OCR Predicted Paper 1 2024[1]
OCR Predicted Paper 1 2024[1]
gcsecomputersciencetutor.vercel.app
INSTRUCTIONS
• Use black ink. You can use an HB pencil, but only for graphs and
diagrams.
• Write your answer to each question in the space provided. If you need
extra space, use the lined pages at the end of this booklet. The question
numbers must be clearly shown.
• Answer all the questions.
INFORMATION
• The total mark for this paper is 80.
• The marks for each question are shown in brackets [].
• Quality of extended response will be assessed in questions marked with
an asterisk (*).
• This document has 13 pages.
ADVICE
• Read each question carefully before you start your answer.
• This is just a predicted paper based off previous years
(a) Describe the purpose of two registers that are used by Von Neumann architecture.
1 __________________________________________________________________
____________________________________________________________________
____________________________________________________________________
2 __________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[4]
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
(a) Complete the table by writing the missing denary, 8-bit binary or hexadecimal
values.
40 28
118 01110110
11111000
[4]
__________________________________________________________________ [1]
(c) Perform a binary shift of 3 places right on the binary number 10001110.
__________________________________________________________________ [1]
2300KB
200MB
0.1GB
[1]
1 0 0 1 1 0 1 1
+ 0 1 1 1 0 1 0 0
____________________________________________
____________________________________________
[2]
(f) An overflow error can occur when adding two 8-bit binary numbers.
Describe what is meant by an overflow error.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
(a) Complete the table by identifying the most appropriate protocol for each of the
tasks the student is performing.
Task Protocol
[4]
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
(a) One characteristic of a WAN is that they are set up over a large geographical area.
Give one other characteristic of a WAN.
__________________________________________________________________
__________________________________________________________________
[1]
(b) GCST Supermarkets use a client server network to connect the checkout computers
to the store’s server.
Describe one benefit to GCST Supermarkets of using a client server network instead
of a peer-to-peer network.
__________________________________________________________________
__________________________________________________________________
[2]
(c) The supermarket manager’s computer can access the Internet and the World Wide
Web.
Explain the difference between the Internet and the World Wide Web.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
(d) The supermarket introduces a WAP (Wireless Access Point) to allow network access
to wireless devices. The manager has noticed that the performance of the network
has recently decreased.
Describe how introducing wireless access could have slowed down the network.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
__________________________________________________________________[2]
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[5]
W W R R R B B
W W R Y R B B
B B R R R B B
B B B LG B DG B
B DG DG LG DG B B
B B DG LG B B B
B B B LG B B B
Fig. 2
Letter Colour
W White
B Blue
R Red
Y Yellow
DG Dark Green
LG Light Green
Fig. 3
(a) Using the example in Fig. 2, explain how a bitmap image is stored on a computer.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[3]
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
(c) Explain how reducing the number of colours in an image can reduce its file size.
1 __________________________________________________________________
____________________________________________________________________
2 __________________________________________________________________
____________________________________________________________________
[2]
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[3]
(ii) State the effects of increasing the sample rate of the recording.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
2 4 8 9 16 32 256 71 72 74 76
78 80 81 all different identical one repeated
similar some unique
[5]
(b) Tick one or more boxes in each row to identify whether each statement applies to
each character set.
[3]
(a) Hamish would like to use encryption to add another layer of protection to his
documents.
Explain how encryption helps to protect Hamish’s documents.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
(b) Identify and describe one other software-based security method that will help
Hamish protect his computer system and data.
Method_____________________________________________________________
Description__________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[3]
(c) Hamish’s laptop has both hardware and software. The hardware includes primary
and secondary storage.
Explain why a computer needs both primary and secondary storage.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
1 __________________________________________________________________
2 __________________________________________________________________
[2]
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[3]
Data from VM is
transferred back to
secondary storage when
needed
Data from ROM is
transferred into VM
[4]
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
(b) Layla released her game under a proprietary licence.
Explain why a proprietary licence is a more appropriate choice than open source.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
[2]
(c) Tick one box on each row to identify the legislation that would cover each of the
given events.