100% found this document useful (1 vote)
770 views

Edexcel Computer Science IGCSE Revision Paper

The document provides instructions and questions for a mock computer science exam. It tests knowledge of binary, Boolean logic, computer hardware, computer networks, and digital audio. Questions cover topics like binary operations, truth tables, system and application software, low-level vs high-level programming, RAM vs cache memory, cloud storage, solid-state storage, bitmap images, sample resolution, personal area networks, local area networks, wireless networks, email protocols, and authentication.

Uploaded by

siva
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
770 views

Edexcel Computer Science IGCSE Revision Paper

The document provides instructions and questions for a mock computer science exam. It tests knowledge of binary, Boolean logic, computer hardware, computer networks, and digital audio. Questions cover topics like binary operations, truth tables, system and application software, low-level vs high-level programming, RAM vs cache memory, cloud storage, solid-state storage, bitmap images, sample resolution, personal area networks, local area networks, wireless networks, email protocols, and authentication.

Uploaded by

siva
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Please check the examination details below before entering your candidate information

Candidate surname Other names

Centre Number Candidate Number

Pearson Edexcel International GCSE (9–1)


Time 2 hours
Paper
reference 4CP0/01
Computer Science
 

MOCK PAPER 1:
You must have: Total Marks
A computer workstation with appropriate programming
language code editing software and tools, including a code
interpreter/compiler, CODES folder containing code files,
and pseudocode command set (enclosed)

Instructions
• Use black ink or ball-point pen.
• Fill in the boxes at the top of this page with your name,
• Answer all questions.
centre number and candidate number.

• Answer the questions requiring a written answer in the spaces provided


• Only one programming language (Python, C# or Java) must be used throughout
– there may be more space than you need.

• Carry out practical tasks on the computer system and save new or amended
the examination.

• Do not overwrite the original code and data files provided to you.
code using the name given in the question with the appropriate file extension.

• You must not use the internet during the examination.


Information
• The total mark for this paper is 85.
• The marks for each question are shown in brackets
• This paper covers Python, C# and Java.
– use this as a guide as to how much time to spend on each question.

• The CODES folder in your user area includes all the code files you need.
• The invigilator will tell you where to store your work.
Advice
• Read each question carefully before you start to answer it.
• Save your work regularly.
• Check your answers if you have time at the end. Turn over

*P69298A0116*
Siva - 777 77 77 88
Answer all questions.

0 1 . 1 Convert the binary number 11010100 into denary.


[1 mark]

0 1 . 2 Convert the binary number 10111001 into hexadecimal.

You should show your working.


[2 marks]

0 1 . 3 State the largest denary number that can be represented using 6 bits.
[1 mark]

0 1 . 4 Add together the following three binary numbers and give your answer in binary.
[2 marks]

0 0 1 1 0 1 1 0
1 0 0 1 0 0 1 0
+ 0 0 1 0 0 0 0 1

0 1. 5 Apply a binary shift three places to the right on the bit pattern 10101000

Give the result using 8 bits.


[1 mark]

Siva - 777 77 77 88
0 2 . 1 Complete the truth table for the OR logic gate.
[2 mark]

A B A OR B

0 0

1 0

0 2 . 2 A green light (G) in the game switches on if all of the following conditions are true:

• sensor D is off
• sensor L is off
• sensor W is on.
7
Write a Boolean expression for this logic circuit.

You must use Boolean expression operators in your answer.


[3 marks]

G=

0 2 . 3 Describe what is meant by the terms system software and application software.
[2 marks]

System software

Application software

Siva - 777 77 77 88
0 3 Programming languages can be classified as low-level or high-level.

Shade two lozenges to show the statements that are true about code written using a
low-level language instead of a high-level language.
[2 marks]

0 3 .1 A The code more closely resembles English.

B The code is easier to write.

C The code is not translated using a compiler.

D The code is quicker to write.

E The code can directly manipulate computer registers.

F The code never needs to be translated before being executed.

Assemblers and Compilers are two types of program translator.

0 3 . 2 State the purpose of an assembler.


[1 mark]

0 3 . 3 Explain how a compiler works.


[4 marks]

Siva - 777 77 77 88
0 4 . 1 State two reasons why computers have more RAM than cache memory.
[2 marks]

0 4 . 2 Data is increasingly being stored ‘in the cloud’.

State two advantages of using cloud storage instead of local storage.


[2 marks]

0 4 . 3 Many new computers use solid-state storage for secondary storage rather than
magnetic storage.

Explain why solid-state storage is not fitted to every new computer.


[2 marks]

0 4 . 4 How many bits are there in two kilobytes?

Show your expression only.


[2 marks]

Siva - 777 77 77 88
0 4 . 5 Figure 1 shows a 10 x 8 bitmap image that uses three colours.

Figure 1

Calculate the minimum file size that would be required to store the bitmap image in
Figure 1.

Give your answer in bytes.


11
Show your expresion only.
[3 marks]

Siva - 777 77 77 88
0 5 Analogue sound must be converted to a digital form for storage and processing in a
computer.

0 5 . 1 Define the term sample resolution.


[1 mark]

0 5 . 2 State one disadvantage of a high sample resolution.


[1 mark]

0 5 . 3 A 50-second sound has been recorded at a sample rate of 40 000 Hz.


Two bytes have been used to store each sample of the sound.

Calculate the file size of the sound file in megabytes.

Show your expression only.


[2 marks]

Turn over for the next question

Siva - 777 77 77 88
0 6 Computer networks can be installed using wired or wireless technology.

0 6 . 1 State one wireless method used to connect devices on a Personal Area Network
(PAN).
[1 mark]

0 6 . 2 Describe two differences between a Local Area Network (LAN) and a Wide Area
Network (WAN).
[2 marks]

0 6 . 3 Give three advantages of using a wireless network instead of a wired network.


[3 marks]

Siva - 777 77 77 88
0 6 . 4 Shade one lozenge to indicate the application layer protocol used for sending emails
from a client device to a mail server.
[1 mark]
A FTP
B HTTP
C SMTP
D UDP

0 6 . 5 Explain the purpose of the HTTPS protocol.


[2 marks]

0 6 . 6 State two issues with only using usernames and passwords in an authentication
system.
[2 marks] 15

0 6 . 7 Describe one security measure that could be used, in addition to a password, to


make sure that a user is who they are claiming to be.
[2 marks]

0 6 . 8 State two reasons why automatic software updates provide better security than
manual software updates.
[2 marks]

Siva - 777 77 77 88
0 7 . 1 Explain what penetration testing is.
[2 marks]

0 7 . 2 State two reasons why data are compressed.


[2 marks]

2
6

0 7 . 3 Figure 2 shows a string.

Figure 2

MISSISSIPPI

One method for compressing data is run length encoding (RLE).

When using RLE, the data in Figure 2 become:

1M 1I 2S 1I 2S 1I 2P 1I

Explain why RLE is not a suitable method for compressing the data in
Figure 2.
[2 marks]

Siva - 777 77 77 88
0 8 . 1 The cost and physical size of RAM and secondary storage are normally different.

Describe two other differences between RAM and secondary storage.


[2 marks]

0 8 . 2 An operating system manages the memory of a computer.

State two other things that are managed by the operating system.
[2 marks]

0 8 . 3 Main memory is any form of memory that is directly accessible by the CPU, except for
cache and registers.

Explain how main memory is used.


[3 marks]

Siva - 777 77 77 88
0 9 . 1 State which layer of the TCP/IP model each of the network protocols operates at by
ticking one box in each row of Table 1.
[4 marks]
Table 1

Network Application Transport Internet Link


Protocol layer layer layer layer

HTTP

UDP

IP

IMAP 8

0 9 . 2 Define the term ‘cyber security’.


[2 marks]

0 9 . 3 Define the term ‘malware’.


[2 marks]

Siva - 777 77 77 88
1 0 . 1 Explain how each of the following cyber security threats could be used by a student to
gain unauthorised access to a school network:

• weak and default passwords


• misconfigured access rights
• removable media
• unpatched and/or outdated software.

In your answer you should also describe some possible consequences of these
threats.
[8 marks]

Siva - 777 77 77 88
Siva - 777 77 77 88
1 0 . 2 Shade one lozenge to show which statement best describes the definition of the term
‘social engineering’.
[1 mark]

A The art of hacking a network to access confidential information.

B The art of hacking a network to access public information.

C The art of manipulating people so they give up confidential information.

D The art of manipulating people so they give up public information.

1 0 . 3 Phishing is a form of social engineering.

Describe two methods a school could use to protect its staff and students from
phishing.
[4 marks]

13

TOTAL FOR PAPER = 85 MARKS

Siva - 777 77 77 88

You might also like