0% found this document useful (0 votes)
8 views12 pages

Unit 2, 2016 MS

Uploaded by

jtcgamming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views12 pages

Unit 2, 2016 MS

Uploaded by

jtcgamming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

AS-LEVEL

Computing
Unit 2 Computer Components, The Stored Program Concept and
the Internet
Mark scheme

2520
June 2016

Version: 1.0 Final


Mark schemes are prepared by the Lead Assessment Writer and considered, together with the
relevant questions, by a panel of subject teachers. This mark scheme includes any amendments
made at the standardisation events which all associates participate in and is the scheme which was
used by them in this examination. The standardisation process ensures that the mark scheme covers
the students’ responses to questions and that every associate understands and applies it in the same
correct way. As preparation for standardisation each associate analyses a number of students’
scripts. Alternative answers not already covered by the mark scheme are discussed and legislated
for. If, after the standardisation process, associates encounter unusual answers which have not been
raised they are required to refer these to the Lead Assessment Writer.

It must be stressed that a mark scheme is a working document, in many cases further developed and
expanded on the basis of students’ reactions to a particular paper. Assumptions about future mark
schemes on the basis of one year’s document should be avoided; whilst the guiding principles of
assessment remain constant, details will change, depending on the content of a particular
examination paper.

Further copies of this mark scheme are available from aqa.org.uk

Copyright © 2016 AQA and its licensors. All rights reserved.


AQA retains the copyright on all its publications. However, registered schools/colleges for AQA are permitted to copy material from this
booklet for their own internal use, with the following important exception: AQA cannot give permission to schools/colleges to photocopy any
material that is acknowledged to a third party even for internal use within the centre.
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

The following annotation is used in the mark scheme:

; - means a single mark


// - means alternative response
/ - means an alternative word or sub-phrase
A - means acceptable creditworthy answer
R - means reject answer as not creditworthy
NE - means not enough
I - means ignore
DPT - means "Don't penalise twice". In some questions a specific error made by a candidate, if
repeated, could result in the loss of more than one mark. The DPT label indicates that this
mistake should only result in a candidate losing one mark, on the first occasion that the
error is made. Provided that the answer remains understandable, subsequent marks
should be awarded as if the error was not being repeated.

3 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

Qu Part Sub- Marking Guidance Marks


part
1 a i AND (gate); 1

1 a ii NOR (gate); 1

1 b i 2

1 mark - NOT gate on input B (before any other gate);


1 mark - AND gate with inputs from A and NOT B with output connected
to J;

A. 1 mark - for circuit with just AND gate with inputs from A and B
connected to J

1 b ii 𝐂. 𝐇 + 𝐀. 𝐉̅ 3

1 mark – 𝐂. 𝐇;
1 mark - 𝐀. 𝐉;̅
1 mark for combining two previous with an OR/+ and at least one of
LHS and RHS are correct;

I. K= (or other letter)

I. brackets if they will not affect expression evaluation

4 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

1 c ̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅
𝐀 .𝐁 + 𝐁 +𝐂 3

̅+𝐁
𝐀 ̅ . 𝐂̅ - use of De Morgan's (twice)
̅ + 𝐁

̅ ( 𝟏 + 𝐂̅ ) - factorising
̅ + 𝐁.
𝐀

̅+𝐁
𝐀 ̅ - from use of 1+X=1

̅̅̅̅̅̅
𝐀. 𝐁 - final answer (from use of De Morgan’s)

Alternative answer:

̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅
𝐀 .𝐁 + 𝐁 +𝐂
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
𝐀. 𝐁 . (𝐁 + 𝐂) - use of De Morgan's

̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
𝐀. 𝐁 . 𝐁 + 𝐀. 𝐁. 𝐂 - expansion of bracket
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
𝐀. 𝐁 + 𝐀. 𝐁. 𝐂 - from use of B.B=B
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
𝐀. 𝐁 . (𝟏 + 𝐂 ) - factorising

̅̅̅̅̅̅
𝐀. 𝐁 - final answer (from use of 1+C=1)

Mark as follows:
The above examples show two methods of simplifying and identify the
identities used – there are other ways of simplifying the expression

3 marks should be awarded if the final answer is correct and there is


evidence of good sound working.
2 marks should be awarded if the final answer is wrong/not achieved but
evidence of good sound working.
2 marks should be awarded if the final answer is correct with some good
working but the working also has incorrect use of identities
1 mark should be awarded if there is evidence of one correct use of an
identity or simplification process
1 mark should be awarded if correct final answer on its own or with
incorrect working

5 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

2 a Internet: MAX
The Internet is a global network of interconnected computers; 4
using a globally unique address space;
packet-switched network;
using end-to-end communication protocol // Internet Protocol // TCP/IP;

World wide web:


The world wide web is a collection of hyperlinked documents;
accessed via the Internet;
using HTTP(S) protocol (to retrieve webpages);

NOTE MAX 3 if no credit worthy point is made about the world wide
web.

2 b Code Explanation 2
<title>High View Places the text 'High View Academy' into
Academy</title> the top of the browser window / into a
tab;

<p style="text-  text 'Important Notice' displayed


size: 18pt; color:  text will be shown in red
red;">Important  text will be shown in a font size of
Notice</p> 18 (pt)
 blank line before and after the
text

Award mark if 3 of the 4 points above


are covered.

2 c By using an external style sheet all pages of the web site can have the MAX
presentation/layout controlled; 1
By using an external style sheet all pages of the web site using it will
have a consistent look / theme;
The style only needs to be edited in one place to affect an entire
website;

6 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

2 d text should be text-align; MAX


scr should be src; 3
schoollogo is missing a file extension;
img tag needs to be closed with a /> ; R. extra </img>
img tag needs an alt section;
missing a <br /> tag to move text underneath the logo // 'High View
Academy' needs to be inside <p>/<div> tags;
A. <br>

A. missing a border= attribute or style= attribute including border: ;

Or any sensible error.

3 a 2

Software Classification
(number)
2
Virus scanner
A. utilities
4
Interpreter
A. translators
1
Spreadsheet
A. general purpose
(application software)

1 mark for any two correct rows


2 marks for all 3 correct rows

3 b To allow sharing of run-time code across programs; MAX


To save memory as routines are only loaded when needed; 1
To provide access to procedures/functions/subroutines when writing a
program;
To reduce amount of programming required // time taken to write
program // allow code to be re-used;

3 c i imperative: 2
Follows a sequence of instructions provided by a programmer //
instructions specify how to solve the problem;

high-level:
A language that uses English-like keywords // one instruction maps to
several machine code instructions // has structures/support for
assignment/iteration/selection/subroutines // support for a variety of
data structures;

7 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

3 c ii To convert the source code/program into object/machine code which MAX


can be executed; 1
Processor cannot directly execute source code;
Interpret the statements of the source code/program/high level
language and perform the actions they describe;

3 d Software: 3
Bespoke (software);

Advantage (MAX 1):


It is made to meet the requirements of the company;
It can be made to fit in with existing software/hardware;

Disadvantage (MAX 1):


It takes time to develop;
It is more expensive as the company has to cover all costs;
NE more expensive
It is more likely to contain bugs;
There is a lack of third party support;

4 a Processor: 3
To (fetch, decode) and execute instructions // performs
logical/arithmetical operations;
A. executes instruction
R. runs programs

Main memory: MAX 1


To store currently running programs;
To store data being used by programs;

Control bus:
To carry control signals (between components);
A. example of a control signal

4 b A - Visual Display Unit; 4


B - Processor;
C - Main Memory;
D - Keyboard;

5 a A numerical label/value assigned to a device; MAX


A series of four bytes // a 32 bit number; 1

A. a series of 16 bytes // a 128 bit number;


A. octet as an alternative to byte
R. Internet Protocol

8 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

5 b i A set of rules (for communication between devices); 1

5 b ii HTTP: 2
HTTP is a protocol for accessing websites which are usually available
to the general public;

Telnet (MAX 1):


The school does not wish people outside of the school network to
remotely login to a school computer // open Telnet port is a security
risk;
A. Telnet is an insecure protocol;

5 c Client server model: 6


 User runs a client application to connect to the server/server
application // client sends a request to the server
 Server (performs processing and) sends result back to client

Steps to update server:


 Run the Telnet client on the laptop to connect to the company
server
 Login to the company server
 Run the FTP client on the company server // use of FTP client
to connect to FTP server
 Login to the security update FTP server using username and
password
 Download/transfer the required file
 Run the command to install the security update // apply the
security update
 Log off from the server // Disconnect from the server

Alternative steps:
 Run the FTP client on the laptop to connect to the security
update Server using username and password
 Download/transfer the required file
 Connect to the company FTP server
 Upload the required file from the laptop
 Run the Telnet client to connect to the company server
 Login to the remote server
 Run the command to install the security update // apply update
 Log off from the server // Disconnect from the server

HOW TO AWARD MARKS:

Mark Bands and Description


5-6 To achieve a mark in this band, candidates must meet
the subject criterion (SUB) and all 5 of the quality of
written communication criteria (QWCx).

9 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

SUB Candidate has made at least five mark-worthy


points and covers both the client server model
and the steps form a logical sequence to
update the server.
QWC1 Text is legible.
QWC2 There are few, if any, errors of spelling,
punctuation and grammar. Meaning is clear.
QWC3 The candidate has selected and used a form
and style of writing appropriate to the purpose
and has expressed ideas clearly and fluently.
QWC4 Sentences (and paragraphs) follow on from
one another clearly and coherently.
QWC5 Appropriate specialist vocabulary has been
used.
3-4 To achieve a mark in this band, candidates must meet
the subject criterion (SUB) and 4 of the 5 quality of
written communication criteria (QWCx).

SUB Candidate has made at least three mark-


worthy points.
QWC1 Text is legible.
QWC2 There may be occasional errors of spelling,
punctuation and grammar. Meaning is clear.
QWC3 The candidate has, in the main, used a form
and style of writing appropriate to the purpose,
with occasional lapses. The candidate has
expressed ideas clearly and reasonably
fluently.
QWC4 The candidate has used well-linked sentences
(and paragraphs).
QWC5 Appropriate specialist vocabulary has been
used.
1-2 To achieve a mark in this band, candidates must meet
the subject criterion (SUB) and 3 of the 5 quality of
written communication criteria (QWCx).
SUB Candidate has made a small number of
relevant points.
QWC1 Most of the text is legible.
QWC2 There may be some errors of spelling,
punctuation and grammar but it should still be
possible to understand most of the response.
QWC3 The candidate has used a form and style of
writing which has many deficiencies. Ideas are
not always clearly expressed.
QWC4 Sentences (and paragraphs) may not always
be well-connected.
QWC5 Specialist vocabulary has been used
inappropriately or not at all.
0 Candidate has made no relevant points.

10 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

6 a 3
Situation Device
(number)
Storing a small file (50KB) which is to be 5;
transferred from one computer to another
Distributing the contents of a sound library 4;
(3GB) to 2000 owners of a piece of music A. 5
software
Storing a backup of a server (2 TB) 2;

Note: If a number is used more than once accept and award mark in
the location it is correct. Reject if more than one number is entered into
an answer cell. Accept if name is used rather than number.

6 b MAX 1 mark from each section (reading, writing, general) MAX


3
Reading:
low power laser is used to read data back from the disk;

Writing:
To write data a high powered/high frequency laser makes sections less
reflective; A. burns a pit;

General:
The difference between reflective and non-reflective parts / pits and
lands indicates the 1s and 0s;
The data is stored as a continuous spiral track;

7 a One site to administer rather than relying on (physical) access to MAX


school servers // security of all servers easier as in one place; 2
Maintenance/backup handled by company B for all servers rather than
individually for each school;
Updates to MIS software can be rolled out to all schools quickly by
updating remote servers;
(Renting a group of servers means that) if an individual server fails
data can be transferred to another with little or no downtime // easier to
add in server redundancy/replication;
Less expensive to rent (a powerful bank) of servers than place one
server into each school;
No one at the school has physical access to the servers;

7 b i Data should be kept secure // data should be protected against 1


unauthorised/unlawful processing;

11 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016

7 b ii Example of insecure location with explanation that this would breach MAX
the principle that data must be kept secure; 1
Personal data shall not be transferred to a country or territory (outside
the EEA) if the country or territory cannot ensure an adequate level of
protection of personal data // different countries may have different
Data Protection laws;

7 c Advantages: MAX
Files can be accessed by any device (as we move to more mobile 3
devices);
Files can be accessed (more easily) from home / from other locations;
Reduced need for (school) to employ IT support staff // reduced
requirement to maintain service;
No more one-off purchase costs for storage devices;
Service may offer automatic backup/versioning facilities // if local
computer fails files are still available from remote service;
Files can be shared more easily;
Company could have better security expertise/practices;
Files can be stored remotely to free up local storage space;
Remote storage has potential to be unlimited;

Disadvantages:
Personal files are online and could be hacked into;
Reliance on another company to look after files rather than yourself;
Governments/people could be watching/reading your files;
Becoming more dependent on the Internet // reliance on Internet
connection;
Ongoing fee to pay for storage services;
Local storage offers quicker access time;

Note
Full marks can only be awarded if student has covered both
advantages and disadvantages.

Refer queries to your team leader

12 of 12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy