0% found this document useful (0 votes)
52 views

Computer Science Topic 1.2 Questions

Uploaded by

BXR Studios
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Computer Science Topic 1.2 Questions

Uploaded by

BXR Studios
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Computer Science OCR A Level

1.2 Software and software development

Topic Questions

1.2.1 Systems Software


1.2.2 Applications Generation
1.2.3 Software Development
1.2.4 Types of Programming Language
TOTAL MARKS - /107
Time Allowed - 1 Hour 57 Minutes

Questions from 2017-2020


I won’t include every paper as you should save some questions for past papers
Although you can still do 2017-2020 papers even if you do this topic paper.

This document is to help consolidate knowledge and review topics after learning the
content. A time has been given if you want to time yourself you don’t need to and you
should do at your own pace if you wish. The time adds roughly 10 minutes extra just like
the exam. Aim for a mark a minute if doing this timed.

Some Questions may overlap with other topics. If you don’t know the
knowledge for that overlap question or cannot be asked just skip it.
I don’t have OCR ExamBuilder so I cannot do much about overlap questions
(same applies with the mark scheme at the end of the document)

Not all topics can be covered given the timeframe of papers I have used so it is still up to
you to go through the specification and practice content from the other papers.
2017 Questions 20
10 A software development team is writing a word game.

The team is using Rapid Application Development.

(a) Describe the Rapid Application Development process.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

Players are given 10 random letters and asked to find the largest word they can make from those
letters. Each letter can only be used once. The length of the word determines the number of points
awarded. e.g. a word with 6 letters would mean 6 points are awarded.

The function validateAnswer takes in the randomLetters as an array of letters and the
player’s answer as a string. It then checks if the word the player has entered only contains letters
from the 10 random letters with each letter being used only once. (At this stage the program
doesn’t check if the answer provided is an actual word.) It then returns a score, out of 10, for a
valid word or 0 for an invalid word.

Example

If the random letters are

OPXCMURETN

The word COMPUTER returns 8

Whereas

The word POST returns 0 (there is no S in the random letters).

And

The word RETURN returns 0 (there is only one R in the random letters).

© OCR 2017
21
(b) Complete the function validateAnswer

function validateAnswer(answer, randomLetters[])

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

endFunction

[6]

(c) Code is to be added to check if the word is an actual English word. All English words are
stored in a binary search tree.

Give one advantage of storing the words in a binary search tree over an array.

.............................................................................................................................................. [1]

© OCR 2017 Turn over


22
(d) The software team use a prebuilt library to create the Graphical User Interface.

(i) Give two advantages to the software team of using a library.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................
[2]

© OCR 2017
23
(ii)* The program is compiled. Explain the process of compilation including how code from
the library becomes part of the finished program, justifying why each stage is necessary.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [9]

© OCR 2017 Turn over


2018 Questions 4
(iii) Write code in a high-level language or pseudocode that has the same functionality as the
code in Fig. 1.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(iv)* Discuss the differences between assembly code and high-level languages. You should
refer to:
• the advantages and disadvantages of writing programs in assembly code rather
than a high-level language
• when each approach might be used
• why the coffee machine was programmed in assembly code.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

© OCR 2018
...................................................................................................................................... [9]
5
2 A software company decides to build an operating system for OCR smart watches.

(a) Memory management is one of the functions of an operating system.

(i) List three functions, other than memory management, of an operating system.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

Part of a computer’s memory is represented below (Fig. 2). The operating system divides the
memory into equally sized chunks.

Fig. 2

(ii) State the name of the type of memory management used in Fig. 2.

...................................................................................................................................... [1]

(iii) The operating system needs to load program C into memory but there is not enough
space. Describe how the operating system would use virtual memory to load program C.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© OCR 2018 Turn over


6
(b) The company sets up a website to promote the watch. Part of the website is shown below.
The sentence ‘Download The Factsheet’ is a hyperlink to the file factsheet.pdf which is stored
in the same folder as the HTML file for the webpage.

Features
The new OCR Smart Watch:
1. Uses the CB2 RISC processor for long battery life
2. Stores up to 20hrs of music
3. Tracks fitness
Download The Factsheet

(i) Write the HTML to produce the extract from the webpage above. You can assume it will
be placed within the <body> tags of a pre-existing page. You do not need to specify the
font.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [5]

© OCR 2018
7
(ii) Explain what happens when a search engine indexes the page. You do not need to
discuss ranking.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(iii) Explain why using a RISC processor rather than a CISC processor is likely to result in
increased battery life.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© OCR 2018 Turn over


15
7 A taxi firm is investigating replacing its drivers with self-driving cars.

(a) Explain why the self-driving system will use a real-time operating system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© OCR 2018 Turn over


2019 Questions 15
6 A company makes anti-virus software.

Anti-virus software is an example of a utility.

(a) Define the term ‘utility’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) State how an application differs from a utility.

...................................................................................................................................................

.............................................................................................................................................. [1]

In order to keep up to date with the latest virus threats, the company is continually updating their
software.

The programmers use an Extreme Programming approach when developing the updates.

(c) Explain what is meant by Extreme Programming and why it is a suitable approach in this
case.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© OCR 2019 Turn over


16
(d) Explain why the programmers of anti-virus software may make use of virtual machines when
developing the updates.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

When running the anti-virus software, an operating system uses a scheduling algorithm to
determine an allocation of CPU time to the anti-virus software.

(e) Explain why a First Come First Served scheduling algorithm would not be suitable in this
situation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

In the late 1990s the CIH virus hit headlines because it was able to overwrite and destroy the
contents of a computer’s BIOS.

(f) Describe what the effect would be of a computer having its BIOS overwritten.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© OCR 2019
19
8 A simple program is shown below.

//Program to calculate number of times

//a number goes into 100

count = 0

num = int(input("Enter a number"))

while (count*num)<=100

count=count+1

endwhile

count=count-1 //Take one off as gone over

print(str(num) + " goes into 100 " + str(count) + " times.")

Fig. 8.1

(a) State the output of the program when the number 30 is entered.

...................................................................................................................................................

.............................................................................................................................................. [1]

(b) State the most suitable data type of the variable count

...................................................................................................................................................

.............................................................................................................................................. [1]

(c) State the data type of the result of the expression (count*num)<=100

...................................................................................................................................................

.............................................................................................................................................. [1]

(d) State the data type of the result of the expression

str(num) + " goes into 100 " + str(count) + " times."

...................................................................................................................................................

.............................................................................................................................................. [1]

© OCR 2019 Turn over


20
(e) Write extra code so the program also displays the remainder.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

The program is compiled. The first stage is Lexical Analysis.

(f) Referring to examples in the code in Fig. 8.1, explain what happens in Lexical Analysis.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(g) State the name of the stage of compilation that directly follows Lexical Analysis.

...................................................................................................................................................

.............................................................................................................................................. [1]

© OCR 2019
2020 Questions 19

..........................................................................................................................................................

..........................................................................................................................................................
Ignore This 12
..........................................................................................................................................................
Marker Start Below
..........................................................................................................................................................

..........................................................................................................................................................

................................................................................................................................................... [12]

9 (a) Imogen buys a desktop computer. It comes with an operating system installed.

(i) Describe two ways that an operating system could manage physical memory.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]

(ii) Explain one benefit of memory management to the user.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(iii) Describe how virtual memory allows a user to run programs when physical memory is
full.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]
© OCR 2020 Turn over
20
Operating systems make use of device drivers.

(b) Define what is meant by the term ‘device driver’, giving one example of a device driver that a
home user would need.

Definition ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Example ....................................................................................................................................

...................................................................................................................................................
[3]

Operating systems usually come with utility software pre-installed.

(c) Give two examples of utility software, explaining the purpose of both.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© OCR 2020
21
(d) Imogen installs a compiler for a high-level programming language onto her computer and
makes use of an open source IDE (Integrated Development Environment).

(i) State what is meant by the term ‘open source software’.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Give one benefit to Imogen of using an open source IDE rather than a closed source
IDE.

...........................................................................................................................................

...................................................................................................................................... [1]

© OCR 2020 Turn over


22
(e) When Imogen creates programs in a high-level language, she makes use of libraries.

(i) Explain what is meant by a library, giving one example of when one may be used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(ii) Describe one advantage of the use of library files to programmers.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(iii) Describe one disadvantage of the use of library files to programmers.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(iv) Explain how linkers are used during the compilation process.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

END OF QUESTION PAPER

© OCR 2020
2017 Mark Scheme
H446/01 Mark Scheme June 2017

c i JavaScript 1 Cao do not accept Java

(AO1.1)

ii - Change line if(hour>9 && hour<17) … 1 Accept Change ‘greater than’ to ‘great than or equal to’ or similar
… To
if(hour>8 && hour<17) (1 Mark) (AO3.3)
or
… if(hour>=9 && hour<17) (1 Mark)

iii - i - Won’t work if JavaScript is disabled. (1) 1


i
- Shows incorrect message if user’s computer’s (AO2.2)
clock is wrong/in different time zone. (1)

- (Source) code is visible allowing it to be


copied/modified. (1)

(Max 1)

10 a - - Prototype is created (1) 4

- (Evaluated and) feedback used to inform next (AO1.1)


iteration (1) 2017 MS starts here
- Any changes are made (1)

- Process repeated until…(1)

… prototype becomes final product. (1)

(Max 4)

18
H446/01 Mark Scheme June 2017

b - - Function traverses every letter of answer (1) 6 i=0

- Function traverses every randomLetters (1) (AO3.2) while i<answer.length


- Correctly checks each letter of answer against j=0
each of randomLetters (1)
letter=answer.substring(i,1)
- Returns 0 if answer contains a letter that doesn’t
occur in randomLetters (1) while j<10 and randomLetters[j]!=letter
- Returns 0 if letter occurs more times in answer j=j+1
than randomLetters (1)
endwhile
- Returns answer length for a valid word.(1)
if j<10 then

randomLetters[j]=”!”

else

return 0

endif

i=i+1

endwhile

return answer.length

c - BS Tree can be searched quicker than an array. 1 Accept O(log n) search time rather than O(n)

(AO1.2)

19
H446/01 Mark Scheme June 2017

di - i Saves time/money as prewritten (1) 2


i
Draws on expertise of other programmers (1) (AO1.2)

Pre-tested (so likely to work) (1)

Can have been written in a different language (1)

(Max 2)

dii - Mark Band 3–High Level (7-9 marks) AO1.1 Points may include but are not limited to:
The candidate demonstrates a thorough
knowledge and understanding of how source (2) AO1 Knowledge and Understanding
code is compiled and library code incorporated.
The material is generally accurate and detailed. AO1.2 The compiler is effectively a group of programs.
The candidate is able to apply their knowledge (2) The stages of compilation are: lexical analysis, syntax analysis, code
and understanding directly and consistently to the
generation and optimisation.
context provided. Evidence/examples will be AO2.1
explicitly relevant to the explanation.
A linker is then used to combine the object code with the library code to
(2)
The candidate provides a thorough discussion make the final executable.
which is well balanced. Evaluative comments are AO3.3
consistently relevant and well-considered. AO2.1 Application
(3)
There is a well-developed line of reasoning which Source code is input into a compiler program.
is clear and logically structured. The information 9
presented is relevant and substantiated. The first stage is lexical analysis in which..

Mark Band 2-Mid Level (4-6 marks) Comments and whitespace are removed
The candidate demonstrates reasonable
knowledge and understanding of how source Variables, and subroutines stored in symbol table
code is compiled and library code incorporated;
the material is generally accurate but at times Which also holds data such as scope and data type
underdeveloped.
Code is converted to a series of tokens
The candidate is able to apply their knowledge
and understanding directly to the context The series of tokens and symbol table is passed onto the next stage, syntax

20
H446/01 Mark Scheme June 2017

provided although one or two opportunities are analysis:


missed. Evidence/examples are for the most part
implicitly relevant to the explanation. Here the code is checked to ensure it follows the rules of the language.

The candidate provides a sound discussion, the This is often accomplished by placing the tokens into a (abstract syntax)
majority of which is focused. Evaluative tree.
comments are for the most part appropriate,
although one or two opportunities for Where it breaks the rules of the language errors are generated.
development are missed.
If no rules are broken then it’s passed on to the next stage…
There is a line of reasoning presented with some
structure. The information presented is in the ..Which is code generation.
most part relevant and supported by some
evidence. Here the object code (accept machine code) is created.
Mark Band 1-Low Level (1-3 marks) (i.e. the binary that is executed by the processor)
The candidate demonstrates a basic knowledge
of how source code is compiled and/or library This code may be inefficient..
code incorporated; the material is basic and
contains some inaccuracies. The candidate .. it may contain unnecessary instructions or groups of instructions that can
makes a limited attempt to apply acquired
be replaced by simpler ones.
knowledge and understanding to the context
provided.
Code from the library is likely already compiled.
The candidate provides a limited discussion
And may well have been written in a different language to the main
which is narrow in focus. Judgments if made are
weak and unsubstantiated. The information is program.
basic and communicated in an
unstructured way. The information is supported The main program source code will have contained lines importing the
by limited evidence and the relationship to the library code.
evidence may not be clear.
A program called a linker can incorporate the code from the library with the
0 marks main program…
No attempt to answer the question or response is …into a single executable file.
not worthy of credit. An alternative approach is for the main executable to link to the compiled
library code (i.e. dynamic linking).

AO3.3 Evaluation
Lexical analysis is necessary to put the code into a format which can be

21
H446/01 Mark Scheme June 2017

read and processed (i.e. parsed) by the syntax analyser.

Syntax Analysis is necessary to ensure the code is valid in as much as it


meets all the structural rules of the language. This guarantees it will run
(though it might not do as expected and may still have occurrences of run-
time errors).

Code generation is necessary to turn the code into a format that the
processor can understand (i.e. binary machine code).

The code optimisation whilst not necessary, does ensure the code runs
quicker or using less memory.

2017 MS Stops Here Linking is necessary to ensure the library code is incorporated into the final
program.

11 a - 3

(AO1,1)

XOR Gate (1)

AND Gate (1)

Correct connections and no additional gates (1)

22
2018 Mark Scheme
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


iii - Takes in a value from user. 3 Do not credit structured English
- If value is 5 or less it shows green (AO 3.2) Example
- Otherwise it shows Red
value = input("Enter a Value")
(1 Mark per -, max 3) if value <=5 then
print("GREEN")
else
print("RED")
endif

Accept equivalents to <=5 (e.g. <6)


For Green/Red (or 1/0) accept any pseudocode
equivalent (GreenLightOn(), Output 1, print(1) Output
Green etc.) as long as the logic is correct.

12
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


iv Mark Band 3–High Level (7-9 marks) 9 AO1
The candidate demonstrates a thorough knowledge Assembly code uses mnemonics to represent machine
and understanding of assembly code and high level AO1.1 code instructions/opcodes.
languages. The material is generally accurate and (2) High level languages use more natural/mathematical
detailed. AO1.2 notation.
(2) Assembly code consists of simple instructions
The candidate is able to apply their knowledge and AO2.1 As such many more lines of assembly code are
understanding directly and consistently to the context (2) required to perform the same task as a few lines of a
provided. Evidence/examples will be explicitly relevant AO3.3 high level language.
to the explanation. (3) Assembly code is specific to the instruction set of a
given processor. High Level languages are not
The candidate provides a thorough discussion which is architecture specific.
well balanced. Evaluative comments are consistently
relevant and well-considered. AO2
Assembly code allows the programmer to choose the
There is a well-developed line of reasoning which is exact instructions so they can write code that is highly
clear and logically structured. The information efficient.
presented is relevant and substantiated. It also allows them to have direct control of how
Mark Band 2-Mid Level (4-6 marks) memory is used via addressing modes.
The candidate demonstrates reasonable knowledge Direct control of hardware.
and understanding assembly code and high level High level language compilers have optimisers that can
languages; the material is generally accurate but at also try and do this (and in some cases may outperform
times underdeveloped. a human writing in assembly code).

The candidate is able to apply their knowledge and As high level code is more intuitive and easier to read it
understanding directly to the context provided although is easier to follow, debug and build as part of a team. It
one or two opportunities are missed. can also be written in a much shorter time frame.
Evidence/examples are for the most part implicitly The high level code can be recompiled for different
relevant to the explanation. architectures.
High level languages come in a variety of paradigms so
The candidate provides a sound discussion, the programmers can choose according to the
majority of which is focused. Evaluative comments are problem/their preference.
for the most part appropriate, although one or two
opportunities for development are missed. AO3
Assembly language is best suited to situations such as:

13
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


There is a line of reasoning presented with some -compilers or interpreters don’t exist for the target CPU
structure. The information presented is in the most part i.e. embedded systems
relevant and supported by some evidence. -highest possible performance is critical
-memory is very limited.
Mark Band 1-Low Level (1-3 marks) For larger projects which don’t fall under the
The candidate demonstrates a basic knowledge constraints above high level languages are likely to be
assembly code and high level languages; the material preferable.
is basic and contains some inaccuracies. The
candidate makes a limited attempt to apply acquired
knowledge and understanding to the context provided.

The candidate provides a limited discussion which is


narrow in focus. Judgments if made are weak and
unsubstantiated. The information is basic and
communicated in an
unstructured way. The information is supported by
limited evidence and the relationship to the evidence
may not be clear.

0 marks
No attempt to answer the question or
response is not worthy of credit.

14
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


2 a i - Provide a (user) interface 3 If candidate names utility software, allow BP6
- Manage hardware/peripherals (AO1.1)
- Manage CPU usage / handles interrupts
- Provide security
- Provide platform to run other software
- Provide utilities for system maintenance
(1 Mark per -, Max 3)

ii Paging 1
(AO1.1)
iii - Operating system uses area of secondary storage 3
as virtual memory. (AO2.1)
- Move unused pages/parts (of program A and/or
B) into virtual memory
- Load program C into (physical) memory.
(1 Mark per -, Max 3)

15
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


b i - Tags to make “Features” a heading (accept h1, 5 For making Features a heading only accept strong/b if
h2, h3 etc.) (AO3.2) accompanied by code to increase font size.
- Correct use of ol
- Correct use of li tags <h1>Features</h1>
- Use of <a tag Around the text “Download the The new OCR Smart Watch:
Factsheet” <ol>
- correct use of href=”factsheet.pdf” <li>Uses the CB2 RISC processor for long
(1 Mark per -, max 5) battery life</li>
<li>Stores up to 20hrs of music</li>
<li>Tracks fitness</li>
</ol>
<a href="factsheet.pdf">Download The
Factsheet</a>

Li close tags are optional


ii - A program called a spider/crawler/bot 3
- Traverses the web / following the links. (AO2.1)
- It takes each word in the document
- …It adds an entry for the page (under the word) in
the index…
- …alongside the word’s position on the page.
(1 Mark per -, Max 3)
iii - RISC has a smaller instruction set (than CISC) 3
- Requires fewer transistors / less complex circuitry (AO1.2)
- Means less power is required.
(1 Mark per -, Max 3)

16
H446/01 Mark Scheme June 2018

Question Answer Mark Guidance


7 a - Needs to be able to respond instantly to 3
changes… (AO1.2)
- …such as someone stepping in front of car (or
other sensible example)
- RTOS offers a guaranteed response time.
- A non RTOS might be busy dealing with other 2018 MS ends here
tasks and not respond until it is too late.

(1 Mark per -, Max 3)


b i - Created Obstacle object called bollard 2 Examples
- Has put the correct arguments in, in the correct (AO3.2) bollard=new Obstacle(false, 7.8, 8)
order. Obstacle bollard = Obstacle(false, 7.8, 8);
(1 Mark per -, Max 2) bollard=Obstacle(False, 7.8, 8)

Do not penalise for use of self parameter as used by


languages such as Python.

ii -The attribute distance is private… 2


-…and therefore updated with the method update (AO3.2)
distance

24
2019 Mark Scheme
H446/01 Mark Scheme June 2019

determine which data structure is suitable.


Overall a hash table is likely to be the best option (assuming it has enough space and a
There is a line of reasoning presented with good hashing algorithm which produces a hash quickly and with few collisions).
some structure. The information presented is It will give very consistent performance even as the whitelist grows.
in the most part relevant and supported by
some evidence.
Mark Band 1-Low Level (1-4 marks) NB Big O Notation isn’t necessary for full marks as it is paper 2 content (though many
The candidate demonstrates a basic of the more able candidates are likely to include it). The question is assessing
knowledge of storing and retrieving data from candidate’s knowledge of traversing and adding to the two data structures and their
hash tables or linked lists; the material is basic ability to analyse this to determine their suitability for the scenario.
and contains some inaccuracies. The
candidate makes a limited attempt to apply
acquired knowledge and understanding to the
context provided.

The candidate provides nothing more than an


unsupported assertion.

The information is basic and communicated in


an unstructured way. The information is
supported by limited evidence and the
relationship to the evidence may not be clear.
0 marks
No attempt to answer the question or
response is not worthy of credit.
6 a − A program with one purpose/piece of 2
system software AO1.1
− …used for the upkeep/maintenance of 2019 MS Starts here
the system
(1 per -, max 2)
b − Application performs tasks for the user 1
(rather than computer). AO1.2
− Performs generic (rather than specific)
tasks

c − Extreme programming is a software 4


H446/01 Mark Scheme June 2019

development methodology. AO1.1


− Focus is on good quality code (2)
− It is an agile paradigm AO2.1
− it is designed to allow development to (2)
respond to changing user
requirements.
− Involves paired programing
− Program is regularly reviewed/iterative
process.

Suited to this scenario as…

− Types of virus/threat is continually


changing/updating
− In order to detect virus effectively there
needs to be an emphasis on code
quality.

(1 per – Max 4. If no reason given for it being


suitable for scenario, max 3)
H446/01 Mark Scheme June 2019

d - Allows them to run the update on a 3


number of different systems/OSs AO2.2
- …without needing multiple physical
machines.
- They can put viruses on the VM to test
if the update can catch them
- …but protect the physical machine
from the virus/the VM can quickly be
reset to its original state.
(1 per -, Max 3)
e − FCFS means jobs are completed in the 2
order they arrive AO2.2
− ineffective in catching viruses/the virus
may run first
− …the virus checker may never run/take
a long time to start running
− the virus checker may be continuously
running…
− …this will temporarily stall the system/
all other processes have to wait.
(1 mark per -, max 2)
f − The computer would not be able to 2
boot/load the OS AO2.1
− Or set up its initial
configuration/hardware checks
− Making the computer unusable
(1 mark per -, max 2)
H446/01 Mark Scheme June 2019

d − Consistency 3
− Isolation AO1.1
− Durability
(1 mark per -, max 3)
e Advantage 2
− More characters can be represented AO1.2
− may include foreign alphabets
− may include emojis

Disadvantage
− Reviews take up more storage (4 times
their previous storage size).

(1 mark max for advantage, 1 mark max for


disadvantage.)
8 a 30 goes into 100 3 times/3 1
AO3.3 2019 MS continues here
b integer 1
AO1.2
c Boolean 1
AO1.2
d String 1
AO1.2
e − Calculates remainder 2 remainder = 100 – (num*count)
− Displays remainder AO3.2 print(remainder)

OR

(1 mark per -, max 2) remainder=(100 MOD num)


print(remainder)
H446/01 Mark Scheme June 2019

f − The comments such as those on the 3


first line, (and whitespace) are AO2.2
removed.
− Variable names/identifiers like ‘count’
are added to a symbol table.
− Reserved words/statement
components are tokenized. For
example ‘WHILE’
(1 mark per -, max 3)
g Syntax analysis 1
AO1.1 2019 MS stops here
9 Mark Band 3–High Level (7-9 marks) 9 The materials and fuel used in producing and transporting computers has an
The candidate demonstrates a environmental impact.
thorough knowledge and AO1.1
understanding of the effect of (2) Digital devices have short life spans and are quickly disposed of…
computers on the environment. The AO1.2 They often end up in landfill or are sent to less economically developed countries to be
material is generally accurate and (2) dismantled due to the value of some of the materials inside them.
detailed. AO2.1 These devices are often made up of toxic materials (such as mercury)
(2) These can harm people disposing of the waste and damage/pollute the area in which
The candidate is able to apply their AO3.3 they are buried/burned.
knowledge and understanding directly (3)
and consistently to the context People have many digital devices. These all need powering/charging.
provided. Evidence/examples will be This means there is an increase in demand for electricity.
explicitly relevant to the explanation. Which means an increase in fossil fuel being burned.

The candidate provides a thorough


discussion which is well balanced. Computers are being used to automate the use of things like central heating.
Evaluative comments are consistently This can reduce electricity consumption
relevant and well-considered.
Computers have encouraged a paperless approach…
There is a well-developed line of ..both in the workplace and in terms of companies sending bills to homes
reasoning which is clear and logically This has the potential to reduce the use of paper and as such destruction of trees.
structured. The information presented
is relevant and substantiated. Developments in digital storage has reduced the need for physical media to be
produced (e.g. CD, DVDs etc)
Mark Band 2-Mid Level (4-6 marks) This reduces the need for using plastics.
2020 Mark Scheme
H446-01 Mark Scheme November 2020
Question Answer Mark Guidance
9 (a) i • Paging 4
• …blocks of memory of equal size / fixed size
• Segmentation AO1.2
• …blocks of memory split logically /variable size
ii e.g. 2
• Security
• …does not let programs access memory reserved AO1.2
for other programs.
• Multitasking
• ...allows multiple programs to run at once
iii • (Currently unneeded) pages moved from memory to 2
secondary storage
• …to create room in memory AO1.1
• pages moved back to memory when required
(b) • Software/program 3 Max two for description, Max one for example
• …that allows the operating system to communicate
with hardware AO1.1
(1)
Examples: AO2.1
• Printer driver (2)
• Webcam driver
• Sound card driver
• Graphics card driver etc.
(c) e.g. 4 Mark in pairs, 2 marks per example.
• Encryption
• …scrambles meaning of data files with a key AO1.1 Accept other sensible examples of utility software.
• Defragmentation
• …organises file segments on secondary storage
• Compression
• … reduces size of files
• Backup
• …makes regular copies of files in case of loss
• Disk Checker
(d) i • Source code / program code is freely available 2
• …to edit/amend recompile.
AO1.1
H446-01 Mark Scheme November 2020
ii e.g. 1 Do not accept simply seeing the code (previous
• Can modify code and adapt IDE to her needs question).
AO2.1
• Is likely to be financially free of cost.
• Can recompile to work on different systems
• Has the benefit of a community potentially
improving the system
• Can learn from others
• Can ensure no backdoors / malware
(e) i • Sections of code / program file 3 Maximum 2 for definition, 1 for example
• Written by other authors / already written
• Containing useful routines AO1.1
(2)
• Suitable example (e.g. GUI routines, database AO2.1
access routine, encryption, graphics) (1)
ii • Save time… 2
• …because no need to rewrite code
• Use expertise of others.. AO1.2
• …to complete tasks that require specialist
knowledge / abstract away complexity.
• Has already been tested/the programmer doesn’t
have to test it themselves
• Making debugging easier/saving time

iii • May (significantly) increase size of compiled file… 2


• …as library contains many routines that aren‘t being
used. AO1.2
• Not written by the programmer
• …so introduces uncertainty / require further testing /
programmer needs to spend time familiarising
themselves with it
iv • Links the main program to libraries 3 Accept terms static and dynamic for bullets 2 and 3, but
• ..can either include them in the final executable \ only if these are explained.
code AO1.2
• ..or get the executable code to point to the external
libraries

You might also like