June 2020 QP - Paper 2 AQA Computer Science GCSE
June 2020 QP - Paper 2 AQA Computer Science GCSE
Surname
Forename(s)
Candidate signature
I declare this is my own work.
GCSE
COMPUTER SCIENCE
Paper 2 Written Assessment
Advice
For the multiple-choice questions, completely fill in the lozenge alongside the appropriate answer.
CORRECT METHOD WRONG METHODS
If you want to change your answer you must cross out your original answer as shown.
If you wish to return to an answer previously crossed out, ring the answer you now wish to select as
shown.
*Jun208520201*
IB/G/Jun20/E14 8520/2
2
Do not write
outside the
Answer all questions. box
Answer
Answer
*02*
IB/G/Jun20/8520/2
3
Do not write
outside the
0 1 . 5 Give two reasons why hexadecimal is often used instead of binary in computer box
science.
[2 marks]
0 2 . 1 Add together the following three binary numbers and give your answer in binary.
0 1 0 1 0 1 0 1
0 1 1 0 1 1 0 0
+ 0 0 0 1 1 0 0 1
[2 marks]
0 2 . 2 State the result, in binary, of performing a binary shift two places to the left on the
binary value 00111001
[1 mark]
11
Turn over ►
*03*
IB/G/Jun20/8520/2
4
Do not write
outside the
0 3 . 1 What is the largest decimal number that can be represented using 6 bits? box
[1 mark]
Answer
0 4 . 2 A student has recorded a 30 second digital sound track using a sample rate
of 44 000Hz. 8 bits have been used to store each sample taken.
Answer kB
*04*
IB/G/Jun20/8520/2
5
Do not write
outside the
0 5 . 1 Shade one lozenge to show which statement best describes data compression. box
[1 mark]
The process of encoding information to try and use fewer bits than the
C
original.
0 5 . 3 State the feature of data that allows it to be compressed effectively using RLE.
[1 mark]
0 5 . 4 Describe how RLE works. In your answer you must use an example.
[2 marks]
14
Turn over ►
*05*
IB/G/Jun20/8520/2
6
Do not write
outside the
0 6 Shade three lozenges to show which of the following are essential components of the box
A BIOS
B Control unit
C Keyboard
D Memory
E Movement sensor
F Multiple cores
G Network socket
H Shared bus
0 7 . 1 Main memory is any form of memory that is directly accessible by the CPU, except for
cache and registers.
*06*
IB/G/Jun20/8520/2
7
Do not write
outside the
0 7 . 2 The cost and physical size of RAM and secondary storage are normally different. box
State two other things that are managed by the operating system.
[2 marks]
10
Turn over ►
*07*
IB/G/Jun20/8520/2
8
Do not write
outside the
0 9 Figure 1 shows a Huffman tree that has been created to represent the string shown box
in Figure 2.
Figure 1
Figure 2
0 9 . 1 Use the Huffman tree in Figure 1 to state the Huffman encoding for the string MOST
[3 marks]
M O S T
*08*
IB/G/Jun20/8520/2
9
Do not write
outside the
0 9 . 2 A student was asked to describe how a Huffman tree could be created for the string box
“I would count the number of times each character appears in the string and create a
frequency table sorted alphabetically. For example, the letter S has the highest
frequency in Figure 2. Next I would take the two characters with the largest
frequencies and combine them into a new node. The new node would be added to
the end of the frequency table. The two characters with the lowest remaining
frequencies are now combined into a new node and the process is repeated until all
the characters have been added to nodes and the tree created.”
0 9 . 3 When the Huffman tree in Figure 1 is used, the string in Figure 2 can be represented
using 130 bits.
The 36-character string shown in Figure 2 could also be encoded using ASCII.
How many bits are saved when Huffman coding is used rather than ASCII to
represent the string shown in Figure 2?
Answer 9
Turn over ►
*09*
IB/G/Jun20/8520/2
10
Do not write
outside the
1 0 . 1 Define the term ‘computer network’. box
[2 marks]
*10*
IB/G/Jun20/8520/2
11
Do not write
outside the
box
Turn over ►
*11*
IB/G/Jun20/8520/2
12
Do not write
outside the
1 0 . 3 State which layer of the TCP/IP model each of the network protocols operates at by box
HTTP
UDP
IP
IMAP 15
*12*
IB/G/Jun20/8520/2
13
Do not write
outside the
1 1 . 3 Explain how each of the following cyber security threats could be used by a student to box
In your answer you should also describe some possible consequences of these
threats.
[8 marks]
Turn over ►
*13*
IB/G/Jun20/8520/2
14
Do not write
outside the
box
*14*
IB/G/Jun20/8520/2
15
Do not write
outside the
1 1 . 4 Shade one lozenge to show which statement best describes the definition of the term box
‘social engineering’.
[1 mark]
Describe two methods a school could use to protect its staff and students from
phishing.
[4 marks]
17
Turn over ►
*15*
IB/G/Jun20/8520/2
16
Do not write
outside the
1 2 A healthcare publication contains the following article. box
Explain two potential legal and/or ethical impacts of using implanted microchips in
healthcare.
[4 marks]
*16*
IB/G/Jun20/8520/2
17
Do not write
outside the
box
END OF QUESTIONS
*17*
IB/G/Jun20/8520/2
18
Do not write
outside the
There are no questions printed on this page box
*18*
IB/G/Jun20/8520/2
19
Do not write
outside the
box
Question Additional page, if required.
number Write the question numbers in the left-hand margin.
*19*
IB/G/Jun20/8520/2
20
Do not write
outside the
box
Question Additional page, if required.
number Write the question numbers in the left-hand margin.
Copyright information
For confidentiality purposes, all acknowledgements of third-party copyright material are published in a separate booklet. This booklet
is published after each live examination series and is available for free download from www.aqa.org.uk.
Permission to reproduce all copyright material has been applied for. In some cases, efforts to contact copyright-holders may have
been unsuccessful and AQA will be happy to rectify any omissions of acknowledgements. If you have any queries please contact the
Copyright Team.
*206G8520/2*
*20*
IB/G/Jun20/8520/2