Edexcel Computer Science IGCSE Revision Paper
Edexcel Computer Science IGCSE Revision Paper
MOCK PAPER 1:
You must have: Total Marks
A computer workstation with appropriate programming
language code editing software and tools, including a code
interpreter/compiler, CODES folder containing code files,
and pseudocode command set (enclosed)
Instructions
• Use black ink or ball-point pen.
• Fill in the boxes at the top of this page with your name,
• Answer all questions.
centre number and candidate number.
• Carry out practical tasks on the computer system and save new or amended
the examination.
• Do not overwrite the original code and data files provided to you.
code using the name given in the question with the appropriate file extension.
• The CODES folder in your user area includes all the code files you need.
• The invigilator will tell you where to store your work.
Advice
• Read each question carefully before you start to answer it.
• Save your work regularly.
• Check your answers if you have time at the end. Turn over
*P69298A0116*
Siva - 777 77 77 88
Answer all questions.
0 1 . 3 State the largest denary number that can be represented using 6 bits.
[1 mark]
0 1 . 4 Add together the following three binary numbers and give your answer in binary.
[2 marks]
0 0 1 1 0 1 1 0
1 0 0 1 0 0 1 0
+ 0 0 1 0 0 0 0 1
0 1. 5 Apply a binary shift three places to the right on the bit pattern 10101000
Siva - 777 77 77 88
0 2 . 1 Complete the truth table for the OR logic gate.
[2 mark]
A B A OR B
0 0
1 0
0 2 . 2 A green light (G) in the game switches on if all of the following conditions are true:
• sensor D is off
• sensor L is off
• sensor W is on.
7
Write a Boolean expression for this logic circuit.
G=
0 2 . 3 Describe what is meant by the terms system software and application software.
[2 marks]
System software
Application software
Siva - 777 77 77 88
0 3 Programming languages can be classified as low-level or high-level.
Shade two lozenges to show the statements that are true about code written using a
low-level language instead of a high-level language.
[2 marks]
Siva - 777 77 77 88
0 4 . 1 State two reasons why computers have more RAM than cache memory.
[2 marks]
0 4 . 3 Many new computers use solid-state storage for secondary storage rather than
magnetic storage.
Siva - 777 77 77 88
0 4 . 5 Figure 1 shows a 10 x 8 bitmap image that uses three colours.
Figure 1
Calculate the minimum file size that would be required to store the bitmap image in
Figure 1.
Siva - 777 77 77 88
0 5 Analogue sound must be converted to a digital form for storage and processing in a
computer.
Siva - 777 77 77 88
0 6 Computer networks can be installed using wired or wireless technology.
0 6 . 1 State one wireless method used to connect devices on a Personal Area Network
(PAN).
[1 mark]
0 6 . 2 Describe two differences between a Local Area Network (LAN) and a Wide Area
Network (WAN).
[2 marks]
Siva - 777 77 77 88
0 6 . 4 Shade one lozenge to indicate the application layer protocol used for sending emails
from a client device to a mail server.
[1 mark]
A FTP
B HTTP
C SMTP
D UDP
0 6 . 6 State two issues with only using usernames and passwords in an authentication
system.
[2 marks] 15
0 6 . 8 State two reasons why automatic software updates provide better security than
manual software updates.
[2 marks]
Siva - 777 77 77 88
0 7 . 1 Explain what penetration testing is.
[2 marks]
2
6
Figure 2
MISSISSIPPI
1M 1I 2S 1I 2S 1I 2P 1I
Explain why RLE is not a suitable method for compressing the data in
Figure 2.
[2 marks]
Siva - 777 77 77 88
0 8 . 1 The cost and physical size of RAM and secondary storage are normally different.
State two other things that are managed by the operating system.
[2 marks]
0 8 . 3 Main memory is any form of memory that is directly accessible by the CPU, except for
cache and registers.
Siva - 777 77 77 88
0 9 . 1 State which layer of the TCP/IP model each of the network protocols operates at by
ticking one box in each row of Table 1.
[4 marks]
Table 1
HTTP
UDP
IP
IMAP 8
Siva - 777 77 77 88
1 0 . 1 Explain how each of the following cyber security threats could be used by a student to
gain unauthorised access to a school network:
In your answer you should also describe some possible consequences of these
threats.
[8 marks]
Siva - 777 77 77 88
Siva - 777 77 77 88
1 0 . 2 Shade one lozenge to show which statement best describes the definition of the term
‘social engineering’.
[1 mark]
Describe two methods a school could use to protect its staff and students from
phishing.
[4 marks]
13
Siva - 777 77 77 88