Candidate Name:
Candidate Number:
Centre Number:
KEY STAGE: 4 2024/2025
MOCK EXAMINATIONS
COMPUTER SCIENCE P1
Year 11
1 HOUR 45 MINUTES
DO NOT OPEN THIS BOOKLET UNTIL INSTRUCTED
1. Answer all questions in the space provided.
2. Write using a black or dark blue pen only.
3. Marks for each section is shown next to the set of instructions. E.g (10 Marks)
4. Do NOT use an erasable pen or correction fluid.
Prepared by : Mr Khairul Johar
SUBJECT TEACHER
MARKS
Answer all the questions.
(75 Marks)
1 A shopping mall has an information point. Visitors can use it to
find out which shops are in the mall and where they are located.
a) Identify one input device that could be built into the
information point.
Give an example of how that device would be used.
Input device__________________________________
Example_____________________________________ [2M]
b) Identify one output device that could be built into the
information point.
Give an example of how that device would be used.
Output device_________________________________
Example_____________________________________ [2M]
1
c) Identify one example of primary storage that could be
built into the information point.
State what would be stored in your example of primary
storage.
________________________________________________
________________________________________________
________________________________________________
________________________________________________ [2M]
2 Phil has a computer that is designed using the Von
Neumann model. The computer has a central processing
unit (CPU).
a) One type of component within the CPU is an address bus.
Identify two other types of bus and state what each is
responsible for transmitting in the CPU.
Bus 1___________________________________________
________________________________________________
Bus 2___________________________________________
________________________________________________ [4M]
b) The CPU performs a cycle that has three stages. One of
these stages is execute.
Identify one other stage of the cycle that is performed by
the CPU.
______________________________________________________ [1M]
2
c) Identify the component within the CPU that the
accumulator is built into and describe the purpose of the
accumulator.
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________ [3M]
3 Error codes for a computer are often displayed as
hexadecimal values. Each error code is stored in a 12-bit
binary register.
a) The error code 404 means ‘file not found’.
Give the 12-bit binary value that would be stored for the
hexadecimal error code 404
________________________________________________
Working space
________________________________________________
________________________________________________
________________________________________________ [2M]
b) The error code 12B means ‘hardware fault’.
Give the 12-bit binary value that would be stored for the
hexadecimal error code 12B
________________________________________________ [1M]
3
Working space
________________________________________________
________________________________________________
________________________________________________ [2M]
c) Hexadecimal values can also be represented as denary
values.
The hexadecimal error code 022 means ‘file system
error’. The hexadecimal error code 0AC means
‘insufficient memory’.
Convert the hexadecimal error codes 022 and 0AC to
denary values.
022_________________________________________
0AC____________________________________________
Working space
________________________________________________
________________________________________________
________________________________________________
________________________________________________ [2M]
d) The register stores the binary value 100111100000
Give the hexadecimal error code that would be displayed
for the binary value 100111100000
________________________________________________
4
Working space
________________________________________________
________________________________________________
________________________________________________ [2M]
e) Give two reasons why error codes are represented in
hexadecimal, instead of binary.
Reason 1________________________________________
________________________________________________
Reason 2________________________________________
________________________________________________ [2M]
4 Rebekah discovers that her bank details have been used
fraudulently.
She thinks her bank details were stolen electronically, whilst
she was using the Internet.
a) Identify and describe two methods that could have been
used to steal Rebekah’s bank details electronically.
Method 1 ____________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
5
Method 2 ____________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________ [6M]
b) Rebekah decides to encrypt the data that she transmits
whilst using the Internet. She does this to keep the data
safe.
i) State why encryption helps keep the data safe.
________________________________________________
________________________________________________
ii) The data is encrypted using symmetric encryption.
Describe how the data is encrypted using symmetric
encryption.
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________ [4M]
6
iii) Identify three other methods Rebekah could use to help
keep her data safe.
Method 1________________________________________
Method 2________________________________________
Method 3________________________________________ [3M]
7
5 Consider the logic statement:
X = ((((B OR C) AND NOT C) NAND B) OR NOT A)
a) Draw a logic circuit to represent the given logic
statement.
Do not attempt to simplify the logic statement. All logic
gates must have a maximum of two inputs.
[6M]
b) State the name of one logic gate that is not included in
the given logic statement.
________________________________________________ [1M]
8
c) Complete the truth table for the given logic statement.
A B C Working space x
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4M]
6 A computer sends the data for an image to the print buffer, to
wait to be processed for printing, until the buffer is full.
When the buffer is no longer full, it sends a signal back to the
computer to state it is ready for more data.
State the name of this signal and give two other examples of
when this type of signal is used.
Signal name __________________________________________
Examples ____________________________________________
______________________________________________________
______________________________________________________
______________________________________________________
______________________________________________________ [3M]
9
7 Cameron writes software for coffee machines. He uses
assembly language to write his software.
A) Tick (✓) to show whether assembly language is an
example of a high-level language, a low-level language
or machine code.
Tick (✓)
High-level language
Low-level language
Machine language [1M]
b) Identify the translator that is required for assembly
language.
________________________________________________ [1M]
c) Give two reasons why Cameron chooses to write the
software for the coffee machines in assembly language.
Reason 1________________________________________
________________________________________________
Reason 2________________________________________
________________________________________________ [2M]
10
d) Give two drawbacks of using assembly language to write
programs.
Drawback 1______________________________________
________________________________________________
Drawback 2______________________________________
________________________________________________ [2M]
8 Eleanor has a website that she uses to advertise the cakes that
she bakes.
a) Hypertext Markup Language (HTML) is used to create the
website. The HTML is separated into presentation and
structure.
i) Give two examples of HTML presentation.
Example 1_______________________________________
Example 2_______________________________________ [2M]
ii) Give two examples of HTML structure.
Example 1 ______________________________________
Example 2 ______________________________________ [2M]
b) Eleanor uses a secure connection to allow customers to
buy the cakes from her website. Describe how the secure
connection is created.
________________________________________________
________________________________________________
11
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________ [5M]
c) Eleanor’s website uses cookies.
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________ [4M]
d) Eleanor is worried about a denial of service (DoS) attack
on her web server.
She wants to help prevent a DoS attack reaching the web
server.
Identify a security method that she could use to help
prevent a DoS attack.
Explain how the method you identify helps to prevent the
attack.
12
Security method__________________________________
Explanation______________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________ [4M]
END OF QUESTION PAPER
13