Paper 1 Y12 Computer Science Mock Assessment 2025
Paper 1 Y12 Computer Science Mock Assessment 2025
Candidate Candidate
forename surname
INSTRUCTIONS TO CANDIDATES
• Write your name, centre number and candidate number in the boxes above. Please write clearly and in capital letters.
• Use black ink. HB pencil may be used for graphs and diagrams only.
• Answer all the questions, unless your teacher tells you otherwise.
• Read each question carefully. Make sure you know what you have to do before starting your answer.
• Where space is provided below the question, please write your answer there.
• You may use additional paper, or a specific Answer sheet if one is provided, but you must clearly show your candidate number, centre number
and question number(s).
[1]
2. One use of ROM is to store the Basic Input Output System (BIOS). The BIOS is used when the computer is
first turned on.
i. Describe what the BIOS will do to start up the computer.
[3]
ii. Apart from storing the BIOS, ROM can also be used in other ways.
Describe how an embedded system can make a different use of ROM and why it is an advantage.
[2]
3. A software company decides to release a duplicate file finder which it has named “De-Duplicator”. Duplicate
files are files that are exactly the same (bit for bit identical). Space is often wasted on computers by having
multiple versions of the same file. Duplicate file finders are programs that find and identify duplicate files on a
hard drive so that they can be removed.
[2]
4. A company releases a utility called Utility software. The utility creates a virtual storage drive from an area of the
computer's RAM.
[4]
[3]
ii. Explain the purpose of scheduling.
[3]
(b). Memory management in a computer for main memory can use either paging or segmentation.
i. Explain what is meant by ‘paging’.
[2]
ii. Explain what is meant by ‘segmentation’.
[2]
[2]
The finance manager needs to work on some files at home and also to assess new software for use in the
finance department.
State three different storage devices that the finance manager would use and describe what each device would
be used for.
8. An embedded system is often a small device that is designed to carry out a limited number of specialised
tasks. Professional athletes sometimes wear small embedded systems called fitness trackers in their shirts.
These can be used to track their speed, position, heart rate and other performance data during an event. The
tracker transmits this data to a pitch-side server which collates the data from all the athletes.
The fitness tracker manufacturers had to decide which type of secondary storage to use.
Explain two reasons why flash (solid state) storage would be the best type of secondary storage for the fitness
tracker system.
[4]
9. State the most appropriate application software for each task in the table.
[5]
10. Low-level languages have features which include opcodes and mnemonics.
i. Explain the term opcode.
[3]
11. Pipelining is one factor that affects the performance of a CPU. Identify one other factor.
[1]
12. A program written using the Little Man Computer instruction set is shown in Fig. 1.
Fig. 1
Complete the table below to show the output(s) from this program given the inputs.
Inputs Output(s)
12, 5
16, 4
3, 7
[4]
13(a). Mobile Treasure Hunt is a game played on a mobile phone. The game shows the user's position on a map
of their local area. Treasure randomly appears on the map and users must move to the appropriate area to collect
the treasure before it disappears.
The next page shows a part of the code from Mobile Treasure Hunt.
Explain what is meant by the term ‘encapsulation’ with reference to the attribute called name.
[3]
[3]
Methods: ......................................................................................................................................................
Attributes: ...................................................................................................................................................
[2]
The software team use a prebuilt library to create the Graphical User Interface.
i. Give two advantages to the software team of using a library.
[2]
ii. The program is compiled. Explain the process of compilation including how code from the library
becomes part of the finished program, justifying why each stage is necessary.