0% found this document useful (0 votes)
67 views16 pages

AQA GCSE Computer Science Paper 2 QP

This document is a GCSE Computer Science Paper 2 written assessment from May 16, 2019, allowing 1 hour and 30 minutes for completion. It includes various questions on topics such as number conversion, CPU components, software types, network topologies, and malware categories, with a total of 80 marks available. Candidates are instructed to answer all questions in the provided spaces and not to use calculators.

Uploaded by

barain2018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views16 pages

AQA GCSE Computer Science Paper 2 QP

This document is a GCSE Computer Science Paper 2 written assessment from May 16, 2019, allowing 1 hour and 30 minutes for completion. It includes various questions on topics such as number conversion, CPU components, software types, network topologies, and malware categories, with a total of 80 marks available. Candidates are instructed to answer all questions in the provided spaces and not to use calculators.

Uploaded by

barain2018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Please write clearly in block capitals.

Centre number Candidate number

Surname

Forename(s)

Candidate signature

GCSE
COMPUTER SCIENCE
Paper 2 Written Assessment

Thursday 16 May 2019 Afternoon Time allowed: 1 hour 30 minutes


Materials For Examiner’s Use
There are no additional materials required for this paper. Pages Mark
2–3
Instructions
• Use black ink or black ball-point pen. Use pencil only for drawing. 4–5
• Answer all questions. 6–7
• You must answer the questions in the spaces provided.
8–9
• Do all rough work in this book. Cross through any work you
do not want to be marked. 10–11
• You must not use a calculator. 12–13
14–16
Information
• The total number of marks available for this paper is 80. TOTAL

Advice

For the multiple-choice questions, completely fill in the lozenge alongside the appropriate answer.
CORRECT METHOD WRONG METHODS

If you want to change your answer you must cross out your original answer as shown.
If you wish to return to an answer previously crossed out, ring the answer you now wish to select as
shown.

*jun198520201*
IB/G/Jun19/E8 8520/2
2

Do not write
outside the
Answer all questions in the spaces provided. box

0 1 . 1 Convert the decimal number 197 into binary.


[1 mark]

0 1 . 2 Convert the hexadecimal number A4 into decimal.

Show your working.


[2 marks]

Answer

0 2 . 1 What is the largest decimal number that can be represented using 5 bits?
[1 mark]

0 2 . 2 How many bits are there in 3 MB?

Show your working.


[2 marks]

Answer

*02*
IB/G/Jun19/8520/2
3

Do not write
outside the
0 3 State one advantage of using Unicode instead of using ASCII. box

[1 mark]

0 4 Which two of the following are components of a CPU?

Shade two lozenges.


[2 marks]

A Arithmetic logic unit

B Control unit

C Fan

D Hard disk drive

E Keyboard

F Power supply unit

0 5 A computer game is one type of application software. State two other types of
application software. You must not use brand names in your answer.
[2 marks]

Turn over for the next question

11

Turn over ►

*03*
IB/G/Jun19/8520/2
4

Do not write
outside the
0 6 Select the correct statement about secondary storage. box

Shade one lozenge.


[1 mark]

A Secondary storage is a type of ROM.

B Secondary storage is non-volatile.

C Secondary storage is temporary.

D Secondary storage loses its content when it is turned off.

0 7 Describe how an optical disk is read.


[4 marks]

*04*
IB/G/Jun19/8520/2
5

Do not write
outside the
0 8 The Huffman tree in Figure 1 was generated for the string ARE ALL STARS REAL box

Figure 1

0 8 . 1 Part of the string ARE ALL STARS REAL was incorrectly encoded as in Figure 2
below.

Figure 2

1111000010101011
What string does this encoding represent?
[1 mark]

0 8 . 2 What would be the correct binary encoding for the substring STAR?

Write the correct encoding below the letters in the table.


[2 marks]

S T A R

Turn over ►

*05*
IB/G/Jun19/8520/2
6

Do not write
outside the
0 9 Explain two reasons why software companies usually do not make their source code box

publicly available. Source code is the code they wrote to create the software.
[4 marks]

1 0 Define the term embedded system.


[2 marks]

*06*
IB/G/Jun19/8520/2
7

Do not write
outside the
1 1 . 1 Draw a simple diagram to show a star network topology containing four desktop box

computers.
[2 marks]

1 1 . 2 Draw a simple diagram to show a bus network topology containing four desktop
computers.
[2 marks]

Question 11 continues on the next page


10

Turn over ►

*07*
IB/G/Jun19/8520/2
8

Do not write
outside the
1 1 . 3 State two advantages of using a star topology instead of a bus topology. box

[2 marks]

1 1 . 4 State one disadvantage of using a star topology instead of a bus topology.


[1 mark]

1 1 . 5 Discuss the benefits and risks of using a computer network.


[9 marks]

*08*
IB/G/Jun19/8520/2
9

Do not write
outside the
box

1 1 . 6 Define the term network protocol.


[2 marks]

1 1 . 7 Which two of the following are email protocols?

Shade two lozenges.


[2 marks]

A FTP

B HTTP

C IMAP

D SMTP

E TCP

F UDP

16

Turn over ►

*09*
IB/G/Jun19/8520/2
10

Do not write
outside the
1 2 . 1 Explain why a firewall improves network security. box

[2 marks]

1 2 . 2 A company has decided to move its business online but it is concerned about making
sure that only authorised users can gain access to the system. The company has set
up a CAPTCHA system to check that the user is not a robot.

Explain three different electronic methods that could then be used to confirm user
identity.
[6 marks]

*10*
IB/G/Jun19/8520/2
11

Do not write
outside the
1 2 . 3 Penetration testing can be conducted as either black-box or white-box testing. box

Explain the difference between these two types of penetration testing.


[4 marks]

1 3 The four layers of the TCP/IP network model are shown below.

For each row in Figure 3, write the letter A, B, C or D that matches the description.

Each letter should only be used once.


[2 marks]

A Application layer
B Transport layer
C Internet layer
D Link layer

Figure 3

Description Letter

Addresses data for transmission

Sets up the communication between the two hosts

Where the network hardware is located

Where the user software, such as web browsers or email


programs, operates

14

Turn over ►

*11*
IB/G/Jun19/8520/2
12

Do not write
outside the
1 4 A virus is a specific category of malware. box

Describe three other different categories of malware.


[6 marks]

Malware 1

Malware 2

Malware 3

*12*
IB/G/Jun19/8520/2
13

Do not write
outside the
1 5 A burglar alarm sounds an alarm when it is armed (turned on) and the window or door box

is opened.

The truth table for this basic system is shown in Figure 4.

Figure 4

Armed (A) Door (B) Window (C) Alarm (Q)


0 = Off 0 = Closed 0 = Closed 0 = Off
1= On 1 = Open 1 = Open 1 = On
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1

Draw the logic circuit that represents the truth table in Figure 4. You must use the
correct symbols for logic gates. You may not need to use all the gates shown.
[3 marks]

Turn over ►

*13*
IB/G/Jun19/8520/2
14

Do not write
outside the
1 6 Specifications for two different devices are shown in Figure 5. box

Discuss the advantages and disadvantages of Device A compared to


Device B.

Your answer should explain the impact each advantage/disadvantage will have on the
operation of the device.

You should assume that any aspects of the specifications not mentioned in Figure 5
are the same for both devices.
[12 marks]

Figure 5

Device A Device B

Quad (4) core 1.6 GHz CPU with 8 MB Dual (2) core 3.9 GHz CPU with
cache 2 MB cache

16 GB RAM 4 GB RAM

2 TB Hard Disk Drive (HDD) 250 GB Solid State Drive (SSD)

*14*
IB/G/Jun19/8520/2
15

Do not write
outside the
box

Turn over ►

*15*
IB/G/Jun19/8520/2
16

Do not write
outside the
box

END OF QUESTIONS
12

Copyright information

For confidentiality purposes, from the November 2015 examination series, acknowledgements of third-party copyright material are published in a separate
booklet rather than including them on the examination paper or support materials. This booklet is published after each examination series and is available
for free download from www.aqa.org.uk after the live examination series.

Permission to reproduce all copyright material has been applied for. In some cases, efforts to contact copyright-holders may have been unsuccessful and
AQA will be happy to rectify any omissions of acknowledgements. If you have any queries please contact the Copyright Team, AQA, Stag Hill House,
Guildford, GU2 7XJ.

Copyright © 2019 AQA and its licensors. All rights reserved.

*196G8520/2*
*16*
IB/G/Jun19/8520/2

You might also like