Please write clearly in block capitals.
Centre number Candidate number
Surname
Forename(s)
Candidate signature
GCSE
COMPUTER SCIENCE
Paper 2 Written Assessment
Thursday 16 May 2019 Afternoon Time allowed: 1 hour 30 minutes
Materials For Examiner’s Use
There are no additional materials required for this paper. Pages Mark
2–3
Instructions
• Use black ink or black ball-point pen. Use pencil only for drawing. 4–5
• Answer all questions. 6–7
• You must answer the questions in the spaces provided.
8–9
• Do all rough work in this book. Cross through any work you
do not want to be marked. 10–11
• You must not use a calculator. 12–13
14–16
Information
• The total number of marks available for this paper is 80. TOTAL
Advice
For the multiple-choice questions, completely fill in the lozenge alongside the appropriate answer.
CORRECT METHOD WRONG METHODS
If you want to change your answer you must cross out your original answer as shown.
If you wish to return to an answer previously crossed out, ring the answer you now wish to select as
shown.
*jun198520201*
IB/G/Jun19/E8 8520/2
2
Do not write
outside the
Answer all questions in the spaces provided. box
0 1 . 1 Convert the decimal number 197 into binary.
[1 mark]
0 1 . 2 Convert the hexadecimal number A4 into decimal.
Show your working.
[2 marks]
Answer
0 2 . 1 What is the largest decimal number that can be represented using 5 bits?
[1 mark]
0 2 . 2 How many bits are there in 3 MB?
Show your working.
[2 marks]
Answer
*02*
IB/G/Jun19/8520/2
3
Do not write
outside the
0 3 State one advantage of using Unicode instead of using ASCII. box
[1 mark]
0 4 Which two of the following are components of a CPU?
Shade two lozenges.
[2 marks]
A Arithmetic logic unit
B Control unit
C Fan
D Hard disk drive
E Keyboard
F Power supply unit
0 5 A computer game is one type of application software. State two other types of
application software. You must not use brand names in your answer.
[2 marks]
Turn over for the next question
11
Turn over ►
*03*
IB/G/Jun19/8520/2
4
Do not write
outside the
0 6 Select the correct statement about secondary storage. box
Shade one lozenge.
[1 mark]
A Secondary storage is a type of ROM.
B Secondary storage is non-volatile.
C Secondary storage is temporary.
D Secondary storage loses its content when it is turned off.
0 7 Describe how an optical disk is read.
[4 marks]
*04*
IB/G/Jun19/8520/2
5
Do not write
outside the
0 8 The Huffman tree in Figure 1 was generated for the string ARE ALL STARS REAL box
Figure 1
0 8 . 1 Part of the string ARE ALL STARS REAL was incorrectly encoded as in Figure 2
below.
Figure 2
1111000010101011
What string does this encoding represent?
[1 mark]
0 8 . 2 What would be the correct binary encoding for the substring STAR?
Write the correct encoding below the letters in the table.
[2 marks]
S T A R
Turn over ►
*05*
IB/G/Jun19/8520/2
6
Do not write
outside the
0 9 Explain two reasons why software companies usually do not make their source code box
publicly available. Source code is the code they wrote to create the software.
[4 marks]
1 0 Define the term embedded system.
[2 marks]
*06*
IB/G/Jun19/8520/2
7
Do not write
outside the
1 1 . 1 Draw a simple diagram to show a star network topology containing four desktop box
computers.
[2 marks]
1 1 . 2 Draw a simple diagram to show a bus network topology containing four desktop
computers.
[2 marks]
Question 11 continues on the next page
10
Turn over ►
*07*
IB/G/Jun19/8520/2
8
Do not write
outside the
1 1 . 3 State two advantages of using a star topology instead of a bus topology. box
[2 marks]
1 1 . 4 State one disadvantage of using a star topology instead of a bus topology.
[1 mark]
1 1 . 5 Discuss the benefits and risks of using a computer network.
[9 marks]
*08*
IB/G/Jun19/8520/2
9
Do not write
outside the
box
1 1 . 6 Define the term network protocol.
[2 marks]
1 1 . 7 Which two of the following are email protocols?
Shade two lozenges.
[2 marks]
A FTP
B HTTP
C IMAP
D SMTP
E TCP
F UDP
16
Turn over ►
*09*
IB/G/Jun19/8520/2
10
Do not write
outside the
1 2 . 1 Explain why a firewall improves network security. box
[2 marks]
1 2 . 2 A company has decided to move its business online but it is concerned about making
sure that only authorised users can gain access to the system. The company has set
up a CAPTCHA system to check that the user is not a robot.
Explain three different electronic methods that could then be used to confirm user
identity.
[6 marks]
*10*
IB/G/Jun19/8520/2
11
Do not write
outside the
1 2 . 3 Penetration testing can be conducted as either black-box or white-box testing. box
Explain the difference between these two types of penetration testing.
[4 marks]
1 3 The four layers of the TCP/IP network model are shown below.
For each row in Figure 3, write the letter A, B, C or D that matches the description.
Each letter should only be used once.
[2 marks]
A Application layer
B Transport layer
C Internet layer
D Link layer
Figure 3
Description Letter
Addresses data for transmission
Sets up the communication between the two hosts
Where the network hardware is located
Where the user software, such as web browsers or email
programs, operates
14
Turn over ►
*11*
IB/G/Jun19/8520/2
12
Do not write
outside the
1 4 A virus is a specific category of malware. box
Describe three other different categories of malware.
[6 marks]
Malware 1
Malware 2
Malware 3
*12*
IB/G/Jun19/8520/2
13
Do not write
outside the
1 5 A burglar alarm sounds an alarm when it is armed (turned on) and the window or door box
is opened.
The truth table for this basic system is shown in Figure 4.
Figure 4
Armed (A) Door (B) Window (C) Alarm (Q)
0 = Off 0 = Closed 0 = Closed 0 = Off
1= On 1 = Open 1 = Open 1 = On
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 1
1 1 0 1
1 1 1 1
Draw the logic circuit that represents the truth table in Figure 4. You must use the
correct symbols for logic gates. You may not need to use all the gates shown.
[3 marks]
Turn over ►
*13*
IB/G/Jun19/8520/2
14
Do not write
outside the
1 6 Specifications for two different devices are shown in Figure 5. box
Discuss the advantages and disadvantages of Device A compared to
Device B.
Your answer should explain the impact each advantage/disadvantage will have on the
operation of the device.
You should assume that any aspects of the specifications not mentioned in Figure 5
are the same for both devices.
[12 marks]
Figure 5
Device A Device B
Quad (4) core 1.6 GHz CPU with 8 MB Dual (2) core 3.9 GHz CPU with
cache 2 MB cache
16 GB RAM 4 GB RAM
2 TB Hard Disk Drive (HDD) 250 GB Solid State Drive (SSD)
*14*
IB/G/Jun19/8520/2
15
Do not write
outside the
box
Turn over ►
*15*
IB/G/Jun19/8520/2
16
Do not write
outside the
box
END OF QUESTIONS
12
Copyright information
For confidentiality purposes, from the November 2015 examination series, acknowledgements of third-party copyright material are published in a separate
booklet rather than including them on the examination paper or support materials. This booklet is published after each examination series and is available
for free download from www.aqa.org.uk after the live examination series.
Permission to reproduce all copyright material has been applied for. In some cases, efforts to contact copyright-holders may have been unsuccessful and
AQA will be happy to rectify any omissions of acknowledgements. If you have any queries please contact the Copyright Team, AQA, Stag Hill House,
Guildford, GU2 7XJ.
Copyright © 2019 AQA and its licensors. All rights reserved.
*196G8520/2*
*16*
IB/G/Jun19/8520/2