2025 Pearson Edexcel Level 1/Level 2 GCSE (9–1) Computer Science PAPER 1: Principles of Co, Exams of Computer Science

2025 Pearson Edexcel Level 1/Level 2 GCSE (9–1) Computer Science PAPER 1: Principles of Computer Science Combined Question Paper & Marking Scheme

Typology: Exams

2024/2025

Available from 11/27/2025

Theegrades
Theegrades 🇺🇸

228 documents

5 / 54

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Answer all
questions.
Try to answer every question.
The marks for each
question are shown in brackets
Fill in the boxes at the top of this page with your name,
2025 Pearson Edexcel Level 1/Level 2 GCSE (91) Computer Science PAPER 1: Principles of Computer ScienceCombined Question Paper & Marking SchemePlease check the examination details below before entering your candidate information
Candidate
surname
Other
names
Centre
Number
Candidate
Number
Pearson Edexcel Level 1/Level 2 GCSE (9–1)Monday 12 May 2025Afternoon
(Time:
1
hour
30
minutes)Computer
Science
Paper
reference
1CP2/01
Total
Marks
Instructions
Use black ink or ball-point pen.centre
number
and
candidate
number.
Answer the questions in the spaces providedthere may be more space than you need.
You are not allowed to use a calculator.
Information
The total mark for this paper is 75.use this as a guide as to how much time to spend on each question.
Advice
Read each
question carefully before
you start to
answer it.
Check your answers
if
you
have time at
the
end.
Turn over
You do
not
need
any
other
materials.
bg2
P78198A©2025 Pearson Education Ltd.
Y:1/1/1/1/1/1/1/1/
pf3
pf4
pf5
bg6
5Turn over
(d)
Computer
systems
manipulate
bit
patterns.
(i)
Identify the result of applying an arithmetic shift right by two to the binary
pattern 0110 1100A0001 1100B1101 1000C0001 1011D 1011 0000(ii)
Convert
the
denary
number
25
to
8-bit
binary.
(1)(2)
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
(iii) Convert the denary number –13 to 8-bit binary using two’s complement.(2)
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
(Total for Question 1 = 17 marks)
DO NOT WRITE IN THIS AREA
DO NOT WRITE IN THIS AREA
DO NOT WRITE IN THIS AREA
bg7
6
2Computers(a) A washing machine uses many different embedded systems to wash clothes.
(Source
©
Pearson
Asset
Library)
Give two functions embedded systems perform in a washing machine.(2)1
...............................................................................................................................
...............................................................................................................................
.................
...............................................................................................................................
...............................................................................................................................
......................
2
...............................................................................................................................
...............................................................................................................................
.................
...............................................................................................................................
...............................................................................................................................
......................
DO NOT WRITE IN THIS AREA
DO NOT WRITE IN THIS AREA
DO NOT WRITE IN THIS AREA
pf8
pf9
pfa
10
3
Issues
and
impact
(a)
Information
is
protected
legally
in
several
ways.
(i)Identify the law that is broken when a person gains unauthorised access to acomputer system.AComputer misuseBConsentCCopyrightD
Intellectual
property(ii)
One principle of data protection legislation is that data must be processed
lawfully, fairly and in a transparent manner.
Give
three
other
principles
of
data
protection
legislation.
(1)(3)1
...............................................................................................................................
...............................................................................................................................
.................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
2
...............................................................................................................................
...............................................................................................................................
.................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
3
...............................................................................................................................
...............................................................................................................................
.................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
(b) Software licensed as open-source can be used free of charge.
Give one other characteristic of open-source software licensing.
(1)
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
DO NOT WRITE IN THIS AREA
DO NOT WRITE IN THIS AREA
DO NOT WRITE IN THIS AREA
(c)
Cyber
security
protects
computer
systems
from
harm.
(i)
Explain one reason why an acceptable use policy keeps computer
systems secure.(2)
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
...............................................................................................................................
...............................................................................................................................
......................
(ii)
Identify the type of malware that attaches itself to other files.
AKeyloggerBTrojanCVirusDWorm(1)(Total for Question 3 = 8 marks)11Turn over
DO NOT WRITE IN THIS AREA
DO NOT WRITE IN THIS AREA
DO NOT WRITE IN THIS AREA
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36

Partial preview of the text

Download 2025 Pearson Edexcel Level 1/Level 2 GCSE (9–1) Computer Science PAPER 1: Principles of Co and more Exams Computer Science in PDF only on Docsity!

• Answer^ all^ questions.

• Try^ to^ answer^ every^ question.

• The^ marks^ for^ each^ question^ are^ shown^ in^ brackets

• Fill^ in^ the^ boxes^ at^ the^ top^ of^ this^ page^ with^ your^ name,

2025 Pearson Edexcel Level 1/Level 2 GCSE (9–1) Computer Science PAPER 1: Principles of Computer Science Combined Question Paper & Marking Scheme Please check the examination details below before entering your candidate information Candidate surname Other names Centre Number Candidate Number

Pearson Edexcel Level 1/Level 2 GCSE (9–1)

Monday 12 May 2025

Afternoon (Time: 1 hour 30 minutes)

Computer Science

Paper

reference 1CP2/

Total Marks

Instructions

• Use^ black^ ink^ or^ ball-point^ pen.

centre number and candidate number. Answer the questions in the spaces provided

  • there may be more space than you need. You are not allowed to use a calculator.

Information

• The^ total^ mark^ for^ this^ paper^ is^ 75.

  • use this as a guide as to how much time to spend on each question.

Advice

• Read^ each^ question carefully^ before^ you start^ to^ answer^ it.

• Check^ your^ answers^ if^ you^ have^ time^ at^ the^ end.

Turn over You do not need any other materials.

 

PAPER 1: Principles of Computer Science

P78198A ©2025 Pearson Education Ltd. Y:1/1/1/1/1/1/1/1/

3  Turn over Answer ALL questions. Write your answers in the spaces provided. Some questions must be answered with a cross in a box. If you change your mind about an answer, put a line through the box and then mark your new answer with a cross. 1 Data (a) Binary patterns consist of groups of bits. (i) Identify the largest unit of measurement. A Gibibyte B Kibibyte C Mebibyte D Nibble (ii) State the number of unique values that can be represented with 7 bits.

.................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (iii) The denary ASCII code for D is 68. Give the denary ASCII code for G. (1) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (b) Hexadecimal is used to represent memory addresses. (i) Give two characteristics of hexadecimal notation. (2) 1............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... 2............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

4  .................................. (ii) Explain one reason why programmers use hexadecimal to specify memory addresses. (2)

.................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (c) Audio and image files store data in binary. (i) Explain one reason why lossy compression is used to reduce the size of an audio file. (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (ii) An image is 315 pixels wide, 923 pixels high and has a colour depth of 7 bits. Complete the expression to show the minimum file size in bytes. You do not have to do the calculation. (3) × × .................................. ..................................

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

..................................

6  2 Computers (a) A washing machine uses many different embedded systems to wash clothes. (Source © Pearson Asset Library) Give two functions embedded systems perform in a washing machine. (2) 1...............................................................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................................................................... 2............................................................................................................................................................................................................................................................................... ....................................................................................................................................................................................................................................................................................

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

7  Turn over (b) Computers use different types of storage. (i) Non-volatile storage keeps its content when the power is turned off. Give one other reason why computers use non-volatile storage. (1)

.................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (ii) State the type of secondary storage media that stores data as a sequence of pits and lands. (1) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (c) Programmers write code. (i) Describe how an interpreter translates high-level code. (2) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (ii) Assembly language is a low-level programming language. Give two characteristics of assembly language. (2) 1............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... 2............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... ....................................................................................................................................................................................................................................................................................

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

(f) Here is a diagram of a central processing unit. Registers 1011 1111 0011 0011 0111 1011 1100 0111 0111 1101 0000 0001

A

ALU

Control bus Data bus B Complete the table with the name for the labelled components. (4) Label Component A B C D (Total for Question 2 = 17 marks)  9 Turn over

D

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

C

10  3 Issues and impact (a) Information is protected legally in several ways. (i) Identify the law that is broken when a person gains unauthorised access to a computer system. A Computer misuse B Consent C Copyright D Intellectual property (ii) One principle of data protection legislation is that data must be processed lawfully, fairly and in a transparent manner. Give three other principles of data protection legislation.

.................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... 2............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... 3............................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (b) Software licensed as open-source can be used free of charge. Give one other characteristic of open-source software licensing. (1) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... ....................................................................................................................................................................................................................................................................................

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA

BLANK

PAGE

12    

13  Turn over 4 Networks (a) A business has one office in New York and one in London. State the type of network needed to connect the two offices. (1)

.................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (b) Network protocols govern how data is transmitted between devices. Complete the table with the network protocol for each description. (3) Description Network protocol Allows two computers to establish a connection across a network Allows connection to a network using radio waves Allows upload and download of files across a network (c) Describe the role of an ethical hacker in network security. (3) .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

15  Turn over

.................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... .................................................................................................................................................................................................................................................................................... (Total for Question 4 = 13 marks) DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA

BLANK

PAGE

16    

18  (b) Here is an algorithm to process sales data. 1 # ––––––––––––––––––––––––––––––––––––––––––––––––– 2 # Global variables 3 # ––––––––––––––––––––––––––––––––––––––––––––––––– 4 5 salesData = [[9, 6, 32], 6 [2 0 , 12, 9], 7 [9, 8, 8], 8 [32, 24, 29], 9 [7, 20 , 12], 10 [6, 9, 6]] 11 total = 0 12 currMax = 0 13 14 # ––––––––––––––––––––––––––––––––––––––––––––––––– 15 # Main program 16 # ––––––––––––––––––––––––––––––––––––––––––––––––– 17 for sale in salesData: 18 total = 0 19 for item in sale: 20 total = total + item 21 if (item < currMax): 22 currMax = item 23 print (sale, total) 24 print (currMax) 25

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

(i) The data structure salesData is shown as a table of records, with fields in each record. Complete the table with the line number for each traversal. Line number Traverses the records Traverses the fields (ii) There is a logic error in the code. Write the corrected line of code.

.................................................................................................................................................................................................................................................................................... ....................................................................................................................................................................................................................................................................................  19 Turn over

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA

DO

NOT

WRITE

IN

THIS

AREA