Please check the examination details below before entering your candidate information
Candidate surname Other names
Centre Number Candidate Number
Pearson Edexcel International GCSE (9–1)
Friday 26 May 2024
Afternoon (Time: 2 hours) Paper
reference 4CP0/01
Computer Science
PAPER 1: Principles of Computer Science
You must have: Total Marks
Pseudocode command set (enclosed)
Instructions
•• Use black ink or ball-point pen.
Fill in the boxes at the top of this page with your name,
centre number and candidate number.
•• Answer all questions.
Answer the questions in the spaces provided
– there may be more space than you need.
Information
•• The total mark for this paper is 80.
The marks for each question are shown in brackets
– use this as a guide as to how much time to spend on each question.
• You are not allowed to use a calculator.
Advice
•• Read each question carefully before you start to answer it.
Try to answer every question.
•• Check your answers if you have time at the end.
Marks will not be awarded for using product or trade names in answers without
giving further explanation.
Turn over
P72937A
©2023 Pearson Education Ltd.
N:1/1/1/1/1/
*P72937A0124*
, PMT
Answer ALL questions. Write your answers in the spaces provided.
Some questions must be answered with a cross in a box . If you change your mind about an
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
answer, put a line through the box and then mark your new answer with a cross .
1 People use networks in all aspects of their lives.
(a) An office building has desktop computers connected in a network.
One reason for networking computers is to enable technicians to maintain
them remotely.
State two other reasons for connecting computers in a network.
(2)
1 . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............... ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............... ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .
2 . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............... ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............... ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .
(b) Access to data must be controlled.
(i) Identify one reason that encryption is used.
(1)
A To compress the file so it takes up less storage space
B To make sure both sender and receiver use the same key
C To make sure data is only understood by the intended receiver
D To stop malicious hackers getting into a computer network
2
*P72937A0224*
, PMT
(ii) File servers are in a small room at the back of an office.
The office has a burglar alarm.
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
Give two other ways that the servers can be secured using physical methods.
(2)
1 .. . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .
2 .. . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .
(iii) Phishing is a type of social engineering.
State what is meant by the term social engineering.
(1)
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .
(c) 5G is a communication standard.
Identify the characteristic that is true for the 5G communication standard.
(1)
A It has a high transmission latency
B It has built-in security
C It has a lower bandwidth than 3G and 4G
D It uses wireless communication
3
*P72937A0324* Turn over
, PMT
(d) Programmers write and test code.
They use modular testing.
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
State what is meant by the term modular testing.
(1)
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .
(e) Computer scientists are viewed as professionals, in the same way that doctors are
viewed as professionals.
Give two ways that computer scientists can demonstrate professionalism.
(2)
1 .. . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .
2 .. . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .
(Total for Question 1 = 10 marks)
4
*P72937A0424*