100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

2024_AQA-GCSE Computer Science Paper 2 Computing Concepts (Merged Question Paper and Marking Scheme)

Rating
5.0
(2)
Sold
5
Pages
58
Grade
A+
Uploaded on
24-12-2024
Written in
2024/2025

2024_AQA-GCSE Computer Science Paper 2 Computing Concepts (Merged Question Paper and Marking Scheme) Please write clearly in block capitals. Centre number Surname Forename(s) Candidate signature Tuesday 21 May 2024 Candidate number I declare this is my own work. GCSE COMPUTER SCIENCE Paper 2 Computing concepts Tuesday 21 May 2024 Materials Afternoon • There are no additional materials required for this paper. • You must not use a calculator. Time allowed: 1 hour 45 minutes For Examiner’s Use Instructions • Use black ink or black ball-point pen. Use pencil only for drawing. • Answer all questions. • You must answer the questions in the spaces provided. • If you need extra space for your answer(s), use the lined pages at the end of this book. Write the question number against your answer(s). • Do all rough work in this book. Cross through any work you do not want to be marked. Information The total number of marks available for this paper is 90. Advice Question Mark 1–4 5–6 7–8 9 10–12 13 14–17 18 19 TOTAL For the multiple-choice questions, completely fill in the lozenge alongside the appropriate answer. CORRECT METHOD WRONG METHODS If you want to change your answer you must cross out your original answer as shown. If you wish to return to an answer previously crossed out, ring the answer you now wish to select as shown. *JUN* IB/G/Jun24/G4004/E8 8525/2 GCSE Computer Science: Paper 2 - Computing Concepts The GCSE Computer Science Paper 2: Computing Concepts is scheduled for May 2025.This paper focuses on the fundamental concepts of computer science, including the theoretical aspects of computing, computer systems, networks, and the ethical and legal considerations that shape the use of technology. Key Areas Covered: 1. Data Representation o Binary and Hexadecimal Systems:  Understanding how data is represented in binary (base 2) and hexadecimal (base 16) formats.  Converting between binary and decimal systems, and binary to hexadecimal.  How computers use binary for storing and processing data. o Data Storage:  File sizes: Understanding the units of storage (bytes, kilobytes, megabytes, gigabytes, etc.).  The difference between primary storage (RAM) and secondary storage (hard drives, SSDs, optical disks). o Character Representation:  How text is represented using ASCII and Unicode encoding.  The role of encoding systems in storing and transmitting text. 2. Computer Systems o Components of a Computer:  Understanding the main components of a computer system, including the CPU (central processing unit), RAM (random access memory), input devices, output devices, and storage devices.  The role of the ALU (arithmetic logic unit), CU (control unit), and registers in the CPU. o The Fetch-Decode-Execute Cycle:  The process through which the CPU retrieves (fetches), decodes, and executes instructions.  The role of clock cycles and how they impact processing speed. o Types of Software:  System software (e.g., operating systems, utilities) vs application software (e.g., word processors, games).  Understanding how software interacts with hardware to carry out tasks. 3. Networks o Types of Networks:  Difference between LAN (Local Area Network), WAN (Wide Area Network), and PAN (Personal Area Network).  The role of the internet and the types of connections used for networking (e.g., Wi-Fi, Ethernet). o Network Topologies:  Understanding different network topologies such as star, bus, and ring and their advantages and disadvantages. o Protocols and Layers:  Introduction to TCP/IP (Transmission Control Protocol/Internet Protocol) and the OSI model (Open Systems Interconnection), focusing on the layers involved in data transmission.  Understanding HTTP, FTP, DNS, IP addressing, and routers in the context of networking. 4. Cybersecurity and Threats o Types of Cyber Threats:  Malware: Including viruses, worms, and ransomware.  Phishing: Techniques used to deceive individuals into revealing personal information.  Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks. o Protection Measures:  Using firewalls, antivirus software, and encryption to protect data.  The importance of secure passwords, two-factor authentication, and other security practices to protect digital assets. 5. Algorithms o Sorting Algorithms:  Understanding how different sorting algorithms work, such as bubble sort, insertion sort, and merge sort. o Searching Algorithms:  Techniques like linear search and binary search for finding data in a list. how they scale with larger data sets (using Big O notation). o Recursion:  Understanding recursive algorithms, where a function calls itself, and examples of problems that can be solved recursively (e.g., calculating factorials, Fibonacci sequences). 6. Ethical, Legal, and Environmental Impacts of Computing o Ethics in Computing:  The impact of computing on privacy, data protection, and the responsibilities of developers and users.  Discussing the ethical implications of emerging technologies like artificial intelligence, surveillance systems, and data collection. o Legal Issues:  Understanding the Data Protection Act and copyright laws related to software and digital content.  The implications of cybercrime, including hacking, fraud, and intellectual property theft. o Environmental Impact:  The environmental effects of computing, including e-waste and the energy consumption of large-scale data centers. 7. Developing Computational Thinking o Problem Solving:  Using logical thinking and computational methods to solve problems.  Applying techniques such as decomposition, abstraction, and pattern recognition to break down complex problems and develop efficient solutions. o Designing Solutions:  Creating algorithms and programs to solve real-world problems using programming languages like Python, VB.NET, or Java. 8. Cloud Computing and Emerging Technologies o Cloud Computing:  Understanding the concept of cloud storage and cloud services (e.g., Google Drive, AWS).  The advantages and disadvantages of using cloud-based services for data storage and computing. o Artificial Intelligence (AI):  An introduction to AI, machine learning, and natural language processing.  The role of AI in various industries, including healthcare, finance, and entertainment. 2 Answer all questions. 0 1Which statement best describes what computers represent using binary? Shade one lozenge. [1 mark] A All data are represented using binary. B All data and instructions are represented using binary.

Show more Read less
Institution
2024_AQA-GCSE Computer Science
Course
2024_AQA-GCSE Computer Science











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
2024_AQA-GCSE Computer Science
Course
2024_AQA-GCSE Computer Science

Document information

Uploaded on
December 24, 2024
Number of pages
58
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

2024_AQA-GCSE Computer Science
Paper 2
Computing Concepts
(Merged Question Paper and Marking Scheme)
Please write clearly in block capitals. Tuesday 21 May 2024


Centre number


Surname Candidate number

Forename(s)

Candidate signature
I declare this is my own work.



GCSE
COMPUTER SCIENCE
Paper 2 Computing concepts

Tuesday 21 May 2024 Afternoon Time allowed: 1 hour 45 minutes
Materials For Examiner’s Use
• There are no additional materials required for this paper.
• You must not use a calculator. Question Mark
1–4
Instructions
• Use black ink or black ball-point pen. Use pencil only for drawing. 5–6
• Answer all questions. 7–8
• You must answer the questions in the spaces provided. 9
• If you need extra space for your answer(s), use the lined pages at the end of
10–12
this book. Write the question number against your answer(s).
• Do all rough work in this book. Cross through any work you do not want 13
to be marked. 14–17

Information 18
The total number of marks available for this paper is 90. 19

TOTAL
Advice


For the multiple-choice questions, completely fill in the lozenge alongside the appropriate answer.
CORRECT METHOD WRONG METHODS

If you want to change your answer you must cross out your original answer as shown.
If you wish to return to an answer previously crossed out, ring the answer you now wish to select

as shown.



*JUN248525201*
IB/G/Jun24/G4004/E8 8525/2

,GCSE Computer Science: Paper 2 - Computing Concepts

The GCSE Computer Science Paper 2: Computing Concepts is scheduled for May 2025.This paper
focuses on the fundamental concepts of computer science, including the theoretical aspects of
computing, computer systems, networks, and the ethical and legal considerations that shape the use
of technology.

Key Areas Covered:

1. Data Representation
o Binary and Hexadecimal Systems:
 Understanding how data is represented in binary (base 2) and hexadecimal (base 16)
formats.
 Converting between binary and decimal systems, and binary to hexadecimal.
 How computers use binary for storing and processing data.
o Data Storage:
 File sizes: Understanding the units of storage (bytes, kilobytes, megabytes, gigabytes, etc.).
 The difference between primary storage (RAM) and secondary storage (hard drives, SSDs,
optical disks).
o Character Representation:
 How text is represented using ASCII and Unicode encoding.
 The role of encoding systems in storing and transmitting text.
2. Computer Systems
o Components of a Computer:
 Understanding the main components of a computer system, including the CPU (central
processing unit), RAM (random access memory), input devices, output devices, and storage
devices.
 The role of the ALU (arithmetic logic unit), CU (control unit), and registers in the CPU.
o The Fetch-Decode-Execute Cycle:
 The process through which the CPU retrieves (fetches), decodes, and executes instructions.
 The role of clock cycles and how they impact processing speed.
o Types of Software:
 System software (e.g., operating systems, utilities) vs application software (e.g., word
processors, games).
 Understanding how software interacts with hardware to carry out tasks.
3. Networks
o Types of Networks:
 Difference between LAN (Local Area Network), WAN (Wide Area Network), and PAN
(Personal Area Network).
 The role of the internet and the types of connections used for networking (e.g., Wi-Fi,
Ethernet).
o Network Topologies:
 Understanding different network topologies such as star, bus, and ring and their advantages
and disadvantages.
o Protocols and Layers:
 Introduction to TCP/IP (Transmission Control Protocol/Internet Protocol) and the OSI model
(Open Systems Interconnection), focusing on the layers involved in data transmission.
 Understanding HTTP, FTP, DNS, IP addressing, and routers in the context of networking.
4. Cybersecurity and Threats
o Types of Cyber Threats:
 Malware: Including viruses, worms, and ransomware.
 Phishing: Techniques used to deceive individuals into revealing personal information.
 Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks.
o Protection Measures:
 Using firewalls, antivirus software, and encryption to protect data.
 The importance of secure passwords, two-factor authentication, and other security practices
to protect digital assets.
5. Algorithms
o Sorting Algorithms:
 Understanding how different sorting algorithms work, such as bubble sort, insertion sort,
and merge sort.
o Searching Algorithms:
 Techniques like linear search and binary search for finding data in a list.

, how they scale with larger data sets (using Big O notation).
o Recursion:
 Understanding recursive algorithms, where a function calls itself, and examples of problems
that can be solved recursively (e.g., calculating factorials, Fibonacci sequences).
6. Ethical, Legal, and Environmental Impacts of Computing
o Ethics in Computing:
 The impact of computing on privacy, data protection, and the responsibilities of developers
and users.
 Discussing the ethical implications of emerging technologies like artificial intelligence,
surveillance systems, and data collection.
o Legal Issues:
 Understanding the Data Protection Act and copyright laws related to software and digital
content.
 The implications of cybercrime, including hacking, fraud, and intellectual property theft.
o Environmental Impact:
 The environmental effects of computing, including e-waste and the energy consumption of
large-scale data centers.
7. Developing Computational Thinking
o Problem Solving:
 Using logical thinking and computational methods to solve problems.
 Applying techniques such as decomposition, abstraction, and pattern recognition to break
down complex problems and develop efficient solutions.
o Designing Solutions:
 Creating algorithms and programs to solve real-world problems using programming
languages like Python, VB.NET, or Java.
8. Cloud Computing and Emerging Technologies
o Cloud Computing:
 Understanding the concept of cloud storage and cloud services (e.g., Google Drive, AWS).
 The advantages and disadvantages of using cloud-based services for data storage and
computing.
o Artificial Intelligence (AI):
 An introduction to AI, machine learning, and natural language processing.
 The role of AI in various industries, including healthcare, finance, and entertainment.

, 2

Do not write
outside the
Answer all questions. box




0 1Which statement best describes what computers represent using binary? Shade
one lozenge.
[1 mark]


A All data are represented using binary.

B All data and instructions are represented using binary.

C Some data and instructions are represented using binary.

D Some instructions are represented using binary.



0 2.1 Convert the binary number 10110111 into decimal.
[1 mark]




0 2 . 2 Convert the decimal number 112 into hexadecimal.
You should show your working.
[2 marks]




Answer




*02*
IB/G/Jun24/8525/2

Reviews from verified buyers

Showing all 2 reviews
4 months ago

7 months ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Cate001 Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
1395
Member since
2 year
Number of followers
909
Documents
1561
Last sold
18 hours ago
Ace Your Exams with Expertly Crafted Study Materials!

Looking to level up your revision? I offer comprehensive, easy-to-understand study materials tailored for major exam boards including AQA, OCR, Edexcel, and more, perfect for A-Level, GCSE, and other courses. ✨ What You’ll Get: 1. Concise summaries and clear explanations 2. * Past exam papers with complete official marking schemes * Whether you need quick revision notes, detailed study guides, or real past papers to test your knowledge, I’ve got you covered. These resources are designed to help you study smarter and achieve top grades.

Read more Read less
4.4

284 reviews

5
196
4
51
3
18
2
3
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions