1.5 Systems Software
1.5 Systems Software
INSTRUCTIONS TO CANDIDATES
• Write your name, centre number and candidate number in the boxes above. Please write clearly and in capital letters.
• Use black ink. HB pencil may be used for graphs and diagrams only.
• Answer all the questions, unless your teacher tells you otherwise.
• Read each question carefully. Make sure you know what you have to do before starting your answer.
• Where space is provided below the question, please write your answer there.
• You may use additional paper, or a specific Answer sheet if one is provided, but you must clearly show your candidate
number, centre number and question number(s).
Describe, using examples, the purpose of the system information and diagnosis utilities.
Example
Diagnosis utility
Example
[4]
The utility system software provides compression software. Xander uses this to compress an image.
(i) Explain how the compression software will compress the image file.
[4]
(ii) Give the name of two other types of utility system software.
[2]
Explain how defragmentation software could overcome the issue of the slow computer system.
[3]
The manufacturer of the e-book reader provides proprietary software, which Apu can use to transfer the e-book
from the CD-ROM to the e-book reader.
[2]
(ii) Explain one advantage to the manufacturer of providing proprietary software instead of open source
software.
[2]
5 Eve’s computer has system software including an Operating System and Utility Software.
Explain why Eve’s computer is more efficient after the program has been run.
[3]
Explain how defragmentation software could overcome the issue of the slow computer system.
[3]
Tick (✓) one box in each row to identify which function of the Operating System deals with each action.
Renaming a file
[5]
8 Amin buys a new computer with an operating system and some utilities.
[2]
Utility programs include antivirus, file transfer, firewall and system cleanup.
[2]
(b) Identify and describe two methods by which the operating system can provide additional security directly.
[4]
Ali runs defragmentation analysis on his magnetic hard disk. Parts of the results are shown.
(i) Explain how defragmentation will change how the files and free space are arranged on Ali’s hard disk.
[3]
Explain why Ali’s computer can access the files faster after defragmentation.
[2]
[3]
(b) Complete the following description of the functions of an operating system by selecting the appropriate missing
words from those in the box.
output to the user and allows the user to interact with the .................................................... .
The operating system controls the movement of data from secondary storage to
The operating system can only perform one process at a time, but by managing the memory
the computer can appear to be completing more than one process at a time. This is known as
.................................................... .
and .................................................... .
[8]
Identify three ways that Xander can make use of the file management facility.
[3]
If unauthorised access does occur, Hamish would like to use encryption to add another layer of protection to his
documents.
[2]
This Caesar cipher moves each letter of the alphabet one place to the right.
The following table shows the original letters in the first row, and the new letters in the second row.
The following pseudocode algorithm takes a string of uppercase letters as input and uses the Caesar cipher
to encrypt them.
Function Description
(iii) The algorithm needs adapting. An extra line (line 12) is needed to output the encrypted message.
[1]
Total 4
Exemplar 3
Total 6
Total 3
4 i Source code not made available/ Only 2 The mention of a licence is not sufficient.
compiled code is published Candidate should state that the licence
Licence restricts the copying / restricts copying / modifying / distributing.
modifying / distribution of the software “closed source” is not enough because it
just gives an alternative term for
“proprietary” without a description of what
we mean by “closed”
Examiner's reports
Total 4
Total 3
Total 3
Reading data ✓
from a scanner
Changing the ✓
password
required to log
on to the
computer
Total 5
Total 2
9 a antivirus 2
firewall
Marks in pairs
Total 6
Collate free space together Do not award gives more free storage
space.
Max 2 from
Do not award 'similar' files are grouped
Collate file fragments together.
together/contiguously
All of file 1 will be stored consecutively
All of file 2 will be stored consecutively
All of file 3 will be stored consecutively
Backup
Encryption
Compression
Firewall
Anti-virus // anti-malware
Anti-spyware // anti-malware
Total 16
Total 3
12 i 1 mark per bullet to max 2 2 'Need the key to understand the data'
AO1 1a can get both MP2 and 3
Uses an algorithm to (1)
… jumble/scramble/mix up the data // AO2 1b Cannot read the data // data is
turns it into cypher text // by example (1) unreadable is NBOD
If it is accessed it cannot be
understood // it is unintelligible Examiner’s Comments
Use of keys to encrypt/decrypt data
This question was answered well by many
candidates who were able to identify that
encryption scrambles data and that a key
is required to read it.
iii 1 mark for suitable output 1 Must logically work. Do not accept ""
e.g. AO3 2b around newMessage.
(1)
output(newMessage) // Parentheses not required.
print(newMessage)
Do not accept:
newMessage =
output(newMessage) or similar
Examiner’s Comments
Total 8