CONFIDENTIAL DRAFT Further information on National 5 Specimen Question Paper, National 5 Specimen Coursework and National 4 Added Value assessment Computing Science Key points Computing Science Courses combine aspects of Standard Grade and Intermediate1 Computing Studies, Intermediate 2 Computing, and Intermediate 2 Information Systems. At National 5, Course assessment will consist of two components: a question paper and an assignment. The question paper requires learners to demonstrate aspects of breadth and application in theoretical contexts. Learners will apply breadth of knowledge from across the Units and depth of understanding to answer appropriately challenging questions in computing science contexts. The assignment requires learners to successfully respond to challenge and demonstrate application in a practical context. Learners will apply knowledge and skills from the Units to solve an appropriately challenging computing science problem. Course assessment will be out of 150 marks. To pass the Course at National 4, learners must pass all Units including Computing Science Assignment (National 4), the Added Value Unit. Learners will draw on and apply skills and knowledge of software and information systems design and development to solve an appropriately challenging Computing Science problem. National 5 Specimen Question Paper (publication by 28 February 2013) The purpose of the question paper is to assess breadth of knowledge from across the Course, depth of understanding, and application of this knowledge and understanding by answering appropriately challenging questions. This question paper will give learners an opportunity to demonstrate the following skills, knowledge and understanding: applying aspects of computational thinking across a range of contexts analysing problems within computing science across a range of contemporary contexts the ability to communicate how a program works communicating understanding of key concepts related to software design and development, and information system design and development, clearly and concisely using appropriate terminology understanding of the legal implications and environmental impact of contemporary information system technologies applying computing science concepts and techniques to create solutions across a range of contexts The question paper will have 90 marks (60% of the total mark). CONFIDENTIAL DRAFT CONFIDENTIAL DRAFT Approximately 50% of the marks will be awarded for questions related to Software Design and Development. Approximately 50% of the marks will be awarded for questions related to Information System Design and Development. The question paper will have two Sections. Section 1 will have 20 marks and will consist of short answer questions. This Section will give learners an opportunity to demonstrate breadth of knowledge from across the areas specified in the Course Specification and in the Course Assessment Specification. Questions will be mainly straightforward KU questions, at ‘C’ level with a balanced sampling across both Units. Section 2 will have 70 marks and will consist of approximately six to eight extended response questions, each with approximately 8–12 marks. This section will give learners an opportunity to demonstrate application of KU to answer appropriately challenging problem-solving questions by drawing on and applying knowledge as outlined in the Course Specification and in the Course Assessment Specification. Questions will assess application of understanding (rather than direct recall), include extended descriptions and explanations, and be more integrative, drawing on understanding of one or more topics across the Units. Questions related to programming will either use some form of ‘pseudocode’ or allow candidates to answer in any appropriate programming language. Approximately 20 marks will be allocated for ‘A-discriminator’ questions, which could be integrative (requiring combination of understanding from two topics), detailed explanations, and/or application of computational thinking skills. National 5 Specimen Coursework (publication by 30 April 2013) The assignment is designed to assess practical application of knowledge and skills from the Course to develop a solution to an appropriately challenging computing science problem. The assignment will have 60 marks (40% of the total mark). It will be set by SQA and conducted under some supervision and control. The assignment will assess learners’ skills in analysing a problem (10 marks), designing a solution to the problem (10 marks), implementing a solution to the problem (20 marks), testing (10 marks) and reporting on that solution (10 marks). Evidence will be internally marked by centre staff in line with SQA marking instructions. National 4 Added Value Unit (publication by 30 April 2013) The assessment method for the Computing Science Added Value Unit is an assignment. The Assignment will assess learners’ skills in analysing a problem, designing and implementing a solution using an appropriate programming or software application and testing and reporting on the functionality of that solution. Evidence will be internally marked by centre staff in line with SQA guidelines. CONFIDENTIAL DRAFT CONFIDENTIAL DRAFT National 4 and National 5 Sample Questions and Tasks CONFIDENTIAL DRAFT CONFIDENTIAL DRAFT Computing Science Examples of types of questions for National 5 Question Paper Section 1 Section 1 will have 20 marks and will consist of short answer questions. Questions will be mainly straightforward KU questions, at ‘C’ level with a balanced sampling across both Units. Possible types of Section 1 question are shown below. Example 1 Examine the following pseudocode: FOREACH member FROM gender IF gender(member) = ‘M’ OR gender(member) = ‘F’ THEN Set totalm = totalm + 1 ELSE Set totalf = totalf + 1 END IF END FOREACH State the most suitable data structure and data type for gender. Example 2 Which of the following is an advantage of a peer-to-peer network? Tick one box. Centrally stored files are easily backed-up Users must log into the server before they can gain access to the network No specialist computer system is required to set up the network It is easier to monitor the legality of files shared on the network Section 2 Section 2 will have 70 marks and will consist of approximately 6 – 8 extended response questions. Questions will assess application of understanding, rather than direct recall, include extended descriptions and explanations and be more integrative, drawing on understanding of one or more topics across the Units. Possible types of Section 2 question are shown below. Example 3 Greg is building a computer system to control the air temperature in his greenhouse. A temperature sensor and heater will be attached to the finished computer. (a) Greg purchases a motherboard on which he installs a processor and two memory modules. (i) State the correct term for the motherboard connections that allow data and instructions to be transferred between the processor and memory. CONFIDENTIAL DRAFT CONFIDENTIAL DRAFT (ii) What additional hardware must be connected to the motherboard to allow the temperature sensor to transfer data to the computer system? (b) Greg starts to design his temperature control program. Part of his pseudocode is shown below: RECEIVE temperature FROM (Real) TEMPERATURE SENSOR IF temperature >=10 THEN SEND on TO HEATER IF temperature <=24 THEN SEND off TO HEATER (i) State the logic error Greg has made in the above design (ii) Describe how the design could be improved to show that the above three steps will repeat continuously until a switch is turned off. (iii) Create a set of test temperature readings that can be used to test that the control program works correctly for normal, extreme and exceptional input. (c) Discuss one environmental impact resulting from Greg’s introduction of a temperature control system in his greenhouse. Example 4 Penny works for the NHS analysing information stored about ambulance callouts. One of the tables from the database is shown below. (a) (i) Field Example Data Callout Number 2012-238-3462 Vehicle Number 193 Callout Date 12/8/12 Distance Travelled (miles) 3.2 Time to Reach Call (minutes) 5 Reached within Target Time Yes State which field in the above database should be the key field. (ii) Justify your answer to (i) (b) Penny produces the following report from the database: Callout Number Callout Date 2012-238-3462 12/8/12 Reached within target time Yes Vehicle Driver Joanna Smith Explain how the database might have been created to enable the vehicle driver’s name to have been included in this report. (c) The NHS is concerned about hackers changing the information in the database. CONFIDENTIAL DRAFT CONFIDENTIAL DRAFT Describe one software precaution the NHS could take to prevent hackers accessing the information. Example Assignment Task for National 5 Computing Science Assignment The assignment is designed to assess practical application of knowledge and skills from the Units to develop a solution to an appropriately challenging computing science problem. Company Prize Draw A number of departments at the company, TL Enterprise, have decided to run a monthly prize draw. Each member of staff within a department has the choice to enter the draw at a cost of £5 per ticket. The company has generously decided to match the amount paid in by the employees; 70% of the total prize fund will go to the winner and 30% will go to charity. Your task: 1 Create a structure to store and display employee information. The information should include photographs of the employees. 2 Create a program that will randomly pick a monthly prize draw winner and check if they have been entered into the prize draw. If they have been entered the program should print a congratulatory message and the amount of prize money won. If they have not been entered the program should repeat until a winner has been selected. National 4 Added Value Unit Outcome and Assessment Standard 1 Develop, with guidance, a digital solution which will draw on and apply skills and knowledge of software and information systems design and development by: 1.1 1.2 1.3 1.4 Analysing a straightforward problem Designing a solution to the problem Creating a program or application as a solution to the problem Testing and reporting on the solution to the problem CONFIDENTIAL DRAFT