Computer Science Mock
Computer Science Mock
Candidate Candidate
forename surname
INSTRUCTIONS TO CANDIDATES
• Write your name, centre number and candidate number in the boxes above. Please write clearly and in capital letters.
• Use black ink. HB pencil may be used for graphs and diagrams only.
• Answer all the questions, unless your teacher tells you otherwise.
• Read each question carefully. Make sure you know what you have to do before starting your answer.
• Where space is provided below the question, please write your answer there.
• You may use additional paper, or a specific Answer sheet if one is provided, but you must clearly show your candidate
number, centre number and question number(s).
[1]
(ii) Explain why a real-time operating system would be suitable for Intensive Care Units.
[2]
Discuss the ethical benefits and drawbacks of this approach, explaining whether you would recommend making
this update.
[9]
[1]
(b) In the line:
[1]
(ii) Name the register in which the result of this line is stored.
[1]
[1]
(ii) Using pseudocode write a program for a procedural language that takes in two inputs and gives the same
output as the program in Fig. 1.
[2]
3 A software company decides to release a duplicate file finder which it has named “De-Duplicator”. Duplicate files
are files that are exactly the same (bit for bit identical). Space is often wasted on computers by having multiple
versions of the same file. Duplicate file finders are programs that find and identify duplicate files on a hard drive
so that they can be removed.
[2]
4(a) State which bitwise manipulation on 00010101 would have achieved the same result as the calculation on part
(a).
[1]
(b) Two equal (unsigned) integers, shown below, are added together. Calculate the result, showing your working.
[2]
[2]
5 A gaming company decides to release a new video games console. The console will use a modified version of
an operating system called Linux.
Linux is open-source.
Explain how Linux being open-source would benefit the games company.
[2]
6 A company releases a utility called Utility software. The utility creates a virtual storage drive from an area of the
computer's RAM.
The utility periodically copies what is in the RAM drive to secondary storage, such as a hard disk. Explain why
this is necessary.
[2]
Add the following three numbers together and give the answer in the format described. You must show your
working.
[6]
Explain the buses and registers used when the line SUB one is executed.
[5]
A B Cin S Cout
1 1 1
1 1 0
1 0 1
1 0 0
0 1 1
0 1 0
0 0 1
0 0 0
[4]
(ii) Explain what the circuit does. You should refer to A, B, Cin, S and Cout in your answer.
(b)
[1]
[2]
[2]
Advantage
Disadvantage
[2]
(c) Users can build up playlists of their songs. Another table is created called Playlist.
Explain why a third table which we shall call PlayListEntry is needed. You should use an ER diagram to
illustrate your answer.
[4]
The company removes all the songs belonging to RandomBits from their service.
(i) Identify the law with which the company are complying.
[1]
(ii) Write an SQL statement that will remove all songs by RandomBits from the table Song.
[2]
(iii) When the songs have been removed, explain what must happen to the table PlayListEntry if the
database is to retain its referential integrity. (You are not expected to write the SQL to do this).
[1]
One of the developers is responsible for writing the code for what happens when the CPU receives an interrupt.
Outline what the code must do.
[6]
12 TCP/IP uses packet switching.
[4]
[2]
14(a)
(i) Compare a Complex Instruction Set Computer (CISC) architecture with a Reduced Instruction Set Computer
(RISC) architecture.
[4]
(ii) Explain one advantage, other than cost, of RISC compared with CISC.
[2]
(i) Give the name of the computer architecture that uses the fetch-execute cycle with a single control unit.
[1]
(ii) Registers used during the fetch-execute cycle include the current instruction register (CIR), memory address
register (MAR), memory data register (MDR) and program counter (PC).
Place ticks in the table to show which statements are correct during processing.
CIR MDR PC
Holds a binary value
Always holds only an address
May change more than once during a single cycle
May pass a value to the MAR
[4]
[2]
(ii) State two advantages of having a LAN instead of a set of stand-alone machines.
[2]
The name of a product is stored using characters from the computer's character set.
[2]
[3]
[4]
[3]
[3]
19 See And Believe is a company that specialises in computer-generated imagery (CGI) for films.
Producing CGI requires lots of processing power and so the company has a large number of high-performance
computers.
Explain why See And Believe would use a distributed operating system.
[3]
In this variant of LMC the symbols & and # are used to denote different modes of addressing.
Explain how pipelining would help a CPU execute the code in Fig. 3.1 more quickly.
[3]
State why the table in Fig. 5.1 is not in Third Normal Form.
[1]
(b) Explain how the database could be put into Third Normal Form.
[3]
Show the effect of applying XOR on Text and Key, by completing the last row of the table below.
[2]
[2]
(c) Explain whether the type of encryption described above is symmetric or asymmetric.
[2]
(d) Explain why asymmetric encryption is more suited to transactions over the internet than symmetric encryption.
[4]
[5]
(b) In certain scenarios the user's IP address is logged in a database.
[2]
(ii) Explain why the programmers have chosen to store the user's IP address.
[2]
State what the value of statement would be after line 03 of the code in Fig. 8 .1 is run.
[1]
(ii) State what the value of hashInDB would be after line 04 of the code in Fig. 8.1 is run.
[1]
The username DenverJ34'; DROP TABLE users; –– is entered into the form.
(i) State what the value of statement would be after line 03 is run.
[1]
[2]
(iii) State the name of a law the user has broken by entering the username
DenverJ34'; DROP TABLE users; --
[1]
State the Boolean expression represented by the Karnaugh map in Fig. 9.1, in its smallest form.
[4]
(i) ¬ ¬A
[1]
[1]
[1]
shown; the material is basic and contains The following is indicative of possible
some inaccuracies. The candidate makes factors / evidence that candidates may
a limited attempt to apply acquired refer to but is not prescriptive or
knowledge and understanding to the exhaustive:
context provided. The candidate provides
nothing more than an unsupported
assertion. Discussion on how the computerised
The information is basic and round the clock monitoring system
communicated in an unstructured way. The would impact upon the staff workload
information is supported by limited of Intensive Care Units.
evidence and the relationship to the Discussion on the data protection act
evidence may not be clear. and the growth in using computerised
monitoring and other computerised
0 marks systems.
No attempt to answer the question or
response is not worthy of credit. AO3.3: Evaluation
The following is indicative of possible
factors / evidence that candidates may
refer to but is not prescriptive or
exhaustive:
Total 12
Example:
Total 6
3 A utility performs a specific task (1) and 2 Up to 2 marks for a valid description.
is usually related to the upkeep of the
system (1).
Examples of a utility include a virus
checker (1) / disk defragmenter (1).
Total 2
Total 5
5 This means that a lot of the core 2 Up to 2 marks for a valid explanation.
functionality they need is already
available (1) so the company just has
to make amendments / additions
specific to their system (1) saving time
and money (1).
Total 2
Total 2
(1 per –)
Total 6
Total 5
9 a i 4
Accept instead of ∨
Accept instead of ∨
One mark for ((A∨B) ∧ Cin)
Accept AND instead of ∧
One mark for ∨ (A ∧ B)
Accept OR instead of ∨
Accept + instead of ∨
Total 11
c – would have a 4
many to many relationship
– This is not allowed
– Adding a table between them resolves
this
– Diagram to illustrate this.
(1 per –)
ii 2
(1
mark per –, max 2)
Total 12
Total 6
Total 4
Total 2
Examiner's Comments
Examiner's Comments
Total 11
Total 4
Total 5
Total 4
Total 6
19 Any 2 from: 3
Examiner's Comments
Allow multiple computers / resources…
(AO1.1) Few candidates gained full marks on this
To be treated as one / work on the question. Many candidates described
same problem (AO1.1) general characteristics of a network
operating system rather than a distributed
1 from: operating system. Fewer appropriately
related their explanation to the scenario.
Meaning all the computers can work on
producing the same special effect.
(AO2.1)
Total 3
20 Pipelining would allow one instruction to be 3 Accept any valid example from the given
fetched as the previous one is being code.
decoded and the one before that is being
executed.(1)
For example OUT could be fetched (1). As
there are no jump/branch instructions it
pipelines well (as there is no need to flush
the pipeline). (1)
Total 3
Total 4
22 a 2
One byte correct (1) all three bytes
correct. (1)
c Symmetric (1) …. as the same key is used 2 Allow FT for asymmetric if (b) indicates
to decrypt it as encrypt it (1) asymmetric encryption used
Total 10
ii 0e5a511 1
Total 15
b i A 1
ii ¬(A∨ B) 1
iii A∨B 1
Total 7