Paper 2
Paper 2
Surname
Forename(s)
     Candidate signature
                             I declare this is my own work.
INTERNATIONAL GCSE
COMPUTER SCIENCE
Paper 2 Concepts and principles of computer science
                                                                                            Question     Mark
Instructions
                                                                                               1
• Use black ink or black ball-point pen.
• Fill in the boxes at the top of the page.                                                    2
• Answer all questions.                                                                        3
• You must answer the questions in the spaces provided. Do not write                           4
  outside the box around each page or on blank pages.
• If you need extra space for your answer(s), use the lined pages at the end of                5
  this book. Write the question number against your answer(s).                                 6
• Do all rough work in this booklet. Cross through any work you do not                         7
  want to be marked.
                                                                                               8
• You are not allowed to use a calculator.
                                                                                               9
Information                                                                                    10
•   The marks for questions are shown in brackets.                                             11
•   The maximum mark for this paper is 80.
                                                                                               12
•   You may use a bilingual dictionary.
•   You may not use an English dictionary.                                                     13
TOTAL
    *Nov249210201*
                                                               IB/M/Nov24/G4002/V6                  9210/2
                                              2
                                                                                                          Do not write
                                                                                                          outside the
                        Answer all questions in the spaces provided.                                          box
A computer network is a collection of devices that can communicate with each other
   *02*
                                                                                      IB/M/Nov24/9210/2
                                             3
                                                                                                          Do not write
                                                                                                          outside the
0 1 . 4   Describe the layout of a network that uses a star topology.                                         box
[2 marks]
set of rules that devices have when communicating with each other
Turn over ►
   *03*
                                                                                      IB/M/Nov24/9210/2
                                                       4
                                                                                                      Do not write
                                                                                                      outside the
0 2     Figure 1 shows the list 32, 85, 18, 4, 10, 72, 41 being sorted using the merge sort               box
algorithm.
        Complete the empty boxes in Figure 1 to show how the merge sort algorithm would
        be applied to the list.
                                                                                 [2 marks]
Figure 1
32 85 18 4
32 85 18 4
32 85 4 18
4 18 32 85
      *04*
                                                                                  IB/M/Nov24/9210/2
                       5
                                                               Do not write
                                                               outside the
         Turn over for the next question                           box
Turn over ►
*05*
                                           IB/M/Nov24/9210/2
                                              6
                                                                                           Do not write
                                                                                           outside the
0 3 . 1   State what compression is.                                                           box
[1 mark]
   *06*
                                                                       IB/M/Nov24/9210/2
                                         7
                                                                                                 Do not write
                                                                                                 outside the
0 3 . 3   The word SELFLESSNESS is to be represented using Huffman coding.                           box
          Draw a Huffman tree that could be used to encode the word SELFLESSNESS.
                                                                               [4 marks]
Working:
Turn over ►
   *07*
                                                                             IB/M/Nov24/9210/2
                                              8
                                                                                                        Do not write
                                                                                                        outside the
0 4 . 1   State an example of an embedded system.                                                           box
[1 mark]
smart watches
Difference 1
             embedded systems have specific purpose and desktop computers are general
            purpose.
Difference 2
Embedded systems often have less memory while desktop computers have more memory .
Difference 3
            Embedded systems are usually designed to perform a fixed set of tasks and desktop
            computers can many software applications.
   *08*
                                                                                    IB/M/Nov24/9210/2
                       9
                                                               Do not write
                                                               outside the
         Turn over for the next question                           box
Turn over ►
*09*
                                           IB/M/Nov24/9210/2
                                              10
                                                                                                           Do not write
                                                                                                           outside the
0 5       A relational database has been created to store data about the dishes that are served                box
on different days in a school and the ingredients that are used to make them.
There are three tables in the database: Menu, Dish and Ingredient.
Figure 2
                                                     Menu
                                            Day                 DishID
                                      Monday                       1
                                      Monday                       2
                                      Monday                       3
                                      Monday                       4
                                      Monday                       5
                                      Tuesday                      6
                                      Tuesday                      4
                                      Wednesday                    7
                                                     Dish
                             DishID          DishName                    Course
                                1      Vegetarian lasagne         Main
                                2      Chicken salad              Main
                                3      Chicken burger             Main
                                4      Chocolate brownie          Dessert
                                5      Flapjack                   Dessert
                                6      Lamb kofta                 Main
                                7      Doughnut                   Dessert
                                                   Ingredient
                    DishID       IngredientName             Quantity            Category
                       1      Butternut squash                 1            Vegetable
                       1      Red pepper                       3            Vegetable
                       2      Chicken breast                  0.5           Meat
                       3      Burger bun                       1            Bread
                       3      Chicken breast                   1            Meat
                       5      Oats                            200           Cereal
                       6      Minced lamb                     500           Meat
0 5 . 1   State a suitable data type for the Quantity field in the Ingredient table.
                                                                                            [1 mark]
real
      *10*
                                                                                       IB/M/Nov24/9210/2
                                            11
                                                                                                        Do not write
                                                                                                        outside the
0 5 . 2   Write an SQL query that lists the ingredient names and quantities of all the vegetables           box
          that are needed to make the dishes that the canteen serves on a Monday.
                                                                                        [4 marks]
0 5 . 3   Flapjacks are now made using chocolate chips, which are a new ingredient.
          Chocolate chips are in the category Confectionery and 100 chocolate chips are
          used to make flapjacks.
          Complete the SQL code to add the new ingredient to the Ingredient table.
                                                                                      [2 marks]
Chicken breast
Turn over ►
   *11*
                                                                                    IB/M/Nov24/9210/2
                                                12
                                                                                                             Do not write
                                                                                                             outside the
0 6         Two methods that can be used to improve the security of a network are a firewall and                 box
            A firewall works by blocking any data packets that do not meet a set of protocols.
            It acts as a barrier between the network and the outside world
             preventing unauthorized access.
0 6 . 2     Describe how MAC address filtering works to keep a computer network secure.
                                                                                    [2 marks]
          MAC address filtering works by allowing only devices with specific MAC addresses
          to access the network. A list of allowed MAC addresses is present and any device
          with a MAC address not on the list cannot enter.
      *12*
                                                                                         IB/M/Nov24/9210/2
                                               13
                                                                                                               Do not write
                                                                                                               outside the
0 7 . 1   Explain the difference between the purpose of a compiler and the purpose of an                           box
          assembler.
                                                                                      [1 mark]
            An interpreter executes a program line by line and it does not create a separate
            executable file.
            An interpreter executes a program line by line and it does not create a separate executable file.
interpreter executes teh code line by line and does not create and executable file
          Difference 1
              low level languages are similar to machiene code but are hard to understand compared to high
             level languages
Difference 2
   *13*
                                                                                           IB/M/Nov24/9210/2
                                                14
                                                                                                          Do not write
                                                                                                          outside the
0 8       Figure 3 shows pseudocode for a search algorithm. The lines of the pseudocode are                   box
numbered.
Figure 3
             1    SearchName  USERINPUT
             2    Start  0
             3    End  LEN(Names) - 1
             4    Found  False
             5    WHILE Start ≤ End AND Found = False
             6      MidPoint  (Start + End) DIV 2
             7      IF SearchName > Names[MidPoint] THEN
             8        Start  MidPoint + 1
             9      ELSE IF SearchName < Names[MidPoint] THEN
             10       End  MidPoint - 1
             11     ELSE IF SearchName = Names[MidPoint] THEN
             12       OUTPUT "Name found at position:"
             13       OUTPUT MidPoint
             14       Found  True
             15     ENDIF
             16   ENDWHILE
Figure 4
0 8 . 1   Complete the trace table below to show the algorithm in Figure 3 being carried out on
          the array in Figure 4 when the user enters the name Fendi to search for.
Fendi 2 2 true
      *14*
                                                                                      IB/M/Nov24/9210/2
                                              15
                                                                                                           Do not write
                                                                                                           outside the
0 8 . 2    State the name of the search algorithm that the pseudocode in Figure 3 implements.                  box
[1 mark]
binary search
to:
ELSE
           State whether or not editing this line of the algorithm would affect whether the
           algorithm works as it should and explain why this is the case.
                                                                                              [1 mark]
          Editing the line will not affect the algorithm because ELSE still runs when the
          name is found.
Turn over ►
   *15*
                                                                                       IB/M/Nov24/9210/2
                                         16
                                                                                                    Do not write
                                                                                                    outside the
0 9     Figure 5 shows an incomplete flowchart.                                                         box
        Complete the flowchart shown in Figure 5 by adding all the missing labels so it
        represents the algorithm described.
                                                                                   [4 marks]
                                             Figure 5
start
input number
                                                                 stop
                                                                                                        4
      *16*
                                                                                IB/M/Nov24/9210/2
                                               17
                                                                                                        Do not write
                                                                                                        outside the
1 0       Figure 6 shows a logic circuit represented as a Boolean expression.                               box
Figure 6
Q=A+B
1 0 . 1   Draw a logic circuit diagram in the space below for the Boolean expression in
          Figure 6. Your logic circuit diagram must use exactly four logic gates.
[4 marks]
Figure 7 shows the truth table for the Boolean expression in Figure 6.
Figure 7
                                                    A   B   Q
                                                    0   0   0
                                                    0   1   0
                                                    1   0   0
                                                    1   1   1
1 0 . 2   The Boolean expression in Figure 6 and the truth table in Figure 7 produce the same
          output as a logic gate.
OR gate
Turn over ►
      *17*
                                                                                    IB/M/Nov24/9210/2
                                            18
                                                                                                    Do not write
                                                                                                    outside the
1 1       Weak passwords and default passwords are threats to cyber security.                           box
          Reason 1
                                       too short
1 1 . 2   When you get a new wireless router, it sometimes has a default password which you
          should change.
          Default passwords are a threat because they arevery knownand can be easily
          guessed by hackers
      *18*
                                                                                IB/M/Nov24/9210/2
                                              19
                                                                                                             Do not write
                                                                                                             outside the
1 1 . 3   Social engineering can be used to find out a computer user’s password.                                 box
          State two social engineering techniques and for each describe how they could be
          used to find out a computer user’s password.
                                                                                    [2 marks]
Technique phishing
Technique Pretexting
How it could be used making up a false scenario to trick victim to reveal information
Turn over ►
   *19*
                                                                                         IB/M/Nov24/9210/2
                                               20
                                                                                                        Do not write
                                                                                                        outside the
1 2 . 1   Convert the binary number 10011100 to hexadecimal.                                                box
[2 marks]
9C
Answer
132
Answer
Figure 8
                        1        0         0           1       1       1        1            0
              +         0        1         0           0       1       1        0            0
                       11101010
            Answer
[2 marks]
1 2 . 4   State the name of the component inside a CPU that is used to carry out the addition of
          two binary numbers.
                                                                                      [1 mark]
   *20*
                                                                                    IB/M/Nov24/9210/2
                                                  21
                                                                                                            Do not write
                                                                                                            outside the
1 2 . 5   State the name of the component inside a CPU that sends out a regular electronic                      box
          pulse.
                                                                                     [1 mark]
clock
1 2 . 7   Computer A has four cores. Computer B has two cores. Each core can execute
          one instruction at a time.
          Describe two reasons why the CPU in Computer A might not be twice as fast as the
          CPU in Computer B.
                                                                                 [2 marks]
Reason 1 others factor like clock seed also affects the performance
Turn over ►
   *21*
                                                                                        IB/M/Nov24/9210/2
                                            22
                                                                                                           Do not write
                                                                                                           outside the
1 2 . 8   RAM and secondary storage have different capacities and access speeds.                               box
          Difference 1
                                RAM is volatile and secondary storage is nonvolatile
          State two other resources that are managed by the operating system.
                                                                                          [2 marks]
          Resource 1
                                processor
16
   *22*
                                                                                       IB/M/Nov24/9210/2
                       23
                                                               Do not write
                                                               outside the
         Turn over for the next question                           box
Turn over ►
*23*
                                           IB/M/Nov24/9210/2
                                              24
                                                                                                      Do not write
                                                                                                      outside the
1 3       Figure 9 shows the HTML used to create a web page.                                              box
Figure 9
          <html>
            <head>
              <title>Suffolk towns</title>
            </head>
            <body>
              <p>Biggest towns in Suffolk</p>
              <ol>
                 <li>Ipswich</li>
                 <li>Lowestoft</li>
              </ol>
            </body>
          </html>
1 3 . 1 Sketch what the web page in Figure 9 will look like when displayed in a web browser.
Suffolk towns
                   1. Ipswich
                   2. Lowestoft
[3 marks]
      *24*
                                                                                  IB/M/Nov24/9210/2
                                                 25
                                                                                                    Do not write
                                                                                                    outside the
1 3 . 2   The <ol></ol> tags are replaced with the <ul></ul> tags.                                      box
no chnage
ol {color: red}
          What could ol be replaced with to achieve the same change in the appearance of the
          web page?
                                                                                   [1 mark]
li
Turn over ►
   *25*
                                                                                IB/M/Nov24/9210/2
                                            26
                                                                                                      Do not write
                                                                                                      outside the
1 3 . 5   Tick () two boxes to indicate which of the tags are available in HTML5 but not                 box
A <br>
B <div>
C <header>
D <video> 7
END OF QUESTIONS
   *26*
                                                                                  IB/M/Nov24/9210/2
                           27
                                                                         Do not write
                                                                         outside the
       There are no questions printed on this page                           box
*27*
                                                     IB/M/Nov24/9210/2
                              28
                                                                                     Do not write
                                                                                     outside the
Question               Additional page, if required.                                     box
    *28*
                                                                 IB/M/Nov24/9210/2
                              29
                                                                                     Do not write
                                                                                     outside the
Question               Additional page, if required.                                     box
    *29*
                                                                 IB/M/Nov24/9210/2
                              30
                                                                                     Do not write
                                                                                     outside the
Question               Additional page, if required.                                     box
    *30*
                                                                 IB/M/Nov24/9210/2
                              31
                                                                                     Do not write
                                                                                     outside the
Question               Additional page, if required.                                     box
    *31*
                                                                 IB/M/Nov24/9210/2
                                                                           32
                                                                                                                                                             Do not write
                                                                                                                                                             outside the
                                       There are no questions printed on this page                                                                               box
Copyright information
For confidentiality purposes, all acknowledgements of third-party copyright material are published in a separate booklet. This booklet is published after
each live examination series and is available for free download from www.oxfordaqa.com
Permission to reproduce all copyright material has been applied for. In some cases, efforts to contact copyright-holders may have been unsuccessful
and OxfordAQA will be happy to rectify any omissions of acknowledgements. If you have any queries please contact the Copyright Team.
Copyright © 2025 OxfordAQA International Examinations and its licensors. All rights reserved.
                                                                                                        *24bY9210/2*
       *32*
                                                                                                                                         IB/M/Nov24/9210/2