Documente Academic
Documente Profesional
Documente Cultură
Y10 HL P1
Dave Walker
Candidate Candidate
forename surname
INSTRUCTIONS TO CANDIDATES
• Write your name, centre number and candidate number in the boxes above. Please write clearly and in capital letters.
• Use black ink. HB pencil may be used for graphs and diagrams only.
• Answer all the questions, unless your teacher tells you otherwise.
• Read each question carefully. Make sure you know what you have to do before starting your answer.
• Where space is provided below the question, please write your answer there.
• You may use additional paper, or a specific Answer sheet if one is provided, but you must clearly show your candidate number, centre number
and question number(s).
1. State the output of each of the following logic circuits for the inputs given.
© OCR 2017. You may photocopy this page. Page 1 of 18 Created in ExamBuilder
[2]
2. The logic diagram below (Fig. 2) shows a system made up of two connected logic gates.
Fig.2
[2]
(i) Label the names of the two gates on the diagram above.
(ii
Complete the truth table below to show the output from this logic system.
)
A B Q
0 0
0 1
1 0
1 1
[4]
© OCR 2017. You may photocopy this page. Page 2 of 18 Created in ExamBuilder
3. The following logic diagram shows the expression NOT (a AND b).
Complete the missing boxes in the truth table below to show the value of NOT (a AND b)
that will be output for each possible set of values of a and b.
[4]
4. The logic diagram below (Fig. 2) shows a system made up of two connected logic gates.
Fig.2
© OCR 2017. You may photocopy this page. Page 3 of 18 Created in ExamBuilder
[2]
5. Xander’s tablet computer comes with system software, including an operating system and
utility system software.
Identify three ways that Xander can make use of the file management facility.
1
2
3
[3]
6(a). Explain how defragmentation software could overcome the issue of the slow computer
system.
[3]
(b). A restaurant has a computer-based ordering system which is running slowly. A technician
has said that the hard disc drive is fragmented. The technician has suggested using utility
software to defragment the drive.
Explain how the restaurant's hard disc could have become fragmented.
© OCR 2017. You may photocopy this page. Page 4 of 18 Created in ExamBuilder
[4]
Identify the backup method William should use to backup the computer, justifying
your choice.
Method
:
Justification
:
iii. Give one additional utility program William could make use of and describe how he
would use it.
Utility
program:
Description of
use:
8. Amin buys a new computer with an operating system and some utilities.
Tick one box in each row to show whether the utility is used for security or disk
organisation.
© OCR 2017. You may photocopy this page. Page 5 of 18 Created in ExamBuilder
9. A doctor's surgery stores hundreds of patients' details on its computer network. The
surgery is concerned about the security of its patients' sensitive medical data.
Identify three errors that the surgery's staff could make, that may endanger the security of
the network and outline a procedure that could be put in place to prevent each error.
[6]
10. A school has all of its computers in a local area network (LAN).
Explain two measures which the school will need to take to ensure the security of the
network.
1
2
[4]
11. A house has computers in each room and a central router. Every room allows both
Ethernet and WiFi connections to the router.
The house owner is concerned about potential threats to the network from being
connected to the Internet.
i. Describe three possible threats to the computers connected to the network and give
one way each threat can be reduced or prevented.
Threat
1
ii.
iii.
© OCR 2017. You may photocopy this page. Page 6 of 18 Created in ExamBuilder
iv.
Preventio
n
Threat
2
vi.
vii.
viii.
Preventio
n
Threat
3
x.
xi.
xii.
Preventio
n
12. Vicky has been on holiday and has taken lots of photos. The memory in her camera is now
full and she needs to transfer her photos to an external secondary storage device.
[1]
13. William is creating a film for a school project using a digital video camera.
[2]
Explain why solid state storage is the most appropriate type of storage for the digital
video camera.
© OCR 2017. You may photocopy this page. Page 7 of 18 Created in ExamBuilder
[4]
14. Apu has a handheld e-book reader that allows him to store and read electronic books.
i. State which type of storage is most suitable for storing the electronic books inside
the e-book reader.
[1]
ii. Explain one reason why this type of storage is the most suitable.
[2]
© OCR 2017. You may photocopy this page. Page 8 of 18 Created in ExamBuilder
Mark scheme
Questi Mar
Answer/Indicative content Guidance
on ks
Examiner's Comments
1
0.
1 2 Most candidates answered correctly. As expected, some weaker candidates
were less able to work with the logic gates in combination
(respectively)
Total 2
2 i AND / conjunction 2
NOT / negation
1 1 0 achieved 2 marks. The most common incorrect answer was to mix up AND and
OR for the first gate. For part (ii), candidates were able to apply their knowledge
successfully with the majority of all candidates achieving 4 marks. This topic has
been covered successfully by centres and that this work is reflected in
examination responses.
Total 6
Examiner's Comments
3 4
This part was well answered by the majority of candidates, indicating that logic
and truth tables – a core concept in computer science – is understood by most
candidates.
1 mark for row two and three. For row 4, 1 mark for
correctly identifying 1 1 as the inputs, and 1 mark for the
correct output 0)
© OCR 2017. You may photocopy this page. Page 9 of 18 Created in ExamBuilder
Total 4
First mark can be awarded if candidate has either a NOT gate from B, or an OR
gate with two inputs anywhere in their answer.
Second mark is only awarded of the logic system as shown is given with no
other additional gates.
Correct logic diagrams needed for OR and NOT, including circle on NOT. Use
1 mark per bullet, max 2
professional judgement. Ignore labelling.
Examiner’s Comments
Boolean symbols and notations that may be used in examinations are shown in
4 2 appendix 5f of the specification. Candidates will never be expected to use these
symbols in their own responses (AND, OR and NOT are perfectly acceptable)
but they must be aware of how questions on papers may be written.
For this question, it was obvious that some groups of candidates did not
OR gate with two inputs / NOT gate on B input
understand the symbols in the question and so were not able to provide a
Logic system as above with no other gates, with
suitable response. However, it was pleasing to see that this was not at all the
labelled inputs of A and B.
majority and that large numbers of candidates were able to not only understand
the question but also provide a correct or partially correct response.
Where responses were incorrect, a common mistake was to utilise the NOT gate
after the output from the OR gate when in fact the NOT gate should be applied
to the input from B before this feeds into the OR gate. Another common mistake
was to forget to label up inputs as A and B, therefore not allowing the examiner
to award the mark for the NOT gate on the correct input.
Total 2
5 1 mark per bullet to max 3 3 Answers must be clear as to what the answer is applied to i.e. 'you
e.g. AO2 can open it' - what is it?
1a Mark first answer on each section.
He can place his files into folders/directories (3) Do not award:
He can (re)name files/folders o defragment
He can view file details/extensions/file size/type 'Organise files' without what into - is not enough.
He can create files/folders
He can sort files/folders / he can put files into a
specific order / by example
He can open files/folders Examiner’s Comments
© OCR 2017. You may photocopy this page. Page 10 of 18 Created in ExamBuilder
Only a few candidates were able to identify three correct ways.
Total 3
Total 7
7 i 1 mark per bullet to max 3 3 Discussion must match the backup given.
e.g. AO2
Incremental: 1a Either method is acceptable, marks are awarded for the justification.
(1)
Only the changes need to be backed up AO2
The software/OS/settings are unlikely to have 1b
changed between backups (2) Allow marks for why the other is not appropriate.
Small number of files likely to be used/edited
between backups If there is no method given, or both, then read the answer and mark their
Take less time to backup justifications. It must be clearly given which method each point refers to.
Each backup will take less memory space to
store
Full:
© OCR 2017. You may photocopy this page. Page 11 of 18 Created in ExamBuilder
chosen. Some candidates successfully identified that both would be appropriate,
and gave a reasoned justification that incorporated the use of both. For example
using a full backup initially and then incremental for the successive backups.
i 1 mark for naming program, 2 for description of use 3 Must be appropriate to scenario.
i e.g. AO1
1a
Encryption software (1)
Scramble/encode/mix up data AO1 For encryption, no mark for ‘it encrypts data’
…so it cannot be read/understood if 1b Do not award: any form of backup or device driver.
intercepted/stolen (1)
AO2
1b
(1) Do not award: encryption stops data being stolen.
Defragmentation
Move free space together Do not award: brand names. But read description.
Move files together
E.g. Faster access to files
Mark program first. If incorrect 0 marks. If wording is not clear, or terminology
not exact but it can be understood, marks can be awarded for description of use.
(Data) compression
Reduce the file size of files / makes files smaller
To use less storage space Defragmentation – do not award marks for describing a fragmented disk this is a
Anti-virus / anti-malware
To help protect computer/data against
viruses/malware
To scan the computer to look
for/quarantine/remove viruses/malware
Auto-update
Checks Internet for new versions of software/OS
Downloads and installs without user interaction
Examiner’s Comments
Firewall
Examine ingoing and outgoing traffic
This was an open question that required candidates to consider utility programs
To help restrict/prevent unauthorised access
they have learnt about and choose one that would be appropriate for an
…over a network/external source
individual user.
The most common answer was defragmentation. Candidates were then required
to describe its use. Many candidates described a fragmented disc and the
© OCR 2017. You may photocopy this page. Page 12 of 18 Created in ExamBuilder
problems associated with it – which does not answer the question. Some
candidates then described the use of a defragmenter to speed up access to
files. A common misunderstanding here was that a defragmenter increases the
speed of a computer. Speed requires quantification in an answer, because it
does not make a computer work faster, or process data faster, it allows faster
access to the stored data.
Exemplar 3
This candidate has given defragmentation. They have then explained how a disc
becomes fragmented, which does not gain marks because it is not answering
the question. At the end of their answer, they explain how defragmentation is
used to group files together, and making the retrieval of the files more efficient.
Total 6
Used for
Used for disk
Utility
security organisatio
n
Examiner's Comments
Antivirus ?
8 4
Defragmen This question was answered correctly by almost all candidates.
?
ter
File
?
transfer
Firewall ?
Total 4
9 Brings in files via any medium (1- AO2 1a)… 6 1 mark to be awarded for each correct identification to a maximum of 3 marks.
…not allowing/stopping external devices being (AO2 1b)
used on the network (1-AO2 1b)
Downloading infected files from the internet (1 - 1 mark to be awarded for each correct outlining of a procedure to a maximum of
AO2 1a)… 3 marks. (AO2 1b)
…blocking/restricting access tinsecure websites
(1 - AO2 1b) Allow any reasonable combination of error and reasonable procedure to mitigate
Allowing physical access to the surgery's the risk.
network (1 - AO2 1a)…
…locking of doors/key cards/any physical
security procedure (1 - AO2 1b)
© OCR 2017. You may photocopy this page. Page 13 of 18 Created in ExamBuilder
Sending/sharing sensitive data with third parties
(1- AO2 1a)…
… blocking/restricting access to USB
ports/email/internet/printing (1 - AO2 1b)
Total 6
e.g.
Total 4
1 1 mark for naming threat, 1 for description, 1 for 9 Must be relevant to home use i.e. not denial of service, SQL injection.
1 prevention. AO1
Max 3 per threat 1b
(3) Do not allow adware, spam.
e.g. AO2
1a
Virus / trojan / worm / malware (3) Do not allow backup as a prevention – it does not prevent the threat occurring.
Piece of software/code/a program that replicates AO2 Do not allow encryption for stopping a hacker.
itself / causes damage e.g. editing/deleting files 1b
Running anti-virus/anti-malware software / don’t (3)
download from unknown sources / don’t click on Description must do more than repeat the threat.
unknown links
Spyware / malware / keylogger Read whole response to threat, identify threat first (may not be at the start and
Piece of software/code/a program that records may be within description), then look for description.
Only award malware once, for virus or spyware e.g. virus identified, then
© OCR 2017. You may photocopy this page. Page 14 of 18 Created in ExamBuilder
malware identified both can be awarded.
Data interception / passive Virus, then malware, then spyware, would get a repeat for final spyware.
Data is sent to another device and is intercepted
by a third party
Encryption Allow:
Ransomware
Prevents access to your files unless a ransom is paid
Phishing Anti-virus/firewall
An e-mail has a link that when clicked directs
the user to a fake website that collects personal
data
Network policy / firewall
Pharming
A piece of code installed that redirects user to
fake website that collects personal data
Anti-malware / firewall
Hacker
Person attempting to gain unauthorised access
to the network/computers/ data/files / Examiner’s Comments
Firewall / strong password / biometrics / and computers that they have learnt about, and to identify which are appropriate
penetration testing in this situation. Most candidates were able to identify three threats, but at times
these were not appropriate to the scenario, for example describing denial of
service threats to a website, and SQL injection. This identifies the importance of
candidates reading the questions carefully and identifying whether it is asking for
a generic response i.e. a recall of knowledge (AO1), or an application of their
Brute force attack
knowledge (AO2). The most common threats identified included viruses and
Person/software using every combination of
hackers, with candidates being able to describe the threats and identify
passwords to gain access
appropriate measures to prevent them. Some candidates gave repeated
Firewall/strong passwords
answers, for example giving a virus as a threat, then a worm, then a Trojan –
both of which are examples of viruses therefore already covered by their
previous answer.
Social engineering
Exemplar 5
Person being the weak point of the system / by
example e.g. any example of deception
e.g. Strong passwords / check validity of
sources
© OCR 2017. You may photocopy this page. Page 15 of 18 Created in ExamBuilder
This candidate has given DDOS for the first answer which is not appropriate to
the context; this is a threat to a webserver which is not part of the house owner’s
home network. They have given two further appropriate threats, described these
appropriately and given reasonable preventions. It is important that candidates
consider the context and give threats that are appropriate to the situation given in
the question.
Total 9
Total 1
Examiner’s Comments
This question required candidates to consider the device, its use and the
purpose of secondary storage in this situation. Many candidates were able to
identify the need of the device to store data. More able candidates were able to
extend this to explain the need to store it after the device is turned off, or for
transporting the data to another device. A common error was describing the
© OCR 2017. You may photocopy this page. Page 16 of 18 Created in ExamBuilder
need for backing up the data or that there was insufficient storage in the primary
memory which demonstrated a lack of understanding about the differences
between primary and secondary memory.
Award marks for why solid state is most appropriate, not why others aren’t.
1 mark per bullet to max 4 Award descriptions of portable/durable etc., not looking for key words.
Max 3 if only stating features
e.g. Do not just allow can transfer data elsewhere.
Fastest without quantifying read/write speed is not enough.
Portable
Lightweight Allow: quietest and expansion.
…e.g. device needs to be carried
4
Small physical size
AO1
…e.g. can fit in a small camera Do not award cost.
1b
Durable
(1)
No moving parts Small on its own is insufficient as it could mean physical or memory size.
i AO2
…e.g. device is moved so may be dropped /
i 1a
won’t be damaged when moving around
(1)
Reliable Examiner’s Comments
AO2
…e.g. needs to work when out in the ‘field’
1b
Sufficient/large capacity This question required candidates to consider the use of the digital video
(2)
Videos are large file size / store more videos camera, the benefits of solid state storage, and where these meet. More able
Fast access/read/write speed candidates were able to identify the number of benefits and expanded these to
…e.g. the device will retrieve the videos without explain why they were useful in this specific scenario. Less able candidates
delay often gave generic benefits of solid state storage devices, without applying them
Efficient power consumption to this scenario. In some cases lists of benefits were given, which would support
…e.g. run on battery / longer battery life a question asking them to state the benefits, but the use of explain required
candidates to give further explanation. The most common answers related to the
durability and robustness of the device. Some candidates repeated their
response to part (a) (i) where they explained the purpose of secondary storage,
and did not identify the specific type of storage the question required.
Total 6
1 Solid state
i 1
4
i Fast access… 2 No follow through from (i). Candidates need to identify a relevant characteristic
i … less delays when turning the device on / of solid state storage for the first mark, and expand by explaining why this is an
turning pages etc… advantage in an e-book reader for the second mark.
Note that portable / capacity are not acceptable answers here (as solid state
storage is not particularly more portable / larger than other forms of storage for
No moveable parts / robust this application)
… can be handled / manipulated / moved
without damaging it Examiner's Comments
© OCR 2017. You may photocopy this page. Page 17 of 18 Created in ExamBuilder
low power
magnetic and optical storage are not suitable.
… to extend battery life of reader
Total 3
© OCR 2017. You may photocopy this page. Page 18 of 18 Created in ExamBuilder