GCSE Past Paper Questions
WJEC GCSE Computer Science
Show if each statement about CPUs is TRUE or FALSE.
| Statement | True | False |
|---|---|---|
| The Control Unit (CU) decodes the program instruction in the Current Instruction Register (CIR). | ||
| The Program Counter (PC) holds the address in main memory that is currently being read. | ||
| RISC CPUs run at lower clock speeds than CISC CPUs. | ||
| The slower the clock speed, the more power is generally required. |
Match the network hardware with the correct description.
| Description | Hub | Router | Switch | Bridge |
|---|---|---|---|---|
| Joins together two networks that use the same base protocols. | ||||
| Copies all packets of data to all devices on the network. | ||||
| Stores the addresses of computers on the network and transfers data between devices. | ||||
| Analyses each data packet and sends it to the computer it was intended for. |
Identify four different types of computer network.
Using the terms given, complete the following sentences about the stages of compilation.
This pseudo code is part of a payroll system. The system calculates the net pay by subtracting deductions from the gross pay. The pseudo code includes errors. Identify two errors in the code. State each error type and correction needed.
def CalcPay():
Gross = input
Tax = (Gross * 0.20)
NatIns = (Gross * 0.10)
Pension = (Gross * 0.10)
Deducts = tax + NatIns + Pension
NetPay = Gross + Deducts
Convert the binary number 11111100₂ to hexadecimal.
Convert the denary number 138₁₀ to hexadecimal.
Convert the hexadecimal number 5D₁₆ to denary.
State the effect of an arithmetic shift left by one place.
State the effect of an arithmetic shift right by two places.
An IDE is a software application that provides programmers with facilities to develop, debug and translate software.
Describe three IDE tools that are provided to help identify and remove errors in program code.
Utility software are operating system programs designed to maintain the functionality of a computer system.
Describe three types of utility software that are provided to help maintain the security and integrity of computer data.
Describe three examples of current legislation, relevant to the privacy and security of an individual's data when held on computers.
Apply the distributive law to complete the expressions.
KEY: + = OR, · = AND, ⊕ = XOR, ‾ = NOT
(i) (A · B) + C = ?
(ii) (A + B) · C = ?
Apply the absorption law to complete the expressions.
KEY: + = OR, · = AND, ⊕ = XOR, ‾ = NOT
(i) A · (A + B) = ?
(ii) A + A · B = ?
Clearly showing each step, simplify the Boolean expression:
A · (A + B) + B · (A + B)
Complete the truth table.: P + (P · Q)
| P | Q | P·Q | P + (P·Q) |
|---|---|---|---|
| 0 | 0 | ||
| 0 | 1 | ||
| 1 | 0 | ||
| 1 | 1 |
Parkwood Vale Motors wants to store details of the cars it has in stock in a database. The first two fields have been set as Strings.
Complete the table to include two other data types.
| Field Name | Data Type | Example Data |
|---|---|---|
| Car ID | String | E23TES |
| Manufacturer | String | Tesla |
| Range Miles | ? | 305 |
| Model (X, Y, 3 or Z) | ? | X |
Complete the table to include two other methods of validation.
| Field Name | Data Type | Example | Validation |
|---|---|---|---|
| Car ID | String | E23TES | Format check |
| Manufacturer | String | Tesla | Presence check |
| Range Miles | Integer | 305 | ? |
| Model (X, Y, 3 or Z) | Char | X | ? |
The ASCII code for V is 01010110₂. Demonstrate how V would be encrypted and then decrypted using the XOR encryption method.
The key used is 11110000₂.
Explain why Parkwood Vale Motors have decided to encrypt the data they hold on their customers.
Describe the main characteristics that distinguish high-level programming languages from low-level languages.
Describe a typical situation that requires the use of a high-level language.
Describe a typical situation that requires the use of a low-level language.
Explain the purpose and functionality of the TCP/IP 5-layer model in computer networks.
Show if each statement about CPUs is TRUE or FALSE.
| Statement | True | False |
|---|---|---|
| A dual-core CPU will always process instructions twice as fast as a single-core CPU. | ||
| The ALU can perform comparisons on data, e.g. an IF statement in a high-level language. | ||
| Overclocking is the process of setting a processor to run slower than its original design. | ||
| Cache memory has a slower disk access speed than RAM. |
Describe the fetch-decode-execute cycle.
Describe the difference between an embedded system and a general-purpose computer system.
The store recommends that Ahmed uses flash memory to store the system BIOS instead of ROM.
Explain why the store has made this recommendation.
Ahmed's new computer will come with 4 GB of RAM as standard, but he is able to upgrade to 8 GB. Give two benefits of upgrading the RAM to 8 GB.
Name two input and two output devices that Ahmed may wish to consider purchasing with his new computer.
Complete the truth table solving the equation:: Z = P·Q̄ + P̄
| P | Q | P·Q̄ | P̄ | Z |
|---|---|---|---|---|
| 0 | 0 | |||
| 0 | 1 | |||
| 1 | 0 | |||
| 1 | 1 |
Clearly showing each step, simplify the following Boolean expression:
A·C + C·(A + B)
Match each protocol with the correct description.
| Description | HTTP | FTP | IMAP | SMTP |
|---|---|---|---|---|
| A protocol that can be used when copying a file from one location to another via a network. | ||||
| The protocol that can be used to transfer multimedia web pages over the internet. | ||||
| An email protocol that stores email messages on a mail server. |
State the role of both the TCP and IP protocols in network communication.
One item of information found in a TCP/IP packet is the Destination Address. Name three other items found in a TCP/IP packet.
Give one advantage and one disadvantage of circuit switching.
Explain how DNS resolves addresses when a user attempts to visit a website.
Convert 89₁₀ into binary.
Convert 01111011₂ into hexadecimal.
Convert FB₁₆ into denary.
Describe the process of carrying out arithmetic shifts to the left and to the right.
Showing your workings, use binary addition to add 00100101₂ and 01111010₂.
Parkwood Vale Groceries wants to store details of the products it sells in a database.
Complete the table using two different data types (not String) and two different methods of validation (not Format or Presence check).
| Field Name | Data Type | Example | Validation |
|---|---|---|---|
| Product ID | String | FR01234 | Format check |
| Product name | String | Cucumber | Presence check |
| Product type | ? | F | ? |
| Weight | ? | 3.54 | ? |
Except for encryption, describe two software methods that could be used to protect the security of staff data.
Demonstrate how 10101010₂ would be encrypted and then decrypted using the XOR encryption method.
The key used is 11110000₂.
Complete the following sentences about the different tools available to a programmer in an IDE.
This program is intended to calculate the area of a circle (A = π r²). The program contains errors. Identify the errors and suggest corrections.
1 Start areaProc
2 area is real
3 pi is real
4 radius is real
5
6 set pi = 3.14
7
8 output "Please enter the radius"
9 input radius
10 area = pi * radius - radius
11 ouptut "The area = ", area
12
13 End areaProc
Give two benefits to programmers of using a high-level programming language.
Name two stages of the compilation process.
Give two principles of the Computer Misuse Act which help businesses protect their data.
Describe three different types of targeted attack against confidential data.
Describe two methods of identifying vulnerabilities.
Describe the purpose of different utility software provided by the operating system and the functionality of the operating system in managing resources.
A school is considering replacing their computers with one of the following:
Computer 1: 5 GHz Dual-core 4MB cache, 4 GB RAM, 4 TB HDD
Computer 2: 2.5 GHz Quad-core 8MB cache, 8 GB RAM, 128 GB SSD
Compare the CPU performance of the two computers in terms of cache size, clock speed and number of cores.
Compare the secondary storage devices used in the two computers.
Computer 1: 4 TB HDD 7200 rpm, DVD/RW
Computer 2: 128 GB SSD, Blu-ray
State the logical operator that produces the following output:
| A | B | C |
|---|---|---|
| 0 | 0 | 0 |
| 1 | 0 | 1 |
| 0 | 1 | 1 |
| 1 | 1 | 0 |
State the logical operator that produces the following output:
| A | B | C |
|---|---|---|
| 0 | 0 | 0 |
| 1 | 0 | 0 |
| 0 | 1 | 0 |
| 1 | 1 | 1 |
Which Boolean expression represents this truth table?
| A | B | C |
|---|---|---|
| 0 | 0 | 0 |
| 1 | 0 | 1 |
| 0 | 1 | 0 |
| 1 | 1 | 0 |
Which Boolean expression represents this truth table?
| A | B | C |
|---|---|---|
| 0 | 0 | 1 |
| 1 | 0 | 0 |
| 0 | 1 | 0 |
| 1 | 1 | 0 |
Match the protocol with the correct description.
| Description | Ethernet | IMAP | SMTP | TCP |
|---|---|---|---|---|
| The protocol that allows packets to be sent and received between computer systems. | ||||
| A protocol that stores email messages on a mail server. | ||||
| The protocol used to deliver email from the sender to an email server. |
Describe the network layer and physical layer in the TCP/IP 5-layer model for data transmission.
Identify one protocol from the following used in each layer:
Protocols: Ethernet, IMAP, SMTP, TCP
Application Layer: ?
Transport Layer: ?
Identify and describe three facilities provided by an IDE (Integrated Development Environment).
Clearly showing each step, simplify:
P · (0 + P)
Clearly showing each step, simplify:
Q · (Q + P) + P · (Q + P)
Complete the table, converting between denary and hexadecimal.
| Denary | Hexadecimal |
|---|---|
| 123₁₀ | 7B₁₆ |
| ? | 29₁₆ |
| 253₁₀ | ? |
Complete the table to calculate the binary addition of 18₁₀ to 89₁₀ using an 8-bit register.
Use a suitable example of binary addition to demonstrate the concept of overflow.
Perform an arithmetic shift left by one place on 01111001₂ and state the effect.
Perform an arithmetic shift right by two places on 01100100₂ and state the effect.
Explain how a graphic is stored using a computer system.
Explain how an analogue sound wave is stored using a computer system.
Explain how text is stored using a computer system.
A compression method uses these ratios:
Lossy: 10:1
Lossless: 10:9
Calculate the resulting file size using each compression type for a 200 KB image.
Explain why one of these compression types (lossy or lossless) is unsuitable for a text document.
Explain the purpose and typical contents of an acceptable network use policy.
Describe the following form of cyberattack: Worms.
Describe the following form of cyberattack: Spyware.
Describe the following form of cyberattack: Trojans.
Describe the following method of identifying vulnerabilities: Footprinting.
Describe the following method of identifying vulnerabilities: Ethical hacking.
Describe the following method of identifying vulnerabilities: Penetration testing.
Describe the functionality of three utility software tools.
Discuss the advantages and disadvantages of different types of interface.
Tick one box only for each device to show if it is used for input, output or storage.
| Description | Input | Output | Storage |
|---|---|---|---|
| Flash drive | |||
| Fingerprint scanner | |||
| Hard disk drive | |||
| Monitor |
Complete the tables to show the relationship between the data storage units.
Tick one box only to match the correct description with the form of cyberattack.
| Description | Worm | Spyware | SQL Injection | Trojan |
|---|---|---|---|---|
| A program that appears to perform a useful function but also provides a 'backdoor' that enables data to be stolen. | ||||
| A program installed by opening attachments that can be used to collect stored data without the user's knowledge. | ||||
| Self-replicating program that identifies weaknesses in operating systems and enables remote control of the infected computer. |
Describe the following method of identifying vulnerabilities:
Footprinting
Describe the following method of identifying vulnerabilities:
Penetration testing
Using the components shown in a Von Neumann type architecture diagram (CPU with ALU, Control Unit, Register, and Main Memory), describe the fetch-decode-execute cycle.
Describe how a RISC type processor differs from a CISC type processor.
Describe the role of a Graphics card (GPU).
Describe the role of a Motherboard.
State the logical operator used in the following truth table:
| A | B | C |
|---|---|---|
| 0 | 0 | 0 |
| 1 | 0 | 1 |
| 0 | 1 | 1 |
| 1 | 1 | 1 |
Which Boolean expression represents the function described by the following truth table?
| P | Q | R |
|---|---|---|
| 0 | 0 | 0 |
| 1 | 0 | 1 |
| 0 | 1 | 0 |
| 1 | 1 | 0 |
Which Boolean expression represents the function described by the following truth table?
| X | Y | Z |
|---|---|---|
| 0 | 0 | 1 |
| 1 | 0 | 0 |
| 0 | 1 | 0 |
| 1 | 1 | 1 |
Complete the truth table for the following Boolean expression:: A + (B + C)
| A | B | C | B+C | A + (B+C) |
|---|---|---|---|---|
| 0 | 0 | 0 | ||
| 0 | 0 | 1 | ||
| 0 | 1 | 0 | ||
| 0 | 1 | 1 | ||
| 1 | 0 | 0 | ||
| 1 | 0 | 1 | ||
| 1 | 1 | 0 | ||
| 1 | 1 | 1 |
Complete the following sentences about the TCP/IP 5-layer model using only the words given.
Draw a diagram of a star network topology.
Give two advantages of a star network topology.
Give one disadvantage of a star network topology.
Describe the typical contents of an acceptable use policy.
Convert 01101010₂ into hexadecimal.
Convert B9₁₆ into binary.
Give one reason why hexadecimal notation is used as shorthand for binary numbers.
Using binary addition, add 10101011₂ to 00110110₂. Show your workings.
State the effect of arithmetic shift functions by one place.
LEFT SHIFT: ?
RIGHT SHIFT: ?
When graphics are stored using a certain computer system, every colour pixel is created using a combination of the three primary colours: red, green and blue. A 600 × 500 pixels 8-bit colour image has been created.
State the range and number of different colours in denary that can be represented using this colour model.
Calculate the storage requirements of a 600 × 500 pixel 8-bit colour image in kilobytes.
Clearly showing each step, simplify the following Boolean expression:
A·(B + B̄)
Clearly showing each step, simplify the following Boolean expression:
A·(A + B) + B·(A + B)
Betty's B&B wants to store booking data on a computer system. The data includes Booking ID, Customer Title, Customer Name, Check in Date, Number of nights, Room Type, Cost and Paid.
State why an array would not be suitable for storing this data.
Give a suitable example of data that may be stored by Betty's B&B using an array.
Design different types of validation check for three of the fields from the booking data table. Do not use presence check in your answer.
For each: state the Field, Type of check, and Rule.
Describe the dangers that organisations face from using computers to store personal data. Do not include malware in your answer.
Explain the need for organisations to make backups and to maintain generations of files.
Describe the need to archive files.
The following program is intended to add together two numbers and output the answer, but it contains errors. Identify three errors in the program and name each error type.
set firstNumber as integer
set secondNumber as integer
input firstNumber
imput secondNumber
output "The sum is, FirstNumber - secondNumber
Describe the environmental impact of digital technology on wider society.
Describe the principal stages of the compilation process.