device has a fixed MC address are of different size.

 IP(v4) addresses are 4 bytes long


 MAC addresses are 6 bytes long

 IP(v4) addresses are normally written in denary


 MAC addresses are normally written in Hex

 IP addresses are configured by software


 MAC addresses are configured in hardware

© OCR 2017. You may photocopy this page. Page 20 of 23 Created in ExamBuilder
 IP addresses are used for routing across a
WAN / internet
 MAC addresses are only used within the LAN

[marks in pairs, maximum 2 pairs]

Total 4

e.g. Examiner's Comments

 Can share files / can work collaboratively on This question was intended to be fairly straightforward –
same files standard answers for the advantages of having a network
 Can share hardware resources / suitable in a context in which most of them are familiar.
example Candidates who did not get full marks here either gave
13  Can access their files from any computer / 2 answers that were too vague such as “it allows the
classroom computers to communicate with each other” – which is
 Can work together from different computers just a definition of what a network does, not an advantage
using instant messaging – or they compared a LAN to a WAN. The weakest
 Centralised deployment of software to all candidates even tried their luck with very generic answers
computers like “it’s cheaper,” demonstrating little understanding of
the actual subject content being tested.

Total 2

The mention of a licence is not sufficient. Candidate


should state that the licence restricts copying / modifying /
distributing.
“closed source” is not enough because it just gives an
alternative term for “proprietary” without a description of
what we mean by “closed”

 Source code not made available/ Only Examiner's reports


compiled code is published
14 i  Licence restricts the copying / modifying / 2 This part was intended as a more difficult question to
distribution of the software differentiate the top candidates, was generally poorly
answered. It had been expected that more candidates
would be able to provide a definition of proprietary
software for part (i) but many candidates appeared
unfamiliar with the term in the context in which it is used
in the specification. For those who were aware of the
term, several common misconceptions were repeated
such as the idea that proprietary software is always sold
at a cost.

ii eg 2 The first mark is for identifying a relevant advantage to


the manufacturer, and the second for details expanding
 Stops competing companies copying their this point.
software (or hardware / ebooks)
 … and producing similar / better products. Accept answers about preventing reverse engineering the
 Ensures compatibility (with the e-book reader) company's product or piracy of the company's software or
… e-books (e.g. DRM) as referring to the first set of
 … as they can ensure that no modifications answers.

© OCR 2017. You may photocopy this page. Page 21 of 23 Created in ExamBuilder
Examiner's Comments

This part was intended as a more difficult question to


differentiate the top candidates and was generally poorly
answered. Because of the general misunderstanding of
have been made
the concept, and the necessity to apply it in this specific
context and give advantages to the manufacture of the e-
book reader in (ii), few candidates gained marks here. A
common incorrect answer suggested that the
(mark points in pairs).
manufacturer would benefit from selling the software to e-
book users, when it was indicated in the question that the
software is provided with the reader. Other incorrect
answers appeared to be making points from a previous
question about the use of open source software in
schools, which did not apply in this context.

Total 4

High Level Response (5–6):

A detailed discussion of the ethical andlegal issues, with


* Points may include: clear explanations that are linked to the scenario.
Legal There will be few if any errors in spelling, grammar and
punctuation. Technical terms will be used appropriately
 Data Protection Act and correctly.
 Rules of DPA
 Keeping data secure, need for firewall, anti- Medium Level Response (3–4):
virus A description of some ethical and / or legal issues with
 Methods of restricting access some explanation / justification. Material may not be
 Intellectual property / copyright / licences explicitly linked to the context. There may be occasional
errors in spelling, grammar and punctuation. Technical
Ethical terms will be mainly correct.

15  Storing and access to personal information 6 Low Level Response (1–2):


 Rules / terms set up before people can join There is an attempt to describe either a legal issue and /
 Consequences for misconduct e.g. or ethical issue. The points are poorly expressed and / or
cyberbullying not related to the context. There is limited, if any, use of
 Plagiarism technical terms. Errors in grammar, punctuation and
 Communication of inappropriate materials for spelling may be intrusive.
students / school / teacher
 Backing up to preserve / save data Examiner's Comments
 Gaining parental consent for communication
online The majority of candidates wrote a reasonable, structured
 E-safety response to this question. The most common legal issues
 Acceptable use policy identified were the Data Protection Act and copyright.
Some candidates found the ethical issues more difficult to
identify, and confused these with legal issues. The
responses given were often well contextualised to the
situation.

Total 6

16 a  antivirus 2

© OCR 2017. You may photocopy this page. Page 22 of 23 Created in ExamBuilder
 firewall

e.g.

 (User name and) password


 Only allows you to use the system if you are
authorised
Accept any security measure that is provided by the
operating system itself but not by standard utility
 Encryption
programs (even if the utility program is normally bundled
 Prevents hackers from understanding any data
with operating systems).
if accessed (e.g. passwords)
The first bullet is for identifying or a brief description of a
b 4 measure.
 Access rights
The second bullet is for a further more detailed
 To prevent files from being modified / deleted
description or a description of how the measure ensures
security.
 User access control
 Prevents users from making changes to the
Any reasonable biometrics is acceptable.
system

Marks in pairs

Total 6

e.g.

 Provides interfaces between user and


Examiner's Comments
computer / Determines look and feel of the
17 computer 2
This question was fairly well answered.
 Provides a platform for software to run
 Manages peripherals used by the system
 Manages memory

Total 2

© OCR 2017. You may photocopy this page. Page 23 of 23 Created in ExamBuilder

You might also like