2023 specimen paper 1 Flashcards

1
Q

what is meant by a MAC address (4)

A

the address given to a device that uniquely identifies a device on a network. the MAC address is given by the manufacturer. it is made up of two parts in which the first part represents the ID number of the manufacturer, and the second part identifies the serial number of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

give two uses of hexadecimal in computer science (2)

A

HTML color codes
IP (v6) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

using left shift and move the binary number “01010010”

A

01001000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what effect logical left shift does it have on the binary value? (2)

A

the left most bit is now lost following a left shift, hence changing the value of the binary value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

describe the structure of a data packet

A
  • the header - stores the IP address of the source device (sender) as well as the IP address of the destination device (receiver). it also contains the size of the packet (in bytes).
  • the payload - the actual data in the packets.
    the trailer - contains the method of identifying the end of the packet. also includes some form of error checking to ensure packet arrives error-free.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a company uses parallel half-duplex data transmission to transmit the data for the new videos to the web server. explain why parallel half-duplex transmission is the most appropriate method. (4)

A

parallel half-duplex data transmission is the most appropriate because it allows several bits of the video to be sent down several wires, increasing the speed of transmission of the larger data. since the bits are also transferred over a short distance, skewing can be avoided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describe what is meant by a DDoS attack (4)

A

multiple computers are used as bots and send numerous requests to a webserver in an attempt to flood the network with useless spam traffic. because the webserver becomes flooded with the spam traffic, it will not be able to service a user’s legitimate request. this leads to the website failing as a result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

suggest one security device that can be used to help prevent a DDoS attack.

A

firewall
or proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

give three characteristics of an IP address

A
  • uniquely identifies a device connected to the internet.
  • uses either 32 bits (IPv4_ or 128 bits (IPv6).
  • can be static or dynamic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

identify parts of a given URL below:
https://www.cambridgeaddessment.org.uk/index.html

https -
cambridgeaddessment.org.uk -
/index.html

A
  • protocol
  • domain name
  • file name
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

name three components that are part of the central processing unit (CPU) in a computer that has a Von Neumann architecture (3)

A

program counter
memory address register (MAR)
accumulator (ACC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

describe the purpose of the control unit (CU) in a computer that has Von Neumann architecture (2)

A

the control unit sends control signals that manage the transfer of data and instructions within the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

state one purpose of a core in a CPU

A

to carry out instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain how dual core CPU help upgrade the performance of a computer (2)

A

the performance of the computer will be faster as now there are two core CPUs to carry out instructions simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

identify two advantages of using high-level language over low-level language

A

easier to debug
easier to write/understand/code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

state one disadvantage to the programmer of using a high-level language instead of a low-level language.

A

may need to wait for the codes to be translated before running.

16
Q

state what is meant by an IDE

A

a suite of programs used to write and test a computer program written in a high-level language.

17
Q

state two characteristics of a robot

A
  • it has electrical components.
  • it is programmable.
18
Q

suggest two advantages of using robots, instead of humans, to build cars in the factory

A
  • can work in places that are hazardous to humans
  • can work 24 hours a day continuously
19
Q

describe what is meant by a character set (2)

A
  • all the characters and symbols that can be represented by a computer system.
  • each character and symbol is assigned a unique value.
20
Q

state one disadvantage of using unicode character set instead of the ascii character

A

the text stored takes up more storage space

21
Q

a student is using software to create 3D models. this process often requires the use of virtual memory. explain why virtual memory is needed for this process (3)

A

virtual memory is needed for this to extend the RAM capacity, stopping the 3D modelling software from freezing when the physical RAM is full. this also allows the computer to process the large amount of data required for 3D modelling.

22
Q

describe symmetric encryption (5)

A
  • the data before encryption is known as plain text.
  • to scramble the data, an encryption key, which is a type of algorithm, is used.
  • the data after encryption is known as cipher text.
  • encryption prevents the data from being understood by a hacker.
23
Q

an art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on its website.
describe the process of SSL and explain how it provides a secure connection. (6)

A
  • the user’s browser sends a message so that it can connect with the required website which is secured by SSL.
  • the browser then requests that the web server identifies itself.
  • the web server responds by sending a copy of its SSL certificate to the user’s browser.
  • if the browser can authenticate this certificate, it sends a message back to the web server to allow communication to begin.
  • once this message is received, the web server acknowledges the web browser, and the SSL encrypted two=way data transfer begins.
24
Q

give one reason why unicode takes up more storage space compared to ascii

A

it takes up more storage because ASCII uses more byte to represent a character, whereas unicode uses four bytes per character.