Computer Science  >  QUESTION PAPER (QP)  >  Pearson Edexcel Level 1 /Level 2 GCSE (9-1 ) Time 1 hour 30 minutes Paper reference 1 CP2/01 Compute (All)

Pearson Edexcel Level 1 /Level 2 GCSE (9-1 ) Time 1 hour 30 minutes Paper reference 1 CP2/01 Computer Science PAPER 1: Principles of Computer Science

Document Content and Description Below

Instructions • Use black ink or ball-point pen. • Fill in the boxes at the top of this page with your name, centre number and candidate number. • Answer all questions. • Answer the quest ... ions in the spaces provided – there may be more space than you need. • You are not allowed to use a calculator. Information • The total mark for this paper is 75. • The marks for each question are shown in brackets – use this as a guide as to how much time to spend on each question. Advice • Read each question carefully before you start to answer it. • Try to answer every question. • Check your answers if you have time at the end. You do not need any other materials. Computer Science PAPER 1: Principles of Computer Science Time 1 hour 30 minutes 1CP2/01 Pearson Edexcel Level 1/Level 2 GCSE (9–1) *P67312A0220* 2  Answer ALL questions. Write your answers in the spaces provided. Some questions must be answered with a cross in a box . If you change your mind about an answer, put a line through the box and then mark your new answer with a cross . 1 Networks (a) Devices are connected to networks. (i) Give two reasons for connecting computers in a network. (2) 1 ............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... 2 ............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (ii) Describe one way a local area network (LAN) is different from a wide area network (WAN). (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (iii) A network has a speed of 17.08 megabits per second. Identify the equivalent speed in bits per second. (1) A 17080 B 17080000 C 17080000000 D 17080000000000 *P67312A0320* Turn over 3  (iv) Define the term ‘latency’. (1) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (b) Data is split up into packets for transmission over a network. (i) Each device on a network has a unique identifier that is used when sending or receiving packets of data. State the name of the unique identifier. (1) .................................................................................................................................................................................................................................................................................... (ii) Identify the item included between the header and the footer in a data packet. (1) A Data being sent B Destination address C Packet number D Public key (c) Describe how a firewall protects a local area network (LAN). (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... *P67312A0420* 4  (d) State the name of an email protocol. (1) .................................................................................................................................................................................................................................................................................... (e) Explain one disadvantage of using a star network topology. (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (Total for Question 1 = 13 marks) *P67312A0520* Turn over 5  2 Computers (a) Some low-level programming languages use mnemonics. (i) State the purpose of a mnemonic. (1) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (ii) State the type of low-level programming language that uses mnemonics. (1) .................................................................................................................................................................................................................................................................................... (iii) Mnemonics are one characteristic of some low-level languages. Describe one other characteristic of a low-level language. (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (iv) State the name of the high-level programming language translator that executes a line of code immediately after translating it. (1) .................................................................................................................................................................................................................................................................................... (b) State the two items held in RAM according to the von Neumann architecture. (2) 1 ............................................................................................................................................................................................................................................................................... 2 ............................................................................................................................................................................................................................................................................... *P67312A0620* 6  (c) Data can be stored in different ways. (i) Describe how data is stored on optical media. (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (ii) State the type of secondary storage that stores data as electric charges. (1) .................................................................................................................................................................................................................................................................................... (d) An embedded computer system is part of a larger machine. State two characteristics of embedded systems that make them different from general purpose computers. (2) 1 ............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... 2 ............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (e) Identify two reasons for using data compression. (2) A Reduces data transfer times B Reduces disk fragmentation C Reduces required storage space D Reduces the chance of data being hacked E Reduces the need for error detect [Show More]

Last updated: 2 years ago

Preview 1 out of 20 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of Pearson Edexcel Level 1 /Level 2 GCSE (9-1 ) Time 1 hour 30 minutes Paper reference 1 CP2/01 Computer Science PAPER 1: Principles of Computer Science document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$7.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

173
0

Document information


Connected school, study & course


About the document


Uploaded On

Apr 03, 2023

Number of pages

20

Written in

All

Seller


Profile illustration for Cate
Cate

Member since 2 years

0 Documents Sold

Additional information

This document has been written for:

Uploaded

Apr 03, 2023

Downloads

 0

Views

 173

Document Keyword Tags


$7.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·