2024_AQA-GCSE Computer Science
Paper 2
Computing Concepts
(Merged Question Paper and Marking Scheme)
Please write clearly in block capitals. Tuesday 21 May 2024
Centre number
Surname Candidate number
Forename(s)
Candidate signature
I declare this is my own work.
GCSE
COMPUTER SCIENCE
Paper 2 Computing concepts
Tuesday 21 May 2024 Afternoon Time allowed: 1 hour 45 minutes
Materials For Examiner’s Use
• There are no additional materials required for this paper.
• You must not use a calculator. Question Mark
1–4
Instructions
• Use black ink or black ball-point pen. Use pencil only for drawing. 5–6
• Answer all questions. 7–8
• You must answer the questions in the spaces provided. 9
• If you need extra space for your answer(s), use the lined pages at the end of
10–12
this book. Write the question number against your answer(s).
• Do all rough work in this book. Cross through any work you do not want 13
to be marked. 14–17
Information 18
The total number of marks available for this paper is 90. 19
TOTAL
Advice
For the multiple-choice questions, completely fill in the lozenge alongside the appropriate answer.
CORRECT METHOD WRONG METHODS
If you want to change your answer you must cross out your original answer as shown.
If you wish to return to an answer previously crossed out, ring the answer you now wish to select
as shown.
*JUN248525201*
IB/G/Jun24/G4004/E8 8525/2
,GCSE Computer Science: Paper 2 - Computing Concepts
The GCSE Computer Science Paper 2: Computing Concepts is scheduled for May 2025.This paper
focuses on the fundamental concepts of computer science, including the theoretical aspects of
computing, computer systems, networks, and the ethical and legal considerations that shape the use
of technology.
Key Areas Covered:
1. Data Representation
o Binary and Hexadecimal Systems:
Understanding how data is represented in binary (base 2) and hexadecimal (base 16)
formats.
Converting between binary and decimal systems, and binary to hexadecimal.
How computers use binary for storing and processing data.
o Data Storage:
File sizes: Understanding the units of storage (bytes, kilobytes, megabytes, gigabytes, etc.).
The difference between primary storage (RAM) and secondary storage (hard drives, SSDs,
optical disks).
o Character Representation:
How text is represented using ASCII and Unicode encoding.
The role of encoding systems in storing and transmitting text.
2. Computer Systems
o Components of a Computer:
Understanding the main components of a computer system, including the CPU (central
processing unit), RAM (random access memory), input devices, output devices, and storage
devices.
The role of the ALU (arithmetic logic unit), CU (control unit), and registers in the CPU.
o The Fetch-Decode-Execute Cycle:
The process through which the CPU retrieves (fetches), decodes, and executes instructions.
The role of clock cycles and how they impact processing speed.
o Types of Software:
System software (e.g., operating systems, utilities) vs application software (e.g., word
processors, games).
Understanding how software interacts with hardware to carry out tasks.
3. Networks
o Types of Networks:
Difference between LAN (Local Area Network), WAN (Wide Area Network), and PAN
(Personal Area Network).
The role of the internet and the types of connections used for networking (e.g., Wi-Fi,
Ethernet).
o Network Topologies:
Understanding different network topologies such as star, bus, and ring and their advantages
and disadvantages.
o Protocols and Layers:
Introduction to TCP/IP (Transmission Control Protocol/Internet Protocol) and the OSI model
(Open Systems Interconnection), focusing on the layers involved in data transmission.
Understanding HTTP, FTP, DNS, IP addressing, and routers in the context of networking.
4. Cybersecurity and Threats
o Types of Cyber Threats:
Malware: Including viruses, worms, and ransomware.
Phishing: Techniques used to deceive individuals into revealing personal information.
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks.
o Protection Measures:
Using firewalls, antivirus software, and encryption to protect data.
The importance of secure passwords, two-factor authentication, and other security practices
to protect digital assets.
5. Algorithms
o Sorting Algorithms:
Understanding how different sorting algorithms work, such as bubble sort, insertion sort,
and merge sort.
o Searching Algorithms:
Techniques like linear search and binary search for finding data in a list.
, how they scale with larger data sets (using Big O notation).
o Recursion:
Understanding recursive algorithms, where a function calls itself, and examples of problems
that can be solved recursively (e.g., calculating factorials, Fibonacci sequences).
6. Ethical, Legal, and Environmental Impacts of Computing
o Ethics in Computing:
The impact of computing on privacy, data protection, and the responsibilities of developers
and users.
Discussing the ethical implications of emerging technologies like artificial intelligence,
surveillance systems, and data collection.
o Legal Issues:
Understanding the Data Protection Act and copyright laws related to software and digital
content.
The implications of cybercrime, including hacking, fraud, and intellectual property theft.
o Environmental Impact:
The environmental effects of computing, including e-waste and the energy consumption of
large-scale data centers.
7. Developing Computational Thinking
o Problem Solving:
Using logical thinking and computational methods to solve problems.
Applying techniques such as decomposition, abstraction, and pattern recognition to break
down complex problems and develop efficient solutions.
o Designing Solutions:
Creating algorithms and programs to solve real-world problems using programming
languages like Python, VB.NET, or Java.
8. Cloud Computing and Emerging Technologies
o Cloud Computing:
Understanding the concept of cloud storage and cloud services (e.g., Google Drive, AWS).
The advantages and disadvantages of using cloud-based services for data storage and
computing.
o Artificial Intelligence (AI):
An introduction to AI, machine learning, and natural language processing.
The role of AI in various industries, including healthcare, finance, and entertainment.
, 2
Do not write
outside the
Answer all questions. box
0 1Which statement best describes what computers represent using binary? Shade
one lozenge.
[1 mark]
A All data are represented using binary.
B All data and instructions are represented using binary.
C Some data and instructions are represented using binary.
D Some instructions are represented using binary.
0 2.1 Convert the binary number 10110111 into decimal.
[1 mark]
0 2 . 2 Convert the decimal number 112 into hexadecimal.
You should show your working.
[2 marks]
Answer
*02*
IB/G/Jun24/8525/2