Computer Science > QUESTION PAPER (QP) > Pearson Edexcel Level 1 /Level 2 GCSE (9-1 ) Time 1 hour 30 minutes Paper reference 1 CP2/01 Compute (All)

Pearson Edexcel Level 1 /Level 2 GCSE (9-1 ) Time 1 hour 30 minutes Paper reference 1 CP2/01 Computer Science PAPER 1: Principles of Computer Science

Document Content and Description Below

Instructions • Use black ink or ball-point pen. • Fill in the boxes at the top of this page with your name, centre number and candidate number. • Answer all questions. • Answer the quest... ions in the spaces provided – there may be more space than you need. • You are not allowed to use a calculator. Information • The total mark for this paper is 75. • The marks for each question are shown in brackets – use this as a guide as to how much time to spend on each question. Advice • Read each question carefully before you start to answer it. • Try to answer every question. • Check your answers if you have time at the end. You do not need any other materials. Computer Science PAPER 1: Principles of Computer Science Time 1 hour 30 minutes 1CP2/01 Pearson Edexcel Level 1/Level 2 GCSE (9–1) *P67312A0220* 2  Answer ALL questions. Write your answers in the spaces provided. Some questions must be answered with a cross in a box . If you change your mind about an answer, put a line through the box and then mark your new answer with a cross . 1 Networks (a) Devices are connected to networks. (i) Give two reasons for connecting computers in a network. (2) 1 ............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... 2 ............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (ii) Describe one way a local area network (LAN) is different from a wide area network (WAN). (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (iii) A network has a speed of 17.08 megabits per second. Identify the equivalent speed in bits per second. (1) A 17080 B 17080000 C 17080000000 D 17080000000000 *P67312A0320* Turn over 3  (iv) Define the term ‘latency’. (1) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (b) Data is split up into packets for transmission over a network. (i) Each device on a network has a unique identifier that is used when sending or receiving packets of data. State the name of the unique identifier. (1) .................................................................................................................................................................................................................................................................................... (ii) Identify the item included between the header and the footer in a data packet. (1) A Data being sent B Destination address C Packet number D Public key (c) Describe how a firewall protects a local area network (LAN). (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... *P67312A0420* 4  (d) State the name of an email protocol. (1) .................................................................................................................................................................................................................................................................................... (e) Explain one disadvantage of using a star network topology. (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (Total for Question 1 = 13 marks) *P67312A0520* Turn over 5  2 Computers (a) Some low-level programming languages use mnemonics. (i) State the purpose of a mnemonic. (1) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (ii) State the type of low-level programming language that uses mnemonics. (1) .................................................................................................................................................................................................................................................................................... (iii) Mnemonics are one characteristic of some low-level languages. Describe one other characteristic of a low-level language. (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (iv) State the name of the high-level programming language translator that executes a line of code immediately after translating it. (1) .................................................................................................................................................................................................................................................................................... (b) State the two items held in RAM according to the von Neumann architecture. (2) 1 ............................................................................................................................................................................................................................................................................... 2 ............................................................................................................................................................................................................................................................................... *P67312A0620* 6  (c) Data can be stored in different ways. (i) Describe how data is stored on optical media. (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (ii) State the type of secondary storage that stores data as electric charges. (1) .................................................................................................................................................................................................................................................................................... (d) An embedded computer system is part of a larger machine. State two characteristics of embedded systems that make them different from general purpose computers. (2) 1 ............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... 2 ............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (e) Identify two reasons for using data compression. (2) A Reduces data transfer times B Reduces disk fragmentation C Reduces required storage space D Reduces the chance of data being hacked E Reduces the need for error detect [Show More]

Last updated: 1 year ago

Preview 1 out of 20 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$7.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
86
0

Document information


Connected school, study & course


About the document


Uploaded On

Apr 03, 2023

Number of pages

20

Written in

Seller


seller-icon
Cate

Member since 1 year

0 Documents Sold


Additional information

This document has been written for:

Uploaded

Apr 03, 2023

Downloads

 0

Views

 86

Document Keyword Tags

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·