Dilini Gunawardane
Edexcel Computer Science Grade (1-9) Past Paper Model Answers
June 2019
6. (c) Artificial intelligence (AI), in many forms, has an increasing impact on our lives. Discuss this
statement considering characteristics, uses and ethical issues.
Characteristics:
• AI systems can process large amounts of data quickly.
• They learn and improve over time using machine learning algorithms.
• They can simulate human decision-making and problem-solving.
Uses:
• Healthcare: AI helps in diagnosing diseases and managing patient records.
• Transport: Self-driving cars use AI to make decisions based on sensor data.
• Customer Service: Chatbots answer customer queries efficiently.
• Finance: AI is used in fraud detection and automated trading systems.
Ethical Issues:
• Job Loss: Automation through AI may replace human workers, especially in repetitive
tasks.
• Bias: AI systems can show bias if trained on biased data.
• Privacy: AI used in surveillance raises concerns about individual privacy.
• Accountability: It may be unclear who is responsible if an AI system causes harm.
Conclusion: AI is transforming many areas of life with both advantages and challenges. Ethical
concerns must be addressed to ensure responsible use of AI.
November 2020
6.(c) The algorithms will be coded in a high-level language. Programs written in high-level
languages must be translated in order to be executed by a computer. Discuss the similarities and
differences between a compiler and an interpreter.
Similarities:
• Both convert high-level language code into machine code so it can be run by a computer.
• Both are used in software development to test and run programs.
Dilini Gunawardane
Differences:
• Compiler: Translates the entire program into machine code before it is executed. The
program runs faster after compilation.
• Interpreter: Translates and executes code line-by-line. It’s slower but useful for
debugging.
• Compiler Output: Produces an executable file.
• Interpreter Output: Does not produce a separate file; it runs code directly.
Conclusion: Both tools serve similar purposes but are suited to different stages of development.
Compilers are better for final products, while interpreters are good for testing.
June 2021
6. (c) Widespread use of computer technology has a negative environmental impact. Discuss the
negative environmental impact of using computers and actions that could be taken to reduce it.
Negative Environmental Impacts:
• Energy Consumption: Data centers and devices consume large amounts of electricity.
• E-Waste: Old devices are discarded, contributing to electronic waste.
• Pollution: The manufacturing process involves hazardous chemicals and produces
emissions.
Actions to Reduce Impact:
• Energy-Efficient Devices: Using low-power components and sleep modes.
• Recycling: Proper disposal and recycling of old devices to recover materials.
• Cloud Optimisation: Using energy-efficient data centers.
• Digital Responsibility: Reducing unnecessary upgrades and extending device lifespan.
Conclusion: While computers provide many benefits, their environmental impact must be
managed through better practices in manufacturing, use, and disposal.
November 2021
6. (d) Akiko wants to know how the software she writes can be protected. Discuss how the
software can be protected from illegal copying and/or illegal distribution.
Dilini Gunawardane
You should consider:
• intellectual property
• licensing
Intellectual Property (IP):
• Software is considered intellectual property and is automatically protected by copyright
law.
• Akiko should ensure her work is properly documented and registered, if possible, to
establish ownership.
Licensing:
• Akiko can release her software under specific licences, such as:
o Proprietary Licence: Restricts how the software can be used, copied, or shared.
o Open Source Licence: Allows sharing and modification under defined rules (e.g.,
GPL).
• Licence agreements inform users of their rights and responsibilities.
Other Protections:
• Product Keys: Required for activation to prevent unauthorised copying.
• Digital Rights Management (DRM): Controls how the software is used or distributed.
Conclusion: Protecting software through IP and proper licensing ensures that Akiko can control
how her work is used and benefit from her efforts.
June 2022
6. (d) Santiago wants to find and fix network vulnerabilities before the reputation of the
company suffers. Discuss the methods he can use.
You should consider:
• ethical hacking
• commercial analysis tools
• review of network and user policies
Ethical Hacking:
• Santiago can hire ethical hackers to simulate attacks and find weaknesses.
Dilini Gunawardane
• This helps fix vulnerabilities before real attackers exploit them.
• Must be done with permission and within legal boundaries.
Commercial Analysis Tools:
• Software like antivirus scanners, firewalls, and intrusion detection systems help detect
vulnerabilities.
• Tools like Nessus or Wireshark can scan for open ports or unusual activity.
Review of Network and User Policies:
• Regular audits of user permissions and access levels reduce the risk of insider threats.
• Policies must ensure strong passwords, regular updates, and staff training.
Conclusion: Using a combination of ethical hacking, tools, and policy review helps Santiago
identify and resolve vulnerabilities, keeping the network secure.
June 2023
6. (d) Cloud storage has become an increasingly popular service. Discuss the benefits and
drawbacks of using cloud storage.
Benefits:
• Accessibility: Files can be accessed from any location with internet access.
• Scalability: Storage space can be increased as needed without hardware upgrades.
• Backup and Recovery: Automatic backups protect data from local hardware failure.
• Collaboration: Multiple users can work on documents in real time.
Drawbacks:
• Internet Dependence: Accessing files requires a reliable internet connection.
• Security Risks: Data stored online may be vulnerable to hacking or data breaches.
• Ongoing Costs: Subscription fees can accumulate over time.
• Data Control: Users rely on third-party providers for data storage and privacy.
Conclusion: Cloud storage offers flexibility and convenience but must be used responsibly with
attention to security and cost management.
Dilini Gunawardane
June 2024
4. (f) The research facility is considering introducing cameras and facial recognition software to
monitor the work and movement of people on and around its site. Discuss the privacy issues
that need to be considered when deciding whether or not to install this new system.
Installing cameras and facial recognition software raises several privacy concerns that must be
carefully weighed.
Invasion of Privacy:
Facial recognition systems constantly track and identify individuals. Staff may feel they are
under constant surveillance, which could affect morale and create a sense of mistrust.
Data Storage and Security:
The system will collect sensitive biometric data. This data must be stored securely to prevent
unauthorized access or breaches. If the data is hacked or misused, it could seriously
compromise personal privacy.
Consent and Transparency:
Employees and visitors must be clearly informed about the monitoring and give consent where
necessary. Without proper transparency, it could violate privacy laws or workplace policies.
Legal and Ethical Issues:
The facility must comply with data protection laws such as the GDPR (if applicable), which
require lawful justification for collecting and processing personal data.
Purpose Limitation:
The data should only be used for stated purposes, such as safety or access control, and not for
unrelated tracking or profiling.
Conclusion:
While the system may improve security and efficiency, it must be balanced with the need to
respect individuals’ privacy. Measures like clear policies, limited access to data, and regular
audits should be in place to protect rights.