Y11 Computer Science Mock Jan 2023
Y11 Computer Science Mock Jan 2023
January 2024
Candidate name
Candidate number
INSTRUCTIONS TO CANDIDATES
• Write your candidate number in the boxes above and circle your teacher’s name. Please write clearly.
• Use black ink. HB pencil may be used for graphs and diagrams only.
• Answer all the questions unless your teacher tells you otherwise.
• Read each question carefully. Make sure you know what you must do before starting your answer.
• Where space is provided below the question, please write your answer there.
• You may use additional paper, or a specific Answer sheet if one is provided, but you must clearly show your candidate number and question
number(s).
[2]
(b). The following logo is stored as a bitmap image. Each box represents one pixel, with three different colours being used in the image.
[1]
(c). Calculate the fewest number of bits that could be used to store the logo as a bitmap image. You must show your working.
[4]
(d). Give two ways that the file size of the image could be reduced.
[2]
2(a). Ali’s tablet computer has an operating system.
Complete the following description of the functions of an operating system by selecting the appropriate missing words from those in the
box.
output to the user and allows the user to interact with the .................................................... .
The operating system controls the movement of data from secondary storage to
The operating system can only perform one process at a time, but by managing the memory
the computer can appear to be completing more than one process at a time. This is known as
and .................................................... .
[8]
(b). Ali’s tablet computer has a CPU. Identify two events that take place during the fetch-execute cycle.
[2]
(c). Ali’s tablet computer has a magnetic hard drive disk.
Explain one reason why a secondary storage device is needed in most computer systems.
[2]
(d). Ali runs defragmentation analysis on his magnetic hard disk. Parts of the results are shown.
i. Explain how defragmentation will change how the files and free space are arranged on Ali’s hard disk.
Explain why Ali’s computer can access the files faster after defragmentation.
[2]
3
[3]
Write the letter of the missing statements from the table in the correct place to complete the algorithms. Not all statements are used,
and some statements might be used more than once.
procedure storeData()
endif
.........................
procedure accessData()
endif
endif
endprocedure
Letter Statement
A Secondary storage
B NOT
C Full
D endfunction
E Empty
F endprocedure
G AND
H RAM
[6]
[2]
Choice
Justification
[3]
[1]
(b). Explain the effect of performing a 3 place right shift on the binary number 11001011.
[2]
(c). Add the following binary numbers.
[2]
Section B
Alistair English 3
Jaxon Art 5
Alex Art 4
Anna French 7
Ismaael Art 9
Complete the SQL query to return all of the fields for the students who take Art.
SELECT
FROM
WHERE
[3]
[3]
ii. Complete the truth table for the logic system P = NOT (A AND B)
A B P
0 0 1
0 1
1 0
[4]
Parents must log in before they can use the system. They then choose to book a new appointment, view all appointments already made or
update their personal details. If parents choose to view their appointments, they can either view them on-screen or print them off.
Each teacher has the assessment grades for each student. These grades are stored in numerical order.
2 3 4 5 6 7 8
Show the steps that a binary search would take to check whether the student has achieved a grade 7 in any assessment.
[4]
ii. Explain how a binary search would determine that a value does not appear in a given array.
[2]
[1]
8. A car dealership uses a computer system to record details of the cars that it has for sale. Each car has a make, model, age and number
of miles driven.
Each car is given a star rating of 1 to 5, based on the age of the car and the number of miles it has been driven. This rating is recorded in
the computer system.
ii. Give one example of how abstraction has been used in the design of this star rating system.
[1]
iii. Explain how authentication could be used as part of the defensive design considerations for this computer system.
[2]
Customers can use a discount code to reduce the price of their purchase. Valid discount codes and their value (in pounds) are stored in a
global two-dimensional (2D) array with the identifier discount. The following table shows part of this 2D array.
For example, discount[2,0] holds discount code BGF2 and discount[2,1] holds the discount of 15 pounds.
A function searches through the 2D array and applies the discount to the price. The price and discount code are passed in as parameters.
The algorithm design is not complete.
[5]
[2]
[6]
Tick (✓) one box in each row to identify whether the statement refers to a high-level language or a low-level language.
[4]
Describe two other common tools or facilities that an IDE can provide.
[4]