Computer Science: 8520/2-Paper 2 Written Assessment Mark Scheme
Computer Science: 8520/2-Paper 2 Written Assessment Mark Scheme
Computer Science: 8520/2-Paper 2 Written Assessment Mark Scheme
Computer Science
8520/2-Paper 2 Written Assessment
Mark scheme
June 2018
Mark schemes are prepared by the Lead Assessment Writer and considered, together with the relevant
questions, by a panel of subject teachers. This mark scheme includes any amendments made at the
standardisation events which all associates participate in and is the scheme which was used by them in
this examination. The standardisation process ensures that the mark scheme covers the students’
responses to questions and that every associate understands and applies it in the same correct way.
As preparation for standardisation each associate analyses a number of students’ scripts. Alternative
answers not already covered by the mark scheme are discussed and legislated for. If, after the
standardisation process, associates encounter unusual answers which have not been raised they are
required to refer these to the Lead Assessment Writer.
It must be stressed that a mark scheme is a working document, in many cases further developed and
expanded on the basis of students’ reactions to a particular paper. Assumptions about future mark
schemes on the basis of one year’s document should be avoided; whilst the guiding principles of
assessment remain constant, details will change, depending on the content of a particular examination
paper.
Before you apply the mark scheme to a student’s answer read through the answer and annotate it (as
instructed) to show the qualities that are being looked for. You can then apply the mark scheme.
When assigning a level you should look at the overall quality of the answer and not look to pick holes in
small and specific parts of the answer where the student has not performed quite as well as the rest. If
the answer covers different aspects of different levels of the mark scheme you should use a best fit
approach for defining the level and then use the variability of the response to help decide the mark within
the level, ie if the response is predominantly level 3 with a small amount of level 4 material it would be
placed in level 3 but be awarded a mark near the top of the level because of the level 4 content.
You may well need to read back through the answer as you apply the mark scheme to clarify points and
assure yourself that the level and the mark are appropriate.
Indicative content in the mark scheme is provided as a guide for examiners. It is not intended to be
exhaustive and you must credit other valid points. Students do not have to cover all of the points
mentioned in the Indicative content to reach the highest level of the mark scheme.
An answer which contains nothing of relevance to the question must be awarded no marks.
3
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
Total
Qu Part Marking guidance
marks
1001 converted to 9;
1100 converted to C;
One mark if the right hand side 4 bits are correct (1010)
One mark if the left hand side 4 bits are correct (1010)
4
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
If the answer given is not 256 then award a maximum of one working out mark
for any of the following:
If more than two lozenges shaded then marks are not awarded.
Examples Include:
A HDD can contain multiple platters (disks);
A disk/disks that move/spin
Each platter is divided into sectors;
The disks are spun at a very high speed (approximately 7,200 rpm to
10,000 + rpm);
Read\write heads (move across the disk to) read and write data;
There is one read\write head for each side of a platter ie two heads per
platter;
Data is written to\read from the disk by magnetising\polarising\sensing
microscopic regions on the disk;
Data is organised in concentric rings called tracks;
There is a small circuit board on the drive that controls the reading and
writing of data;
Data is transferred from and to the disk via a cable/electrical current being
passed;
The intersection of sectors and tracks are called blocks;
Data is read 1 block at a time;
NE Storing binary, or 1s and 0s without reference to magnetising
5
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
6
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
R. RAM/ROM/IAS.
7
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
Examples include:
A. answers that give two separate differences even if just mentioning application
software or system software as it would imply the opposite is true for the
opposing type.
8
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
Memory management
Manage the computer’s memory;
;
Processor management
Manage the computer’s processor(s)CPU;
Schedules which processes are to be executed;
Input/output management
Manages input/output devices;
Interacts with/manages/handles the (automatic) installation of device
drivers;
Handles peripheral device interrupts;
the computer can communicate with the outside world;
Control network communication;
Allow devices to send and receive data;
Managing storage
Manage secondary storage devices;
Loading data and programs into the computer’s memory;
Storage space management (disk quotas);
To ensure that storage space is allocated fairly and efficiently to specific
tasks\users;
Managing security
User authentication;
To make sure that users must prove who they are to access the system;
Protect against malware;
Block access to specific vulnerable operations or system areas. For
example, software can only be installed with admin access;
Managing applications
Control access to applications;
Prevent users or processes using unauthorised programs // allow users or
processes to use authorised programs;
Control application access;
Prevent/allow an application access to data (or devices);
A. User interface (maximum of 1 mark)
9
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
A. the student has said “the student has explained software and hardware back to
front\the wrong way around” – max 1 mark if this is the only response.
Example answers
A WAN is a Wide Area Network that links more than one remote
geographical site/location to another;
A LAN is a Local Area Network that links together devices that are within
one site\location;
The speed of data transmission across a LAN is likely to be higher than
across a WAN;
WANs are typically public networks (and so data encryption is likely to be
used);
LANs (may not need data encryption) as they are typically private;
LANs typically carry less traffic than WANs;
This is because the number of users on a LAN can be controlled by the
administrator whereas public WANs could have an unlimited number of
users;
LAN Connections are generally more reliable as they are under the control
and maintenance of the network administrators;
On a WAN it is possible that heavy traffic, peak usage times, viruses,
weather or physical damage could affect the connection reliability;
WANs are typically under shared ownership;
LANs are typically owned by a single person or organisation;
10
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
HTTPS is secure/encrypted;
Data transmitted using HTTP could be easily read if intercepted;
Data transmitted using HTTPS can only be seen/read/understood by the
(intended) recipient;
Transport (layer);
Data Link (layer);
Link (layer);
Network Interface/access (layer)
R. Any name that is not correct.
I. the order that the answers are written in
Max 2 marks:
11
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
Blagging (pretexting)
This is where a victim is tricked/persuaded (by a fraudster) to give their details or
payment information (for a fraudulent reason/purpose);
Phishing
Is where the victim receives and responds to a communication that appears to be
from a valid or known source (but is in fact fraudulent. It allows the fraudster to
capture private information before the victim realises);
12
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
A. other answers if they are correct based on incorrect answer provided for
13.1 but only if the working has been shown.
If the answer given is not correct based on their answer to Q 13.1, a maximum
of 3 working out marks should be awarded as follows:
A. a calculation that results in an answer that is not 25 bits as long as the maths is
all correct (ie incorrect frequencies or bit counts have been used)
ASCII Calculation
13 characters * 7 bits // 91 (bits) (1 mark);
Calculate Saving
Subtracting ASCII bit total minus Huffman bit total (1 mark);
5*1+
4*3+
2*4+
2 * 4 = 33 bits
If performed correctly based on binary code lengths given in answer 13.1 this would
be given 1 mark.
If the student then used this value to calculate the saving 91 bits – 33 bits = 58 then
this would be given 1 mark.
13
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
5 * 4 + (incorrect length)
4 * 4 + (incorrect length)
2*4+
2 * 4 = 52 bits
Calculation is correct but lengths are wrong based on binary code lengths given in
answer 13.1 (this would be given zero marks).
If the student then used this value to calculate the saving 91 bits – 52 bits = 39 bits
then this would be given 1 mark.
14
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
or
or
or
or
15
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
Simple statements\example(s) of
methods\techniques (for example a bulleted list)
supported by no comments is limited to the middle of
this range.
No creditworthy material 0
16
MARK SCHEME – GCSE COMPUTER SCIENCE – 8520/2 – JUNE 2018
Method Explanation
AO1 (Understanding) AO2 (apply)
Regularly back up data Back up data so that you can restore data that has
and test backups. been accidentally deleted or destroyed. It is
important to test that back-ups work on a regular
basis.
Secure the backups. Make sure that backups are off site so they are not
lost under the same circumstances as the main data.
Also if the backups are air-gapped then this will
prevent a severe malware infection getting access to
the backups as there is no physical connection.
Block or remove email Check links contained in e-mails and do not open
attachments or links. attachments included in unexpected e-mails.
Disable macro scripts. Prevent macros from running which could cause or
run malicious code.
17