Computer science
  • Exam boards
    • OCR past papers >
      • Paper1 (Sample)
    • Edexcel past papers >
      • 2020 Current spec (coming soon) >
        • Programming Language Subset (PLS)
      • Old 2016 SPEC >
        • Paper 1 (specimen1)
        • Paper 1 (specimen2)
        • Paper 1 (2018)
        • Paper 1 (2019)
        • Paper 2 (specimen1)
        • Paper 2 (2018)
        • Paper 2 (2019)
      • OLD 2013 SPEC >
        • Sample assessment 1 (old spec)
        • Sample assessment 2 (old spec)
        • June 2017 (old spec)
        • June 2016 (old spec)
        • June 2015 (old spec)
    • Paper 1 (by topic) >
      • Algorithms
      • Application software
      • Ascii
      • Binary
      • Cache
      • Client Server
      • Cloud
      • Compression
      • Computational thinking
      • CPU
      • Cyber security
      • Database
      • Fetch decode execute cycle
      • Embedded system
      • Encryption
      • File size
      • Flow chart
      • Hexadecimal
      • High Level language
      • ISP/Internet
      • Logic
      • Magnetic HDD
      • Networking
      • Open source
      • Operating system
      • Peer to peer
      • Images (Data representation)
      • Protocols
      • RAM
      • ROM
      • Run length encoding
      • Simulation software
      • Solid state HDD
      • Sound
      • Stored program concept
      • Utility software
    • Curriculum >
      • Binary
      • Hex
      • Data Representation
      • Compression
      • Encryption
      • What is a computer
      • How does a computer work
      • Hardware
      • Operating system
      • The CPU
      • Input devices
      • Data storage
      • Networks
      • Microcontrollers
      • Computational models
      • Emerging trends
      • Virtual machine
      • Models and simulators
      • Algorithms
    • Python >
      • Finding python
      • GCSE Python questions
      • Python coding >
        • Comments
        • Data types
        • Variables
        • If Else
        • If Elif Else
        • Functions
        • For loop
        • While loop >
          • While loop challenges
        • Data structures >
          • Looping thru 2D array
        • String slicing/indexing
        • Subprograms
        • Local/global variable
        • Validation and try
        • methods
        • File I/O
        • Pseudocode
        • Modules >
          • Turtle
        • Classes
        • NEA/Projects
  • KS3/Other
    • KS3 >
      • Online Safety >
        • Screen time
        • Online Safety questions
      • IT
      • Hardware >
        • All Hardware
        • Magnetic hard disk drive
        • Optical disk drive
        • Solid state drive
      • Software
      • Binary/Hex/Algorithms >
        • Binary
        • Binary explained
        • Hexadecimal - 1 digit
        • Hexadecimal - 2 digits
        • Algorithms
        • ASCII
        • Tests
      • Networks
      • Protocols/Cyber attacks
      • Logic >
        • CPU
        • AND gate
        • OR gate
        • NOT gate
        • Logical statements
      • Coding >
        • HTML
        • Scratch >
          • Scratch questions
        • Python >
          • Getting started
          • Functions
          • Variables
          • VariablesToo
          • inputs
          • Selection
          • Flowcharts
          • Data types
          • Pseudocode1
          • Pseudocode2
          • Subprogram1
          • Subprogram2
          • Coding challenges
    • BTEC CS
    • OCR GCSE CS >
      • Past paper JUNE 2015
      • Past paper June 2014
      • Past paper MAY 2012
      • Past paper JAN 2011
      • Past paper JUN 2011
    • AQA AS-Level CS >
      • AS Curriculum >
        • Multiple choice questions
    • Business studies >
      • Keywords
      • BS Revision - Multiple choice
      • Paper 1 (9-1)
      • Paper 2 (9-1)
  • Contact/More
    • Code editor
    • Contact us
    • Microbit ideas
    • More
  • Self test
    • 01 Random topics
    • 02 Programming
    • 03 Data
    • 04 Computers
    • 05 Networks
    • 06 Legal/Ethics/Enviro'
    • Coding/Programming

edexcel gcse computing

2016 spec - Paper 1
Picture

Edexcel GCSE Computing Paper 1 (2016 spec) exam paper can be downloaded here.



Edexcel GCSE Computing Paper 1 (2016 spec)  mark scheme can be downloaded here.

Picture
Picture
Picture
1A Answer
B - Simulation software

More help here - Simulation
Picture
1B answer
ROM / Read only memory

More help here - ROM
Picture
1C answer
B - Register

More help here - Registers
Picture
1D answer
Any two of:
A program must be resident in memory in order to be executed. (1)
Machine code instructions are fetched from memory one at a time, decoded and executed in the processor. (1)
The idea of storing programs and data in the same memory unit / of treating programs as just one form of data. (1)
Enables a single control unit to manage program control / the fetch-decode execute sequence. (1)

More help here - Stored program
Picture
1E answer
Manages files (1) provides a structure and system / directories for the management of files / allows files to be manipulated (saved, renamed, moved, copied and deleted). (1)
Process management (1) allocating / sharing processor time / resources to running programs. (1)
Manages memory (1) assigning (blocks of) memory to running programs as required. (1)
​Manages hardware / drivers (1) to receive data from input devices and to send processed data to output devices. (1)

More help here - OS
Picture
1F answer
Picture


More help here - Logic gates
Picture
2a answer
Internet service provider / ISP

More help here - ISP
Picture
2B answer
Every node / workstation connects to a central network device, like a hub or switch. (1)
The central network device acts as a router / directs data to the intended peripherals. (1)
All data passes through the central network device on route to its intended destination. (1)

More help here - Network topology
Picture
2c answer
Any four from (both must be addressed):

Wireless access point:
 Wireless access point transmits and receives radio waves from the tablets.
 Enables the tablets to connect to the network using WiFi.

Router:
 Directs data packets to / from tables to / from the Internet.
 Connects the LAN to the Internet.
 Uses routing information stored in its tables to forward data packets.​

More help here - Wireless access point
More help here - Router
Picture
2d answer
9 (1)
4 or 5, 3 (1)
​2 (1)

More help here - Binary search
Picture
3a answer
(400 x 250 x 24) / (8 x 1024) (3)
​or
​400 x 250 x 24 (1) / 8 (1) / 1024 (1)

More help here - File size calculation
Picture
3b answer
Any two of the following:

​File sizes / download times will be reduced. (1)
Some loss of image data / image quality will occur. (1)
​JPEGs allow image quality to be fine-tuned / the level of compression to be adjusted. (1)

More help here - Compression
Picture
3c answer
1011 1011 0100 1010 0000 1111 (1 mark for 24-bit response, 1 mark for all correct).​

More help here - Hex to binary

Picture
3D answer
Shorthand form that is easier for humans to read (1)
​and is likely to reduce errors when specifying colours / reduces potential for mixing up the 0s and 1s.(1)

More help here - Hex
Picture
4a answer
C - ASCII

More help here - Ascii
Picture
4b answer
An explanation that makes reference to the following point:
​
Overflow is the result of a binary addition where the sum exceeds the word length of the CPU / computer / maximum number of bits the CPU can process at one time / available storage space. (1)
​Plus one from: The computer ignores the overflow digit. (1)
​This could cause errors in further calculations. (1)

More help here - Overflow
Picture
4c answer
12 =    00001100 (1)
-11 = 11110101 (1)
+          00000001 (1) 


More help here - Binary addition
Picture
4d answer
The value of the number is halved / the number is divided by 2. (1)
​The sign bit is retained. (1)

​More help here - Binary shift
Picture
4e answer
This sequence has very few repeated patterns (1), therefore using a RLE will not lead to a significant reduction in the file size / not compress the image very much. (1)

More help here - RLE
Picture
5ai answer
To change high-level code into machine code. (1)

More help here - Translator
Picture
5aii answer
Compilation / Use a compiler / Interpretation / Use an interpreter. (1)​

More help here - Translator
Picture
5b answer
An explanation that makes reference to two of the following points:

Non specialist (1) - can be developed without knowledge of hardware / architecture. (1)
Accessible (1) - straightforward to read as closer to natural language. (1)
Availability of library functions (1) – both built in and available from third parties / usually tested and well proven. (1)
Portability (1) - the app will be portable because the source could be translated to run on various types of computer. (1)
Picture
5c answer
Indicative content:

Monetary cost:
 Open source software is often developed by a non-profit community and is free to use.
 Proprietary software is usually purchased from a software company who licenses its use.

Availability of source code:
 Open source software can be distributed and modified without permission. Anyone can fix bugs and create updates, without any need to wait for a new release.

Availability of support:
 Open source software usually has help available from the community of experts who are interested and contribute to forums.
 Proprietary development software will not have issues with ongoing parallel developments as updates / changes are controlled, avoiding confusion between versions.
 Proprietary development software will be supported by the originators.

Stability, reliability, suitability
 Open source is based on open standards that are accessible to everyone - avoids compatibility problems.
 Open source code is continually analysed by a large community of experts and therefore is stable / reliable.
 Proprietary development software will be less vulnerable to malicious users who could exploit the level of access provided to open source code.
​
More help here - Open source
Picture
6ai answer
To provide a platform for users to run applications (1) and enable users
to access network resources provided by the server. (1)

A client workstation accesses data from a server by making a
connection to the server (1) and issuing a service request. (1)

More help here - Client-server
Picture
6aii answer
Peer-to-peer / model (1)

More help here - Peer-to-peer
Picture
6b answer
Any three from:

 Data is stored digitally in a grid of transistors. (1)
 A save operation uses an electrical charge to create binary string. (1)
 Changing the value of some transistors from 1 to 0. (1)
 Cells are filled with electrons which represent 0s and empty cells represent 1s. (1)
 It uses semi-conductor chips called NAND flash. (1)​
​
More help here - SSD

Picture
6c answer
Indicative content:

 Specification 2 has a higher clock speed and therefore will be able to deal with a greater number of instructions / cycles per second with the effect that processing will be faster than for Specification 1.
 Because of the higher clock speed the CPU in Specification 2 will use more energy and create more heat than the CPU in Specification 1.
 The CPU cache memories and the bandwidths are the same.
 Specification 1 has more RAM / a larger memory and will therefore be able to handle more programs and operations at the same time. The larger memory will reduce the extent of swapping with virtual memory / secondary storage which will go some way to offset the benefit provided by the greater clock speed of Specification 2.​

More help here - Clock speed
Picture
7a answer
HTTP provides the set of rules / mutual understanding / defines how messages are formatted and transmitted (1) that enables the exchange of data between a client / browser and a web server. (1)​

More help here - HTTP
Picture
7bi answer
D - Eavesdropping ​

More help here - Wi-Fi Eavesdropping
Picture
7bii answer
When a client / your browser connects to a website via HTTPS the browser and
web server send each other unique codes which are used to encrypt any
transmitted data / the data is encrypted before transmission. (1)
If the data is intercepted by a third party / hacker it will not have any meaning. It
can only be read / decrypted using the unique decryption key provided. (1)​

More help here - HTTPS
Picture
7c answer
An ethical hacker is a computer / networking expert who works on behalf of the system owners (carries out penetration testing) (1) to find security vulnerabilities that a malicious hacker could exploit. (1) They document vulnerabilities / provide advice on how to fix them. (1)​

More help here - White hat
Picture
7d answer
User name (1)
​Password (1)​

More help here - Authentication
Picture
8a answer
B - SMTP

More help here - SMTP
Picture
8b answer
Ethernet protocols define standards for network cabling / types of cabling used at the physical layer (1) and corresponding transmission speeds. (1) At the data link layer Ethernet protocols describe how network devices can format data for transmission (1) using frames / packets. (1)​

More help here - Ethernet
Picture
8c answer
Each layer of the TCP/IP model prepares data for transmission from one computer to another. (1)
Data is sent downwards from the application (application layer) (1)
through protocol stack to the physical media (physical layer). (1)
At each stage information is added to the packet such as destination address, source address, protocol, routing information, error correction. (1)
At the receiving computer the packet passes through the layers in reverse. (1)
​There are four layers in a simple TCP/IP model (Application layer, Transport layer, Network layer, Data link layer). (1)​

More help here - TCP/IP
Loading Paper 1 (Sample 1)
Home
Contact
Upload
Log in
  • Exam boards
    • OCR past papers >
      • Paper1 (Sample)
    • Edexcel past papers >
      • 2020 Current spec (coming soon) >
        • Programming Language Subset (PLS)
      • Old 2016 SPEC >
        • Paper 1 (specimen1)
        • Paper 1 (specimen2)
        • Paper 1 (2018)
        • Paper 1 (2019)
        • Paper 2 (specimen1)
        • Paper 2 (2018)
        • Paper 2 (2019)
      • OLD 2013 SPEC >
        • Sample assessment 1 (old spec)
        • Sample assessment 2 (old spec)
        • June 2017 (old spec)
        • June 2016 (old spec)
        • June 2015 (old spec)
    • Paper 1 (by topic) >
      • Algorithms
      • Application software
      • Ascii
      • Binary
      • Cache
      • Client Server
      • Cloud
      • Compression
      • Computational thinking
      • CPU
      • Cyber security
      • Database
      • Fetch decode execute cycle
      • Embedded system
      • Encryption
      • File size
      • Flow chart
      • Hexadecimal
      • High Level language
      • ISP/Internet
      • Logic
      • Magnetic HDD
      • Networking
      • Open source
      • Operating system
      • Peer to peer
      • Images (Data representation)
      • Protocols
      • RAM
      • ROM
      • Run length encoding
      • Simulation software
      • Solid state HDD
      • Sound
      • Stored program concept
      • Utility software
    • Curriculum >
      • Binary
      • Hex
      • Data Representation
      • Compression
      • Encryption
      • What is a computer
      • How does a computer work
      • Hardware
      • Operating system
      • The CPU
      • Input devices
      • Data storage
      • Networks
      • Microcontrollers
      • Computational models
      • Emerging trends
      • Virtual machine
      • Models and simulators
      • Algorithms
    • Python >
      • Finding python
      • GCSE Python questions
      • Python coding >
        • Comments
        • Data types
        • Variables
        • If Else
        • If Elif Else
        • Functions
        • For loop
        • While loop >
          • While loop challenges
        • Data structures >
          • Looping thru 2D array
        • String slicing/indexing
        • Subprograms
        • Local/global variable
        • Validation and try
        • methods
        • File I/O
        • Pseudocode
        • Modules >
          • Turtle
        • Classes
        • NEA/Projects
  • KS3/Other
    • KS3 >
      • Online Safety >
        • Screen time
        • Online Safety questions
      • IT
      • Hardware >
        • All Hardware
        • Magnetic hard disk drive
        • Optical disk drive
        • Solid state drive
      • Software
      • Binary/Hex/Algorithms >
        • Binary
        • Binary explained
        • Hexadecimal - 1 digit
        • Hexadecimal - 2 digits
        • Algorithms
        • ASCII
        • Tests
      • Networks
      • Protocols/Cyber attacks
      • Logic >
        • CPU
        • AND gate
        • OR gate
        • NOT gate
        • Logical statements
      • Coding >
        • HTML
        • Scratch >
          • Scratch questions
        • Python >
          • Getting started
          • Functions
          • Variables
          • VariablesToo
          • inputs
          • Selection
          • Flowcharts
          • Data types
          • Pseudocode1
          • Pseudocode2
          • Subprogram1
          • Subprogram2
          • Coding challenges
    • BTEC CS
    • OCR GCSE CS >
      • Past paper JUNE 2015
      • Past paper June 2014
      • Past paper MAY 2012
      • Past paper JAN 2011
      • Past paper JUN 2011
    • AQA AS-Level CS >
      • AS Curriculum >
        • Multiple choice questions
    • Business studies >
      • Keywords
      • BS Revision - Multiple choice
      • Paper 1 (9-1)
      • Paper 2 (9-1)
  • Contact/More
    • Code editor
    • Contact us
    • Microbit ideas
    • More
  • Self test
    • 01 Random topics
    • 02 Programming
    • 03 Data
    • 04 Computers
    • 05 Networks
    • 06 Legal/Ethics/Enviro'
    • Coding/Programming