Computer science
  • Exam boards
    • OCR past papers >
      • Paper 1 J277 >
        • Paper1 (Sample) J277
        • Practice paper1 J277
      • Paper 2 J277 >
        • Paper 2 J277 Practice
    • Edexcel past papers >
      • 2020 Current spec (coming soon) >
        • Programming Language Subset (PLS)
      • Old 2016 SPEC >
        • Paper 1 (specimen1)
        • Paper 1 (specimen2)
        • Paper 1 (2018)
        • Paper 1 (2019)
        • Paper 2 (specimen1)
        • Paper 2 (2018)
        • Paper 2 (2019)
      • OLD 2013 SPEC >
        • Sample assessment 1 (old spec)
        • Sample assessment 2 (old spec)
        • June 2017 (old spec)
        • June 2016 (old spec)
        • June 2015 (old spec)
    • Paper 1 (by topic) >
      • Algorithms
      • Application software
      • Ascii
      • Binary
      • Cache
      • Client Server
      • Cloud
      • Compression
      • Computational thinking
      • CPU
      • Cyber security
      • Database
      • Fetch decode execute cycle
      • Embedded system
      • Encryption
      • File size
      • Flow chart
      • Hexadecimal
      • High Level language
      • ISP/Internet
      • Logic
      • Magnetic HDD
      • Networking
      • Open source
      • Operating system
      • Peer to peer
      • Images (Data representation)
      • Protocols
      • RAM
      • ROM
      • Run length encoding
      • Simulation software
      • Solid state HDD
      • Sound
      • Stored program concept
      • Utility software
    • Curriculum >
      • Binary
      • Hex
      • Data Representation
      • Compression
      • Encryption
      • What is a computer
      • How does a computer work
      • Hardware
      • Operating system
      • The CPU
      • Input devices
      • Data storage
      • Networks
      • Microcontrollers
      • Computational models
      • Emerging trends
      • Virtual machine
      • Models and simulators
      • Algorithms
    • Python >
      • Finding python
      • GCSE Python questions
      • Python coding >
        • Comments
        • Data types
        • Variables
        • If Else (Selection)
        • If Elif Else (Selection) >
          • Relational/Comparison Operator challenges
          • Selection challenges
        • Functions
        • For loop (iteration)
        • While loop (iteration) >
          • While loop challenges
        • Data structures >
          • Array challenges
          • 2D Array challenges
          • Looping thru 2D array
        • String slicing/indexing >
          • String slicing challenges
        • Subprograms >
          • Subprogram challenges
        • Local/global variable
        • Validation and try
        • methods
        • File I/O >
          • Files - Challenges
        • Pseudocode
        • Modules >
          • Turtle
        • Classes
        • NEA/Projects
  • KS3/Other
    • KS3 >
      • Coding >
        • GameMaker
        • HTML >
          • HTML tags
        • Scratch >
          • Scratch questions
        • Python >
          • Getting started
          • Functions
          • Variables
          • VariablesToo
          • inputs
          • Selection
          • Flowcharts
          • Data types
          • Pseudocode1
          • Pseudocode2
          • Subprogram1
          • Subprogram2
          • Coding challenges
      • Online Safety >
        • Screen time
        • Online Safety questions
      • IT >
        • Word
        • PowerPoint
      • Hardware >
        • All Hardware
        • Magnetic hard disk drive
        • Optical disk drive
        • Solid state drive
      • Logic >
        • CPU
        • AND gate
        • OR gate
        • NOT gate
        • Logical statements
      • Software
      • Binary/Hex/Algorithms >
        • Binary
        • Binary explained
        • Hexadecimal - 1 digit
        • Hexadecimal - 2 digits
        • Algorithms
        • ASCII
      • Networks
      • Protocols/Cyber attacks
    • BTEC CS
    • OCR A-Level >
      • 1.2 (Unit 2) >
        • Functions of an OS
        • Types of OS
        • Application generation
      • 1.2 (Unit 3) >
        • Software development
        • Algorithms
        • Programming paradigms
      • 1.3 (Unit 5) >
        • Networks
      • 1.5 (Unit 9) >
        • Laws and Acts
      • 2.3 (Unit 12) >
        • Analysis and design of algorithms
    • AQA AS-Level CS >
      • AS Curriculum >
        • Multiple choice questions
    • Business studies >
      • Keywords
      • BS Revision - Multiple choice
      • Paper 1 (9-1)
      • Paper 2 (9-1)
    • Junior Science >
      • 01 - Particles >
        • investigations and data
        • Equipment
        • Particles
      • 02 - Cells >
        • Microscope introduced
        • Looking at cells
        • Specialised cells
        • Unicellular organisms
      • 03 - Energy >
        • Energy introduced
        • Energy transfers
        • Conduction, Convection, Insulators
      • 04 - Chemical ideas & reactions >
        • Periodic table
        • Chemical reactions
        • Chemical reactions2
      • 05 - Light and Sound >
        • Light introduced
        • The Eye
        • Colours and filters
        • Waves and Sound
  • Contact/More
    • Code editor
    • Contact us
    • Microbit ideas
    • More
  • Self test
    • 01 Random topics
    • 02 Programming
    • 03 Data
    • 04 Computers
    • 05 Networks
    • 06 Legal/Ethics/Enviro'
    • Coding/Programming

EDEXCEL GCSE COMPUTING

MAY 2018
Picture

EDEXCEL GCSE Paper 1 (2018) exam paper can be downloaded here

EDEXCEL GCSE Paper 1 (2018) material mark scheme can be downloaded here 

Picture
Picture
Picture
1Ai Answer (Ao2)
one from:
300 x 200
200 x 300
​60,000

More help here -
1Ai ​Examiners report
Picture
Picture
1aii answer (Ao1)
All colours are combinations of RGB
Each of R, G, B is 8 bits / 8 bits are allocated to the three primary colours red, green, blue
3 colours x 8 bits each = 24 bits
2 to the power of 24 colours can be represented
24 bits are used to represent the colour of each pixel
More help here -
1AiI ​Examiners report
Picture
Picture
1b answer (Ao2)
5F 9E A0 

More help here -
1B ​Examiners report
Picture
Picture
1c answer (Ao1)
Picture


More help here -

1C ​Examiners report
Picture
Picture
2ai answer (Ao2)
0011 1100

More help here - 
2AI ​Examiners report
Picture
Picture
2aii answer (Ao2)
35

More help here - 
2Aii ​Examiners report
Picture
Picture
2aiii answer
0110 1101

​More help here -
2aiii ​Examiners report
Picture
Picture
2Bi answer (Ao2)
A sensor (1) could be used with a microprocessor to determine light levels (1) to activate a switch / turn on/off the headlights

More help here -
2BI ​Examiners report
Picture
Picture
Picture
2bii answer (Ao2)
​5 bits are needed

And one from:
because 4 bits / 2 to the power of 4 only represents 16 values
because 5 bits / 2 to the power of 5 represent up to 32 values

More help here -
2BII ​Examiners report
Picture
Picture
Picture
2ci answer (Ao1)
 C - to keep data secure

More help here - 
2ci ​EXAMINERS REPORT
No report
Picture
2cii answer (Ao1)
  • f v e o i w 
  • -2

More help here - 
2CII ​Examiners report
Picture
Picture
2ciii answer (Ao1)
When the start/end of the alphabet is reached (1) the algorithm must roll over (1)

More help here -
2ciII ​Examiners report
Picture
Picture
3ai answer (Ao1)
Share peripherals/devices (e.g. printers, scanners) (1)
Communicate (e.g.  email, instant messaging)
Share data
Deploy/Update applications
​
More help here -

3aI ​Examiners report
Picture
Picture
3aii answer (Ao1)
May not have space for cables to be installed
Employees and visitors can move around the building without disconnecting 
Adding new users just means giving out the SSID password
​
More help here - 
2BII ​Examiners report
Picture
3bi answer (Ao1)
Most people do not notice (1)
...because
People have a limited hearing range
OR
Sounds (frequencies/amplitudes) can be masked by other sounds
OR
People's brains will "fill in the blanks"

More help here -
2BII ​Examiners report
Picture
3bii answer (Ao1)
May increase the file size / the file may not be compressed very much / at all (1) if characters are distributed randomly/not repeated/runs of similar characters are found

More help here -
2BII ​Examiners report
Picture
3c answer (Ao2)
Total number of bits to transfer

1 mark for 81 x 1024 o the power of 2
1 mark for x 8

Speed in bits per second:
​1 mark for 54 x 1000 to the power of 2

Time = number of bits / bits per second:
81 x 1024 x 1024 x 8
-------------------------
54 x 1000 x 1000
1 mark = number of bits in numerator
​1 mark = number of bits per second in denominator

More help here -
2BII ​Examiners report
Picture
4ai answer (Ao1)

A - Solid state
More help here -
2BII ​Examiners report
Picture
4aii answer (Ao1)
ROM stores BIOS / bootstrap / start-up (1)
RAM stores currently executing programs and data (1)


More help here -
2BII ​Examiners report
Picture
4aiii answer (Ao1)
Data
Instructions

More help here -
2BII ​Examiners report
Picture
4aiv answer (Ao1)
B - Control unit

More help here -
2BII ​Examiners report
Picture
4bi answer (Ao1)
Any two from:
  • All processes are held in a queue
  • Processes are prioritised
  • (and) processes are switched
  • On each clock cycle

More help here -
2BII ​Examiners report (Ao1)
Picture
4bii answer (Ao1)
C - Converting files

More help here -
Picture
5a answer (Ao2)
An explanation that makes reference to one of these types of access:
  • Read only
  • No access
And includes a linked reason:
  • The student cannot see any sensitive/irrelevant information
  • The student does not accidentally change/delete the data
  • The student cannot share the data (outside the organisation)


More help here -
2BII ​Examiners report
2BII ​Examiners report
Picture
5b answer (Ao1)
D - Unpatched

More help here -
Picture
5c answer (Ao2)
  • Disposal of digital devices in a landfill (1) could cause dangerous chemicals / toxins to leak (1) into drinking water (1)
  • Reclaiming precious metals (1) exposes workers to more dangerous chemicals/materials (1) by contact during handling
  • Incineration of digital devices (1) causes chemicals/toxins to be released into the air (1), which could then be inhaled (1)
  • If batteries are not removed / thrown in a bin (1) they can catch fire (1) creating a risk of burns (1)

More help here -
Picture
5di answer (Ao1)
Networks are put under deliberate attack (1) in order to identify any weaknesses/vulnerabilities (1) so that they can be fixed (1)

More help here -

Picture
5dii answer (Ao1)
Any town from:
Identify:
  1. Bad programming practices
  2. inefficient code
  3. logic errors
  4. programming language-specific vulnerabilities 
  5. security vulnerabilities

More help here -
Picture
6a answer (Ao1)
Any four from:
  1. A single executable file is produced
  2. The executable program is portable between machines
  3. The program source code is not available
  4. Code can be optimised/made more efficient
  5. Entire source code file is converted at once
  6. No special environment is needed to execute the code
  7. It creates object/machine code
  8. Error report s provided at the end of the compilation

More help here -
Picture
6B answer (Ao1)
A description to include five from:
  1. Reads the data/packet to find the recipient's address
  2. Has physical connections to >=2 different networks
  3. Holds a routing table
  4. Stores information about (IP) addresses
  5. Keeps packets inside a network by not forwarding them
  6. Forwards data/directs/forwards/sends packets [Not directs data as in question]
  7. Chooses the mot efficient path to the next node

More help here -
Picture
6c answer (Ao1)
Best case: the item is the middle / median of the list
Worst case: The item is not in the list / located at the point at which the final division could be made

More help here -
Picture
6d answer (Ao2)
  1. All of the items appear to be stored on one single device
  2. The virtual device appears to be storage on the local machine
  3. Software sits between the physical devices and the user
  4. The items stored on the cloud could be scattered over several different physical hard discs/servers
  5. The items stored on the cloud could be resident in different locations
  6. Files need to be accessed via a network/internet
  7. Procedures (e.g. backup) happen without the end user being aware or involved

More help here -

Assessment Objectives occurrences in this exam

AO1 = 20 (Demonstrate knowledge and understanding of the key concepts and principles of computer science)
AO2 = 10 (Apply knowledge and understanding of key concepts and principles of computer science)
AO3 = 0 (Analyse problems in computational terms:
               ●
to make reasoned judgements
               ●to design, program, evaluate and refine solutions.)
Home
Contact
  • Exam boards
    • OCR past papers >
      • Paper 1 J277 >
        • Paper1 (Sample) J277
        • Practice paper1 J277
      • Paper 2 J277 >
        • Paper 2 J277 Practice
    • Edexcel past papers >
      • 2020 Current spec (coming soon) >
        • Programming Language Subset (PLS)
      • Old 2016 SPEC >
        • Paper 1 (specimen1)
        • Paper 1 (specimen2)
        • Paper 1 (2018)
        • Paper 1 (2019)
        • Paper 2 (specimen1)
        • Paper 2 (2018)
        • Paper 2 (2019)
      • OLD 2013 SPEC >
        • Sample assessment 1 (old spec)
        • Sample assessment 2 (old spec)
        • June 2017 (old spec)
        • June 2016 (old spec)
        • June 2015 (old spec)
    • Paper 1 (by topic) >
      • Algorithms
      • Application software
      • Ascii
      • Binary
      • Cache
      • Client Server
      • Cloud
      • Compression
      • Computational thinking
      • CPU
      • Cyber security
      • Database
      • Fetch decode execute cycle
      • Embedded system
      • Encryption
      • File size
      • Flow chart
      • Hexadecimal
      • High Level language
      • ISP/Internet
      • Logic
      • Magnetic HDD
      • Networking
      • Open source
      • Operating system
      • Peer to peer
      • Images (Data representation)
      • Protocols
      • RAM
      • ROM
      • Run length encoding
      • Simulation software
      • Solid state HDD
      • Sound
      • Stored program concept
      • Utility software
    • Curriculum >
      • Binary
      • Hex
      • Data Representation
      • Compression
      • Encryption
      • What is a computer
      • How does a computer work
      • Hardware
      • Operating system
      • The CPU
      • Input devices
      • Data storage
      • Networks
      • Microcontrollers
      • Computational models
      • Emerging trends
      • Virtual machine
      • Models and simulators
      • Algorithms
    • Python >
      • Finding python
      • GCSE Python questions
      • Python coding >
        • Comments
        • Data types
        • Variables
        • If Else (Selection)
        • If Elif Else (Selection) >
          • Relational/Comparison Operator challenges
          • Selection challenges
        • Functions
        • For loop (iteration)
        • While loop (iteration) >
          • While loop challenges
        • Data structures >
          • Array challenges
          • 2D Array challenges
          • Looping thru 2D array
        • String slicing/indexing >
          • String slicing challenges
        • Subprograms >
          • Subprogram challenges
        • Local/global variable
        • Validation and try
        • methods
        • File I/O >
          • Files - Challenges
        • Pseudocode
        • Modules >
          • Turtle
        • Classes
        • NEA/Projects
  • KS3/Other
    • KS3 >
      • Coding >
        • GameMaker
        • HTML >
          • HTML tags
        • Scratch >
          • Scratch questions
        • Python >
          • Getting started
          • Functions
          • Variables
          • VariablesToo
          • inputs
          • Selection
          • Flowcharts
          • Data types
          • Pseudocode1
          • Pseudocode2
          • Subprogram1
          • Subprogram2
          • Coding challenges
      • Online Safety >
        • Screen time
        • Online Safety questions
      • IT >
        • Word
        • PowerPoint
      • Hardware >
        • All Hardware
        • Magnetic hard disk drive
        • Optical disk drive
        • Solid state drive
      • Logic >
        • CPU
        • AND gate
        • OR gate
        • NOT gate
        • Logical statements
      • Software
      • Binary/Hex/Algorithms >
        • Binary
        • Binary explained
        • Hexadecimal - 1 digit
        • Hexadecimal - 2 digits
        • Algorithms
        • ASCII
      • Networks
      • Protocols/Cyber attacks
    • BTEC CS
    • OCR A-Level >
      • 1.2 (Unit 2) >
        • Functions of an OS
        • Types of OS
        • Application generation
      • 1.2 (Unit 3) >
        • Software development
        • Algorithms
        • Programming paradigms
      • 1.3 (Unit 5) >
        • Networks
      • 1.5 (Unit 9) >
        • Laws and Acts
      • 2.3 (Unit 12) >
        • Analysis and design of algorithms
    • AQA AS-Level CS >
      • AS Curriculum >
        • Multiple choice questions
    • Business studies >
      • Keywords
      • BS Revision - Multiple choice
      • Paper 1 (9-1)
      • Paper 2 (9-1)
    • Junior Science >
      • 01 - Particles >
        • investigations and data
        • Equipment
        • Particles
      • 02 - Cells >
        • Microscope introduced
        • Looking at cells
        • Specialised cells
        • Unicellular organisms
      • 03 - Energy >
        • Energy introduced
        • Energy transfers
        • Conduction, Convection, Insulators
      • 04 - Chemical ideas & reactions >
        • Periodic table
        • Chemical reactions
        • Chemical reactions2
      • 05 - Light and Sound >
        • Light introduced
        • The Eye
        • Colours and filters
        • Waves and Sound
  • Contact/More
    • Code editor
    • Contact us
    • Microbit ideas
    • More
  • Self test
    • 01 Random topics
    • 02 Programming
    • 03 Data
    • 04 Computers
    • 05 Networks
    • 06 Legal/Ethics/Enviro'
    • Coding/Programming