100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Pearson Edexcel International GCSE (9–1) (Time: 2 hours) 4CP0/01 Computer Science PAPER 1: Principles of Computer Science 2024

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
11-03-2025
Written in
2024/2025

Pearson Edexcel International GCSE (9–1) (Time: 2 hours) 4CP0/01 Computer Science PAPER 1: Principles of Computer Science 2024Pearson Edexcel International GCSE (9–1) (Time: 2 hours) 4CP0/01 Computer Science PAPER 1: Principles of Computer Science 2024Pearson Edexcel International GCSE (9–1) (Time: 2 hours) 4CP0/01 Computer Science PAPER 1: Principles of Computer Science 2024

Show more Read less
Institution
Pearson Edexcel GCSE In Computer Science
Course
Pearson Edexcel GCSE In Computer Science











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Pearson Edexcel GCSE In Computer Science
Course
Pearson Edexcel GCSE In Computer Science

Document information

Uploaded on
March 11, 2025
Number of pages
32
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

PMT


Please check the examination details below before entering your candidate information
Candidate surname Other names


Centre Number Candidate Number




Pearson Edexcel International GCSE (9–1)
Friday 26 May 2024
Afternoon (Time: 2 hours) Paper
reference 4CP0/01
Computer Science  


PAPER 1: Principles of Computer Science


You must have: Total Marks
Pseudocode command set (enclosed)



Instructions
•• Use black ink or ball-point pen.
Fill in the boxes at the top of this page with your name,
centre number and candidate number.
•• Answer all questions.
Answer the questions in the spaces provided
– there may be more space than you need.

Information
•• The total mark for this paper is 80.
The marks for each question are shown in brackets
– use this as a guide as to how much time to spend on each question.
• You are not allowed to use a calculator.
Advice
•• Read each question carefully before you start to answer it.
Try to answer every question.
•• Check your answers if you have time at the end.
Marks will not be awarded for using product or trade names in answers without
giving further explanation.


Turn over


P72937A
©2023 Pearson Education Ltd.
N:1/1/1/1/1/
*P72937A0124*

, PMT




Answer ALL questions. Write your answers in the spaces provided.
Some questions must be answered with a cross in a box . If you change your mind about an




DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
answer, put a line through the box and then mark your new answer with a cross .
1 People use networks in all aspects of their lives.
(a) An office building has desktop computers connected in a network.
One reason for networking computers is to enable technicians to maintain
them remotely.
State two other reasons for connecting computers in a network.
(2)

1 . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............... ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............... ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .



2 . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............... ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ............... ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .


(b) Access to data must be controlled.
(i) Identify one reason that encryption is used.
(1)
A To compress the file so it takes up less storage space

B To make sure both sender and receiver use the same key

C To make sure data is only understood by the intended receiver

D To stop malicious hackers getting into a computer network




2
*P72937A0224* 

, PMT




(ii) File servers are in a small room at the back of an office.
The office has a burglar alarm.
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA




Give two other ways that the servers can be secured using physical methods.
(2)

1 .. . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .



2 .. . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .


(iii) Phishing is a type of social engineering.
State what is meant by the term social engineering.
(1)

. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .



. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .


(c) 5G is a communication standard.
Identify the characteristic that is true for the 5G communication standard.
(1)
A It has a high transmission latency

B It has built-in security

C It has a lower bandwidth than 3G and 4G

D It uses wireless communication




3
 *P72937A0324* Turn over

, PMT




(d) Programmers write and test code.
They use modular testing.




DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
State what is meant by the term modular testing.
(1)

. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .



. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................ ................ . . . . . . . . . . . . . . . . . . . .


(e) Computer scientists are viewed as professionals, in the same way that doctors are
viewed as professionals.
Give two ways that computer scientists can demonstrate professionalism.
(2)

1 .. . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .



2 .. . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................ ............................................................................................................................................ . . . . . . . . . . . . . . . . . . . .


(Total for Question 1 = 10 marks)




4
*P72937A0424* 
$13.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TheExaminar

Get to know the seller

Seller avatar
TheExaminar Cornell University
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
8 months
Number of followers
0
Documents
80
Last sold
-
TopGradePapers

Get AQA, GCSE, Edexcel, and OCR past papers with official marking schemes to revise smarter and achieve top grades easily.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions