Sunteți pe pagina 1din 18

Computer Science (9-1)

Y10 HL P1
Dave Walker

22nd June 2020

Please note that you may see slight differences


between this paper and the original.
Duration: Not set     
Candidates answer on the Question paper.

OCR supplied materials:


Additional resources may be supplied with this paper.

Other materials required:


•   Pencil
•   Ruler (cm/mm)

Candidate Candidate
forename surname

Centre number Candidate number

INSTRUCTIONS TO CANDIDATES
•   Write your name, centre number and candidate number in the boxes above. Please write clearly and in capital letters.
•   Use black ink. HB pencil may be used for graphs and diagrams only.
•   Answer all the questions, unless your teacher tells you otherwise.
•   Read each question carefully. Make sure you know what you have to do before starting your answer.
•   Where space is provided below the question, please write your answer there.
•   You may use additional paper, or a specific Answer sheet if one is provided, but you must clearly show your candidate number, centre number
    and question number(s).

INFORMATION FOR CANDIDATES


•   The quality of written communication is assessed in questions marked with either a pencil or an asterisk. In History and Geography
    a Quality of extended response question is marked with an asterisk, while a pencil is used for questions in which Spelling, punctuation and
    grammar and the use of specialist terminology is assessed.
•   The number of marks is given in brackets [ ] at the end of each question or part question.
•   The total number of marks for this paper is 63.
•   The total number of marks may take into account some 'either/or' question choices.

1. State the output of each of the following logic circuits for the inputs given.

© OCR 2017. You may photocopy this page. Page 1 of 18 Created in ExamBuilder
[2]
 

2. The logic diagram below (Fig. 2) shows a system made up of two connected logic gates.

Fig.2

[2]

(i) Label the names of the two gates on the diagram above.

(ii
Complete the truth table below to show the output from this logic system.
)
  A B Q  
  0 0    
  0 1    
  1 0    
  1 1    
[4]

© OCR 2017. You may photocopy this page. Page 2 of 18 Created in ExamBuilder
 

3. The following logic diagram shows the expression NOT (a AND b).

Complete the missing boxes in the truth table below to show the value of NOT (a AND b)
that will be output for each possible set of values of a and b.

[4]
 

4. The logic diagram below (Fig. 2) shows a system made up of two connected logic gates.

Fig.2

Draw the logic diagram represented by Q = AV¬B

© OCR 2017. You may photocopy this page. Page 3 of 18 Created in ExamBuilder
[2]

5. Xander’s tablet computer comes with system software, including an operating system and
utility system software.

The operating system provides file management.

Identify three ways that Xander can make use of the file management facility.
1  

2  

3  

[3]
 

6(a). Explain how defragmentation software could overcome the issue of the slow computer
system.

 
 
 
 
 
 
[3]
 

  (b). A restaurant has a computer-based ordering system which is running slowly. A technician
has said that the hard disc drive is fragmented. The technician has suggested using utility
software to defragment the drive.

Explain how the restaurant's hard disc could have become fragmented.

 
© OCR 2017. You may photocopy this page. Page 4 of 18 Created in ExamBuilder
 
 
 
 
 
[4]
 

7. i. William can choose between a full or incremental backup.

Identify the backup method William should use to backup the computer, justifying
your choice.

Method
:
Justification
:

iii. Give one additional utility program William could make use of and describe how he
would use it.

Utility
program:
Description of
use:

8. Amin buys a new computer with an operating system and some utilities.

The table below shows some of the utilities in Amin's computer.

Tick one box in each row to show whether the utility is used for security or disk
organisation.

Used for disk


 Utility Used for security
organisation
 Antivirus
   
 Defragmenter
 File transfer
 Firewall
[4]

© OCR 2017. You may photocopy this page. Page 5 of 18 Created in ExamBuilder
 

9. A doctor's surgery stores hundreds of patients' details on its computer network. The
surgery is concerned about the security of its patients' sensitive medical data.

Identify three errors that the surgery's staff could make, that may endanger the security of
the network and outline a procedure that could be put in place to prevent each error.

 
 
 
 
 
 
 
 
 
[6]
 

10. A school has all of its computers in a local area network (LAN).

Explain two measures which the school will need to take to ensure the security of the
network.

1
 
 
 
 

2
 
 
 
 
[4]
 

11. A house has computers in each room and a central router. Every room allows both
Ethernet and WiFi connections to the router.

The house owner is concerned about potential threats to the network from being
connected to the Internet.

i. Describe three possible threats to the computers connected to the network and give
one way each threat can be reduced or prevented.

Threat
1
ii.  
iii.  
© OCR 2017. You may photocopy this page. Page 6 of 18 Created in ExamBuilder
iv.  

Preventio
n
Threat
2
vi.  
vii.  
viii.  

Preventio
n
Threat
3
x.  
xi.  
xii.  

Preventio
n

12. Vicky has been on holiday and has taken lots of photos. The memory in her camera is now
full and she needs to transfer her photos to an external secondary storage device.

Define what is meant by ‘secondary storage’.

 
 
[1]
 

13. William is creating a film for a school project using a digital video camera.

The digital video camera has a secondary storage device.

i. Explain why the digital video camera needs secondary storage.

[2]

ii. The digital video camera uses solid state storage.

Explain why solid state storage is the most appropriate type of storage for the digital
video camera.

© OCR 2017. You may photocopy this page. Page 7 of 18 Created in ExamBuilder
 

[4]

14. Apu has a handheld e-book reader that allows him to store and read electronic books.

Types of secondary storage devices are magnetic, optical or solid state.

i. State which type of storage is most suitable for storing the electronic books inside
the e-book reader.

[1]

ii. Explain one reason why this type of storage is the most suitable.

[2]

END OF QUESTION PAPER

© OCR 2017. You may photocopy this page. Page 8 of 18 Created in ExamBuilder
Mark scheme
Questi Mar
Answer/Indicative content Guidance
on ks

Examiner's Comments
 1
 0.
1 2 Most candidates answered correctly. As expected, some weaker candidates
were less able to work with the logic gates in combination
   (respectively)

Total 2

1 mark per bullet, max 2


Allow Boolean notation.

2 i  AND / conjunction 2
 NOT / negation

1 mark per row

  A   B   Q  


i
  0   0   1   Examiner’s Comments
4
i   0   1   1  
Candidates and centres are obviously extremely comfortable with the use and
  1   0   1   understanding of logic gate symbols. The vast majority of responses on part (i)

  1   1   0   achieved 2 marks. The most common incorrect answer was to mix up AND and
OR for the first gate. For part (ii), candidates were able to apply their knowledge
successfully with the majority of all candidates achieving 4 marks. This topic has
been covered successfully by centres and that this work is reflected in
examination responses.

Total 6

No follow through on row 4.

Examiner's Comments
3 4
This part was well answered by the majority of candidates, indicating that logic
and truth tables – a core concept in computer science – is understood by most
candidates.

1 mark for row two and three. For row 4, 1 mark for
correctly identifying 1 1 as the inputs, and 1 mark for the
correct output 0)

© OCR 2017. You may photocopy this page. Page 9 of 18 Created in ExamBuilder
Total 4

First mark can be awarded if candidate has either a NOT gate from B, or an OR
gate with two inputs anywhere in their answer.

Second mark is only awarded of the logic system as shown is given with no
other additional gates.

Correct logic diagrams needed for OR and NOT, including circle on NOT. Use
1 mark per bullet, max 2
professional judgement. Ignore labelling.

No need to label Q output.

Examiner’s Comments

Boolean symbols and notations that may be used in examinations are shown in
4 2 appendix 5f of the specification. Candidates will never be expected to use these
symbols in their own responses (AND, OR and NOT are perfectly acceptable)
but they must be aware of how questions on papers may be written.

For this question, it was obvious that some groups of candidates did not
 OR gate with two inputs / NOT gate on B input
understand the symbols in the question and so were not able to provide a
 Logic system as above with no other gates, with
suitable response. However, it was pleasing to see that this was not at all the
labelled inputs of A and B.
majority and that large numbers of candidates were able to not only understand
the question but also provide a correct or partially correct response.

Where responses were incorrect, a common mistake was to utilise the NOT gate
after the output from the OR gate when in fact the NOT gate should be applied
to the input from B before this feeds into the OR gate. Another common mistake
was to forget to label up inputs as A and B, therefore not allowing the examiner
to award the mark for the NOT gate on the correct input.

Total 2

5 1 mark per bullet to max 3 3  Answers must be clear as to what the answer is applied to i.e. 'you
e.g. AO2 can open it' - what is it?
1a  Mark first answer on each section.
 He can place his files into folders/directories (3)  Do not award:
 He can (re)name files/folders o defragment

 He can move his files/folders o view files

 He can copy/transfer/export files/folders o download

 He can delete his files/folders o compression

 He can set permissions/access rights o preview

 He can search for files o edit/read/write files

 He can view file details/extensions/file size/type  'Organise files' without what into - is not enough.
 He can create files/folders
 He can sort files/folders / he can put files into a
specific order / by example
 He can open files/folders Examiner’s Comments

Candidates found this question challenging.

Many candidates identified incorrect features such as compression and


encryption. Some candidates were able to identify one or two ways; commonly
deleting files or transferring files.

© OCR 2017. You may photocopy this page. Page 10 of 18 Created in ExamBuilder
Only a few candidates were able to identify three correct ways.

Total 3

 Files on the hard disc drive are moved (1)


 Empty spaces collected together (1)
6 a  Files are moved to be stored together (1) 3 Up to a maximum of 3 marks.
 Fewer disc accesses are needed (1)

 Orders have been saved onto the system as


they order food and then deleted once
processed (1)
Up to a maximum of 4 marks.
 Once other orders have been made, new files
b 4 A maximum of three marks if there is no contextualisation Allow a mark if
are created (1) which may be bigger than the
candidate's state that fragmentation increases access time (1)
spaces left by the deleted files (1)
 The order files are split up (1)

Total 7

7 i 1 mark per bullet to max 3 3 Discussion must match the backup given.
e.g. AO2
Incremental: 1a Either method is acceptable, marks are awarded for the justification.
(1)
 Only the changes need to be backed up AO2
 The software/OS/settings are unlikely to have 1b
changed between backups (2) Allow marks for why the other is not appropriate.
 Small number of files likely to be used/edited
between backups If there is no method given, or both, then read the answer and mark their
 Take less time to backup justifications. It must be clearly given which method each point refers to.
 Each backup will take less memory space to
store

Full:

 Backup all the data/files and software


 It might not take a significant time to back up
entire system
 He might only have a small number of files to be
backed up each time
 Safer as have more past versions to revert to
 User may have changed settings on computer
 Faster to restore the backup Examiner’s Comments
 Needs to do a full before he can do an
incremental Candidates could choose either method for this question; the important element
was their justification. Neither method was identified as being better than the
other, but candidates needed to consider the scenario and apply their
knowledge to it. Most candidates gained marks for describing what their chosen
method of backup involved. More able candidates were able to apply the
amount of data; timescales etc. to their chosen methodology, and justify their
decision. Weaker candidates attempted to describe backup and the generic
benefits of backing up data, as opposed to justifying the method they had

© OCR 2017. You may photocopy this page. Page 11 of 18 Created in ExamBuilder
chosen. Some candidates successfully identified that both would be appropriate,
and gave a reasoned justification that incorporated the use of both. For example
using a full backup initially and then incremental for the successive backups.

i 1 mark for naming program, 2 for description of use 3 Must be appropriate to scenario.
i e.g. AO1
1a
 Encryption software (1)
 Scramble/encode/mix up data AO1 For encryption, no mark for ‘it encrypts data’
 …so it cannot be read/understood if 1b Do not award: any form of backup or device driver.
intercepted/stolen (1)
AO2
1b
(1) Do not award: encryption stops data being stolen.
 Defragmentation
 Move free space together Do not award: brand names. But read description.
 Move files together
 E.g. Faster access to files
Mark program first. If incorrect 0 marks. If wording is not clear, or terminology
not exact but it can be understood, marks can be awarded for description of use.

 (Data) compression
 Reduce the file size of files / makes files smaller
 To use less storage space Defragmentation – do not award marks for describing a fragmented disk this is a

 Faster transmission NAQ

 To store more files

 Anti-virus / anti-malware
 To help protect computer/data against
viruses/malware
 To scan the computer to look
for/quarantine/remove viruses/malware

 Disk analysis and repair


 Scan disk and look for faults
 Prevent loss of data due to faulty disk

 Auto-update
 Checks Internet for new versions of software/OS
 Downloads and installs without user interaction

Examiner’s Comments
 Firewall
 Examine ingoing and outgoing traffic
This was an open question that required candidates to consider utility programs
 To help restrict/prevent unauthorised access
they have learnt about and choose one that would be appropriate for an
 …over a network/external source
individual user.

The most common answer was defragmentation. Candidates were then required
to describe its use. Many candidates described a fragmented disc and the

© OCR 2017. You may photocopy this page. Page 12 of 18 Created in ExamBuilder
problems associated with it – which does not answer the question. Some
candidates then described the use of a defragmenter to speed up access to
files. A common misunderstanding here was that a defragmenter increases the
speed of a computer. Speed requires quantification in an answer, because it
does not make a computer work faster, or process data faster, it allows faster
access to the stored data.

Other common answers included disc clean-up and anti-virus.

Exemplar 3

This candidate has given defragmentation. They have then explained how a disc
becomes fragmented, which does not gain marks because it is not answering
the question. At the end of their answer, they explain how defragmentation is
used to group files together, and making the retrieval of the files more efficient.

Total 6

Used for
Used for disk
Utility
security organisatio
n
Examiner's Comments
Antivirus ?  
8 4
Defragmen This question was answered correctly by almost all candidates.
  ?
ter
File
  ?
transfer
Firewall ?  

Total 4

9  Brings in files via any medium (1- AO2 1a)… 6 1 mark to be awarded for each correct identification to a maximum of 3 marks.
 …not allowing/stopping external devices being (AO2 1b)
used on the network (1-AO2 1b)
 Downloading infected files from the internet (1 - 1 mark to be awarded for each correct outlining of a procedure to a maximum of
AO2 1a)… 3 marks. (AO2 1b)
 …blocking/restricting access tinsecure websites
(1 - AO2 1b) Allow any reasonable combination of error and reasonable procedure to mitigate
 Allowing physical access to the surgery's the risk.
network (1 - AO2 1a)…
 …locking of doors/key cards/any physical
security procedure (1 - AO2 1b)

© OCR 2017. You may photocopy this page. Page 13 of 18 Created in ExamBuilder
 Sending/sharing sensitive data with third parties
(1- AO2 1a)…
 … blocking/restricting access to USB
ports/email/internet/printing (1 - AO2 1b)

Total 6

e.g.

 Passwords protected user accounts


 … to ensure that only authorised people can
access the network. Filtering / censoring is not answering the question (unless candidates explain
 Network policy restrictions e.g. students only that web sites known to pose a security threat – e.g. because they are known to
allowed to log in during school hours, from distribute viruses – are filtered)
certain computers
 … ensures that attempts to enter in the system Examiner's Comments
1 are likely to be genuine.
4
0  Different levels of access / each user can only The candidates were asked to explain two security measures for a school’s
access the files they need network. While most were able to identify two appropriate measures, only the
 … prevents accidental damage to files. better candidates went on to give a full explanation to gain all the marks.
 Firewall… Another common error was to refer to other measures which would normally be
 … to prevent unauthorised access / hacking into taken in a school network without referring to security, for example filtering sites
the network. with content that is inappropriate for children.

Marks in pairs. Award one mark for a correctly identified


measure and another mark for an appropriate expansion
explaining how this measure improves security

Total 4

1 1 mark for naming threat, 1 for description, 1 for 9 Must be relevant to home use i.e. not denial of service, SQL injection.
1 prevention. AO1
Max 3 per threat 1b
(3) Do not allow adware, spam.
e.g. AO2
1a
 Virus / trojan / worm / malware (3) Do not allow backup as a prevention – it does not prevent the threat occurring.
 Piece of software/code/a program that replicates AO2 Do not allow encryption for stopping a hacker.
itself / causes damage e.g. editing/deleting files 1b
 Running anti-virus/anti-malware software / don’t (3)
download from unknown sources / don’t click on Description must do more than repeat the threat.
unknown links

 Spyware / malware / keylogger Read whole response to threat, identify threat first (may not be at the start and
 Piece of software/code/a program that records may be within description), then look for description.

actions/key presses and sends this data to a


third party for analysis If no threat identified, then no mark for prevention.
 Running anti-spyware/anti-malware
software/firewall Allow any example of hacking for hacker e.g. cracking (password), active. But
only once.

Only award malware once, for virus or spyware e.g. virus identified, then

© OCR 2017. You may photocopy this page. Page 14 of 18 Created in ExamBuilder
malware identified both can be awarded.
 Data interception / passive Virus, then malware, then spyware, would get a repeat for final spyware.
 Data is sent to another device and is intercepted
by a third party
 Encryption Allow:

 Ransomware
 Prevents access to your files unless a ransom is paid
 Phishing  Anti-virus/firewall
 An e-mail has a link that when clicked directs
the user to a fake website that collects personal
data
 Network policy / firewall

 Pharming
 A piece of code installed that redirects user to
fake website that collects personal data
 Anti-malware / firewall

 Hacker
 Person attempting to gain unauthorised access
to the network/computers/ data/files / Examiner’s Comments

unauthorised access and then deleting/editing


data/files This question required candidates to consider the different threats to networks

 Firewall / strong password / biometrics / and computers that they have learnt about, and to identify which are appropriate

penetration testing in this situation. Most candidates were able to identify three threats, but at times
these were not appropriate to the scenario, for example describing denial of
service threats to a website, and SQL injection. This identifies the importance of
candidates reading the questions carefully and identifying whether it is asking for
a generic response i.e. a recall of knowledge (AO1), or an application of their
 Brute force attack
knowledge (AO2). The most common threats identified included viruses and
 Person/software using every combination of
hackers, with candidates being able to describe the threats and identify
passwords to gain access
appropriate measures to prevent them. Some candidates gave repeated
 Firewall/strong passwords
answers, for example giving a virus as a threat, then a worm, then a Trojan –
both of which are examples of viruses therefore already covered by their
previous answer.

 Social engineering
Exemplar 5
 Person being the weak point of the system / by
example e.g. any example of deception
 e.g. Strong passwords / check validity of
sources

© OCR 2017. You may photocopy this page. Page 15 of 18 Created in ExamBuilder
This candidate has given DDOS for the first answer which is not appropriate to
the context; this is a threat to a webserver which is not part of the house owner’s
home network. They have given two further appropriate threats, described these
appropriately and given reasonable preventions. It is important that candidates
consider the context and give threats that are appropriate to the situation given in
the question.

Total 9

1  Long term/non-volatile storage of data/files


1 1 mark only to be awarded for a correct definition.
2  External/auxiliary storage of data

Total 1

1 i 1 mark per bullet to max 2 2 Do not award capacity.


3
 For long term/permanent/non-volatile AO2 Bullet 3 – portable is not enough, needs application.
storage / storing when the device is turned off 1a
 To store the videos / data / files (1) Bullet 2 – must identify the data is stored.
 For transferring the videos (to another device) AO2 For videos accept data or any other term that signifies the data is being
1b stored/transferred e.g. photos/images.
(1)
Accept any alternative for transfer e.g. sending/exporting.

Examiner’s Comments

This question required candidates to consider the device, its use and the
purpose of secondary storage in this situation. Many candidates were able to
identify the need of the device to store data. More able candidates were able to
extend this to explain the need to store it after the device is turned off, or for
transporting the data to another device. A common error was describing the

© OCR 2017. You may photocopy this page. Page 16 of 18 Created in ExamBuilder
need for backing up the data or that there was insufficient storage in the primary
memory which demonstrated a lack of understanding about the differences
between primary and secondary memory.

Award marks for why solid state is most appropriate, not why others aren’t.

1 mark per bullet to max 4 Award descriptions of portable/durable etc., not looking for key words.
Max 3 if only stating features
e.g. Do not just allow can transfer data elsewhere.
Fastest without quantifying read/write speed is not enough.
 Portable
 Lightweight Allow: quietest and expansion.
 …e.g. device needs to be carried
4
 Small physical size
AO1
 …e.g. can fit in a small camera Do not award cost.
1b
 Durable
(1)
 No moving parts Small on its own is insufficient as it could mean physical or memory size.
i AO2
 …e.g. device is moved so may be dropped /
i 1a
won’t be damaged when moving around
(1)
 Reliable Examiner’s Comments
AO2
 …e.g. needs to work when out in the ‘field’
1b
 Sufficient/large capacity This question required candidates to consider the use of the digital video
(2)
 Videos are large file size / store more videos camera, the benefits of solid state storage, and where these meet. More able
 Fast access/read/write speed candidates were able to identify the number of benefits and expanded these to
 …e.g. the device will retrieve the videos without explain why they were useful in this specific scenario. Less able candidates
delay often gave generic benefits of solid state storage devices, without applying them
 Efficient power consumption to this scenario. In some cases lists of benefits were given, which would support
 …e.g. run on battery / longer battery life a question asking them to state the benefits, but the use of explain required
candidates to give further explanation. The most common answers related to the
durability and robustness of the device. Some candidates repeated their
response to part (a) (i) where they explained the purpose of secondary storage,
and did not identify the specific type of storage the question required.

Total 6

1  Solid state
i 1
4

i  Fast access… 2 No follow through from (i). Candidates need to identify a relevant characteristic
i  … less delays when turning the device on / of solid state storage for the first mark, and expand by explaining why this is an
turning pages etc… advantage in an e-book reader for the second mark.

Note that portable / capacity are not acceptable answers here (as solid state
storage is not particularly more portable / larger than other forms of storage for
 No moveable parts / robust this application)
 … can be handled / manipulated / moved
without damaging it Examiner's Comments

??In this part, most candidates demonstrated an awareness of the key


characteristics of different types of secondary storage. The strongest candidates
 Small / light enough… were able to clearly link the characteristics of solid state storage to the
 … to fit within a hand held device operational requirements of an e-book reader. Centres should encourage
candidates to answer such questions positively, for example, by arguing why the
characteristics of solid state storage make it most suitable, rather than why

© OCR 2017. You may photocopy this page. Page 17 of 18 Created in ExamBuilder
 low power
magnetic and optical storage are not suitable.
 … to extend battery life of reader

Total 3

© OCR 2017. You may photocopy this page. Page 18 of 18 Created in ExamBuilder

S-ar putea să vă placă și