Mock Paper Solution
Mock Paper Solution
© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
Question Answer Mark
1(a)(i) B (local area network) 1
1(a)(ii) B (server) 1
1(a)(iii) Any three of the following:
network interface card
wireless access point
switch
hub
(copper) cable
fibre-optic cable
booster 3
1(b)(i) C (web browser) 1
1(b)(ii) MAC – any two from the following:
unique identifier given to a device that can connect to a
network
assigned by the manufacturer
made up of the manufacturer number
followed by the serial number.
Esafety
access to inappropriate material
access to people they do not know
the students will need additional lessons on how to stay
safe.
Collaborative methods 8
© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
Students can communicate using a range of methods, e.g:
emailing each other and teachers
joining forums to communicate with others internal and
external to the school
social networking sites.
Social interaction
students can communicate with each other e.g. email
students can communicate with other children around the
world
access to other cultures and experiences they may not
otherwise have
students will have access to social networking (which they
are too young to access).
Cyberbullying
students may receive upsetting or hurtful messages
students may undertake cyberbullying of each other or
other people.
Security
The school will need to set up security measures to
protect the data e.g. anti-virus, firewall.
The school will need to restrict the sites students can
access.
1(e) Any four from the following:
wall/timeline
noticeboard
ability to upload files
quizzes/tests
tool to submit assignments
forum
blog
wiki
log-in system
document creator
document editor
statistics (for teachers to access)
set up classrooms and assign students to classes. 4
1(f) Any two from:
eye strain from looking at a screen too long, or working
without adequate breaks or with inadequate lighting
RSI from using a keyboard incorrectly or from poor
posture
back/neck pain from poor posture or non-ergonomic
chairs
trip/fall from poorly designed furniture or loose cables
electric shock from damaged cables 4
Total marks for Question 1 = 33
© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
2(a)(i) Any two from:
virus (software that replicates and damages/deletes data)
accidental deletion (from inadequate validation or
insufficient training)
hardware malfunction (disk error/power cut deleting data)
phishing (personal data (e.g. passwords) given away,
fake email tricking a user into inputting personal data)
pharming (personal data (e.g. passwords) given away,
fake website tricking a user into inputting personal data)
spyware (software records key presses and sends them
to third party). 4
2(a)(ii) Any three from:
include letters
lower case and upper case
increase the length
include other characters e.g. # 3
2(a)(iii) Any two from:
anti-virus (scans the data/files and removes/quarantines
viruses)
firewall (scans incoming transmissions and stops
unauthorised signals)
encryption (scrambles data so if it is stolen it cannot be
understood)
anti-spyware (scans the data/files and
removes/quarantines spyware)
permissions/access rights (stop people editing/accessing
files) 4
2(b) Any two from:
https (hypertext transfer protocol secure)
encrypts data transmission
secure socket layer / transport layer security 2
2(c) A description from:
access to more customers (1) therefore can make
more sales (1) and more profit (1).
less store space required (1), which will save money
(1) because they do not need to pay for rent/staff etc.
(1)
access to competitors (1), therefore can remain
competitive (1)
advertising (1), can set up a website (1) and can
upload images of products (1). 4
2(d) A description from:
Follow the data protection laws (1), personal data is
protected (1). It must be collected for the purposes
stated (1).
It must be kept secure (1).
It must not be kept for longer than necessary (1).
He must inform people of the data being stored (1).
Allow people the opportunity to update/amend the
data (1). 3
Total marks for Question 2 = 20
© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
3(a)(i) Any three from:
set up accounts
‘about you’ section
timeline
wall
messages
add images
make ‘friends’
post
like posts
comment on posts
join groups.
3
3(a)(ii) Any two from:
connect with people (1), communicate personal details (1),
make new connections (1)
join groups of similar interests (1), create new contacts (1),
share tips and hints (1)
instantly message people (1), send free messages (1)
share experiences (1), keep in touch with people (1).
4
3(b) Any two from:
outline what users can do
outline what users are not allowed to do
reduce inappropriate behaviour / cyberbullying
restrict use
outline consequences of inappropriate behaviour
protect other people.
2
3(c) Candidates should explain the factors that need to be
considered before upgrading devices.
The indicative content is not exhaustive/prescriptive and
students should be credited for any relevant content.
Environmental impact
Compatibility
New devices may be more compatible with each other,
or other devices.
New devices may not be compatible with old software,
files or hardware.
Cost
Cost of new devices may be high. Could she sell old
devices to recoup costs?
© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
Efficiency
New devices may run faster, and make more efficient
use of memory, etc., enabling her to complete work
faster, or give faster response times.
Benefits
easier to use (1) as only one type of item to select
(menu) (1)
easier to create (1) as only menu feature to program (1)
use less storage (1) as no requirement to store, e.g.
icons (1).
Drawbacks
can be time consuming to navigate (1) as user may need
to go through lots of different menus (1)
provides limited ability to select different items (1) as only
has menu feature (1).
6
4(d)(i) B (Operating system) 1
4(d)(ii) Two descriptions from:
There could be security vulnerabilities or bugs (1). This
may allow easier access for a hacker (1).
There may be compatibility issues (1). This may mean
hardware devices are not able to communicate with each
other (1).
There may be reduced performance (1), making the
computer more difficult to use (1). 4
Total marks for Question 4 = 16
© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
5(b)(i) A description from:
It will increase the clock speed (1), the processor will now be
able to run more cycles per second (1). This means that more
instructions can be completed per second (1). 2
5(b)(ii) Increase the amount of RAM (from 4GB to 8GB).
Change the HDD for an SSD. 2
5©(i) One description from:
Files can be set to back-up automatically (1) so George
doesn’t need to worry about doing this manually (1).
It reduces the amount of storage space George needs on
his computer (1), this gives him more storage for local
files (1).
The back-up is held separate from George’s computer
(1) so, if his fails, he doesn’t lose the data (1). 2
5©(ii) Two descriptions from:
An internet connection is needed to access the data (1).
If there is not one present George cannot run a back-up
(1)
George is not in control of the security of his data (1), he
must rely on a third-party to secure his data for him (1)
There could be possible data protection issues (1) if
George’s data is stored in a country that does not have a
strong policy.
4
Total marks for Question 5 = 14
Total for Paper 1 = 98
© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.