Unit 2, 2016 MS
Unit 2, 2016 MS
Computing
Unit 2 Computer Components, The Stored Program Concept and
the Internet
Mark scheme
2520
June 2016
It must be stressed that a mark scheme is a working document, in many cases further developed and
expanded on the basis of students’ reactions to a particular paper. Assumptions about future mark
schemes on the basis of one year’s document should be avoided; whilst the guiding principles of
assessment remain constant, details will change, depending on the content of a particular
examination paper.
3 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016
1 a ii NOR (gate); 1
1 b i 2
A. 1 mark - for circuit with just AND gate with inputs from A and B
connected to J
1 b ii 𝐂. 𝐇 + 𝐀. 𝐉̅ 3
1 mark – 𝐂. 𝐇;
1 mark - 𝐀. 𝐉;̅
1 mark for combining two previous with an OR/+ and at least one of
LHS and RHS are correct;
4 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016
1 c ̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅
𝐀 .𝐁 + 𝐁 +𝐂 3
̅+𝐁
𝐀 ̅ . 𝐂̅ - use of De Morgan's (twice)
̅ + 𝐁
̅ ( 𝟏 + 𝐂̅ ) - factorising
̅ + 𝐁.
𝐀
̅+𝐁
𝐀 ̅ - from use of 1+X=1
̅̅̅̅̅̅
𝐀. 𝐁 - final answer (from use of De Morgan’s)
Alternative answer:
̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅
𝐀 .𝐁 + 𝐁 +𝐂
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
𝐀. 𝐁 . (𝐁 + 𝐂) - use of De Morgan's
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
𝐀. 𝐁 . 𝐁 + 𝐀. 𝐁. 𝐂 - expansion of bracket
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
𝐀. 𝐁 + 𝐀. 𝐁. 𝐂 - from use of B.B=B
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
𝐀. 𝐁 . (𝟏 + 𝐂 ) - factorising
̅̅̅̅̅̅
𝐀. 𝐁 - final answer (from use of 1+C=1)
Mark as follows:
The above examples show two methods of simplifying and identify the
identities used – there are other ways of simplifying the expression
5 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016
2 a Internet: MAX
The Internet is a global network of interconnected computers; 4
using a globally unique address space;
packet-switched network;
using end-to-end communication protocol // Internet Protocol // TCP/IP;
NOTE MAX 3 if no credit worthy point is made about the world wide
web.
2 b Code Explanation 2
<title>High View Places the text 'High View Academy' into
Academy</title> the top of the browser window / into a
tab;
2 c By using an external style sheet all pages of the web site can have the MAX
presentation/layout controlled; 1
By using an external style sheet all pages of the web site using it will
have a consistent look / theme;
The style only needs to be edited in one place to affect an entire
website;
6 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016
3 a 2
Software Classification
(number)
2
Virus scanner
A. utilities
4
Interpreter
A. translators
1
Spreadsheet
A. general purpose
(application software)
3 c i imperative: 2
Follows a sequence of instructions provided by a programmer //
instructions specify how to solve the problem;
high-level:
A language that uses English-like keywords // one instruction maps to
several machine code instructions // has structures/support for
assignment/iteration/selection/subroutines // support for a variety of
data structures;
7 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016
3 d Software: 3
Bespoke (software);
4 a Processor: 3
To (fetch, decode) and execute instructions // performs
logical/arithmetical operations;
A. executes instruction
R. runs programs
Control bus:
To carry control signals (between components);
A. example of a control signal
8 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016
5 b ii HTTP: 2
HTTP is a protocol for accessing websites which are usually available
to the general public;
Alternative steps:
Run the FTP client on the laptop to connect to the security
update Server using username and password
Download/transfer the required file
Connect to the company FTP server
Upload the required file from the laptop
Run the Telnet client to connect to the company server
Login to the remote server
Run the command to install the security update // apply update
Log off from the server // Disconnect from the server
9 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016
10 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016
6 a 3
Situation Device
(number)
Storing a small file (50KB) which is to be 5;
transferred from one computer to another
Distributing the contents of a sound library 4;
(3GB) to 2000 owners of a piece of music A. 5
software
Storing a backup of a server (2 TB) 2;
Note: If a number is used more than once accept and award mark in
the location it is correct. Reject if more than one number is entered into
an answer cell. Accept if name is used rather than number.
Writing:
To write data a high powered/high frequency laser makes sections less
reflective; A. burns a pit;
General:
The difference between reflective and non-reflective parts / pits and
lands indicates the 1s and 0s;
The data is stored as a continuous spiral track;
11 of 12
MARK SCHEME – AS-LEVEL COMPUTING – COMP2 – JUNE 2016
7 b ii Example of insecure location with explanation that this would breach MAX
the principle that data must be kept secure; 1
Personal data shall not be transferred to a country or territory (outside
the EEA) if the country or territory cannot ensure an adequate level of
protection of personal data // different countries may have different
Data Protection laws;
7 c Advantages: MAX
Files can be accessed by any device (as we move to more mobile 3
devices);
Files can be accessed (more easily) from home / from other locations;
Reduced need for (school) to employ IT support staff // reduced
requirement to maintain service;
No more one-off purchase costs for storage devices;
Service may offer automatic backup/versioning facilities // if local
computer fails files are still available from remote service;
Files can be shared more easily;
Company could have better security expertise/practices;
Files can be stored remotely to free up local storage space;
Remote storage has potential to be unlimited;
Disadvantages:
Personal files are online and could be hacked into;
Reliance on another company to look after files rather than yourself;
Governments/people could be watching/reading your files;
Becoming more dependent on the Internet // reliance on Internet
connection;
Ongoing fee to pay for storage services;
Local storage offers quicker access time;
Note
Full marks can only be awarded if student has covered both
advantages and disadvantages.
12 of 12