0% found this document useful (0 votes)
65 views15 pages

4 Mock Examinations: Candidate Name: Candidate Number: Centre Number

This document is a mock examination paper for Year 11 Computer Science, covering various topics such as input/output devices, CPU components, error codes, encryption methods, logic statements, and web security. It includes instructions for candidates and a series of questions with allocated marks. The exam duration is 1 hour and 45 minutes, and candidates must answer all questions in the provided spaces.

Uploaded by

Farid Aiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views15 pages

4 Mock Examinations: Candidate Name: Candidate Number: Centre Number

This document is a mock examination paper for Year 11 Computer Science, covering various topics such as input/output devices, CPU components, error codes, encryption methods, logic statements, and web security. It includes instructions for candidates and a series of questions with allocated marks. The exam duration is 1 hour and 45 minutes, and candidates must answer all questions in the provided spaces.

Uploaded by

Farid Aiman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Candidate Name:

Candidate Number:

Centre Number:

KEY STAGE: 4 2024/2025

MOCK EXAMINATIONS

COMPUTER SCIENCE P1
Year 11
1 HOUR 45 MINUTES

DO NOT OPEN THIS BOOKLET UNTIL INSTRUCTED

1. Answer all questions in the space provided.


2. Write using a black or dark blue pen only.
3. Marks for each section is shown next to the set of instructions. E.g (10 Marks)
4. Do NOT use an erasable pen or correction fluid.

Prepared by : Mr Khairul Johar


SUBJECT TEACHER
MARKS
Answer all the questions.
(75 Marks)

1 A shopping mall has an information point. Visitors can use it to


find out which shops are in the mall and where they are located.

a) Identify one input device that could be built into the


information point.

Give an example of how that device would be used.

Input device__________________________________

Example_____________________________________ [2M]

b) Identify one output device that could be built into the


information point.

Give an example of how that device would be used.

Output device_________________________________

Example_____________________________________ [2M]

1
c) Identify one example of primary storage that could be
built into the information point.

State what would be stored in your example of primary


storage.
________________________________________________

________________________________________________

________________________________________________

________________________________________________ [2M]

2 Phil has a computer that is designed using the Von


Neumann model. The computer has a central processing
unit (CPU).

a) One type of component within the CPU is an address bus.

Identify two other types of bus and state what each is


responsible for transmitting in the CPU.

Bus 1___________________________________________
________________________________________________

Bus 2___________________________________________
________________________________________________ [4M]

b) The CPU performs a cycle that has three stages. One of


these stages is execute.

Identify one other stage of the cycle that is performed by


the CPU.
______________________________________________________ [1M]

2
c) Identify the component within the CPU that the
accumulator is built into and describe the purpose of the
accumulator.
________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________ [3M]

3 Error codes for a computer are often displayed as


hexadecimal values. Each error code is stored in a 12-bit
binary register.

a) The error code 404 means ‘file not found’.

Give the 12-bit binary value that would be stored for the
hexadecimal error code 404
________________________________________________

Working space
________________________________________________

________________________________________________

________________________________________________ [2M]

b) The error code 12B means ‘hardware fault’.

Give the 12-bit binary value that would be stored for the
hexadecimal error code 12B
________________________________________________ [1M]

3
Working space
________________________________________________

________________________________________________

________________________________________________ [2M]

c) Hexadecimal values can also be represented as denary


values.

The hexadecimal error code 022 means ‘file system


error’. The hexadecimal error code 0AC means
‘insufficient memory’.

Convert the hexadecimal error codes 022 and 0AC to


denary values.

022_________________________________________

0AC____________________________________________

Working space
________________________________________________

________________________________________________

________________________________________________

________________________________________________ [2M]

d) The register stores the binary value 100111100000

Give the hexadecimal error code that would be displayed


for the binary value 100111100000
________________________________________________

4
Working space
________________________________________________

________________________________________________

________________________________________________ [2M]

e) Give two reasons why error codes are represented in


hexadecimal, instead of binary.

Reason 1________________________________________
________________________________________________

Reason 2________________________________________
________________________________________________ [2M]

4 Rebekah discovers that her bank details have been used


fraudulently.

She thinks her bank details were stolen electronically, whilst


she was using the Internet.

a) Identify and describe two methods that could have been


used to steal Rebekah’s bank details electronically.

Method 1 ____________________________________
________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

5
Method 2 ____________________________________
________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________ [6M]

b) Rebekah decides to encrypt the data that she transmits


whilst using the Internet. She does this to keep the data
safe.

i) State why encryption helps keep the data safe.


________________________________________________

________________________________________________

ii) The data is encrypted using symmetric encryption.

Describe how the data is encrypted using symmetric


encryption.
________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________ [4M]

6
iii) Identify three other methods Rebekah could use to help
keep her data safe.

Method 1________________________________________
Method 2________________________________________
Method 3________________________________________ [3M]

7
5 Consider the logic statement:

X = ((((B OR C) AND NOT C) NAND B) OR NOT A)

a) Draw a logic circuit to represent the given logic


statement.

Do not attempt to simplify the logic statement. All logic


gates must have a maximum of two inputs.

[6M]

b) State the name of one logic gate that is not included in


the given logic statement.

________________________________________________ [1M]

8
c) Complete the truth table for the given logic statement.
A B C Working space x
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
[4M]

6 A computer sends the data for an image to the print buffer, to


wait to be processed for printing, until the buffer is full.

When the buffer is no longer full, it sends a signal back to the


computer to state it is ready for more data.

State the name of this signal and give two other examples of
when this type of signal is used.

Signal name __________________________________________


Examples ____________________________________________
______________________________________________________

______________________________________________________

______________________________________________________

______________________________________________________ [3M]

9
7 Cameron writes software for coffee machines. He uses
assembly language to write his software.

A) Tick (✓) to show whether assembly language is an


example of a high-level language, a low-level language
or machine code.
Tick (✓)
High-level language

Low-level language

Machine language [1M]

b) Identify the translator that is required for assembly


language.
________________________________________________ [1M]

c) Give two reasons why Cameron chooses to write the


software for the coffee machines in assembly language.

Reason 1________________________________________
________________________________________________

Reason 2________________________________________
________________________________________________ [2M]

10
d) Give two drawbacks of using assembly language to write
programs.

Drawback 1______________________________________
________________________________________________

Drawback 2______________________________________
________________________________________________ [2M]

8 Eleanor has a website that she uses to advertise the cakes that
she bakes.

a) Hypertext Markup Language (HTML) is used to create the


website. The HTML is separated into presentation and
structure.

i) Give two examples of HTML presentation.

Example 1_______________________________________
Example 2_______________________________________ [2M]

ii) Give two examples of HTML structure.

Example 1 ______________________________________
Example 2 ______________________________________ [2M]

b) Eleanor uses a secure connection to allow customers to


buy the cakes from her website. Describe how the secure
connection is created.
________________________________________________

________________________________________________

11
________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________ [5M]

c) Eleanor’s website uses cookies.


________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________ [4M]

d) Eleanor is worried about a denial of service (DoS) attack


on her web server.

She wants to help prevent a DoS attack reaching the web


server.

Identify a security method that she could use to help


prevent a DoS attack.

Explain how the method you identify helps to prevent the


attack.

12
Security method__________________________________
Explanation______________________________________
________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________

________________________________________________ [4M]

END OF QUESTION PAPER

13

You might also like