CS Mock Paper Questions Flashcards
Identify one fundamental operation of a computer
- Add
- Store
- Compare
- Retrieve
Distinguish between fundamental operations and compound opera of a computer
Fundamental Operations requires one machine instruction cycle, it does not require the processor to go through many machine instruction cycle to reach a result
Compound operations is complex because it is an operation that involves a number of other operations to reach a result. For Example:- find the largest number in an array
By making direct reference to the technologies used, explain how a virtual private network (VPN) allows a travelling sales person to connect securely to the company’s network
Virtual Private Network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of tunnelling protocol and security procedures.
Tunnelling Protocols;
Allows the data to be hidden when travelling across the internet
Encrypted Protocols (IPSEC); If hacked it will not be understandable
The use of Gateways;
Allows the user or salesperson to connect to company’s server.
A small hotel buys a software package to manage their bookings.
(a) Describe two types of documentation that should be provided with the software package
•Technical Documentation;
- Describes how to install the software
- Describes the hardware configuration
•User Documentation
- Describes various functions of the software
- Helps user to learn how to use the software
State two methods of delivering user training
- Formal Classes
- Online Training
- Self Instruction
Calculate how many different colours can be represented using two hexadecimal characters.
(Remember four binary digits= 1 hexadecimal digit)
2^8 =256 Colours
256 Colours
A group of programmers are involved in creating the software product. They create many new sub programs that also use existing sub programs within the product.
(a) Outline why sub program is considered as an example of abstraction
A sub program is considered as an example of abstraction because a sub program is a named section of the code that performs a specific task in a program. It can be called by name or referred by the identifier when needed;
Without knowing the details of the code and data structure as these are wrapped/hidden within the sub program.
Evaluate the use of designing and developing different parts of software concurrently.
Different stages of programming run simultaneously rather than consecutively;
This decreases product development time/decreases the time to market;
Leading to improved productivity/reduces costs;
However, it requires more resources/more software developers
Outline one way in which users can be informed about the software updates.
•A message can be sent to the user (When a software is installed and registered, the user provides an email address/phone number);
With a link to the update.
•Notifications/Alerts are sent to the computer ( a cookie is placed on the user’s computer which communicates with the software developer);
About automatic updates.
•(When the program is run) it queries a URL the program developer has built in to check whether the current version matches the latest version;
If not, notifications are sent.
Outline two ways in which access to sensitive data can be managed
•Sensitive data can be protected by locking it with a password;
Preventing unauthorised access who don’t have this;
•Each user should have appropriate access rights;
Managers, employees and clients/customers are permitted to access different parts of the data;
Outline two ways to improve the security of the company’s network.
• Each User should have a User ID and personal password;
Passwords should be regularly changed;
• Two factor authentication for remote users and administrators could be required (this could be a digital certificate, thumbprint scanners);
In addition to the usual user Id and password
•Regularly installing updates and patches;
To ensure the network is protected against new threats such as malware;
•In order to prevent intruders/strangers from accessing the company’s network;
The router is set to accept only specific or whitelisted MAC addresses ;
Data corruption can result in data loss.
Explain how corrupted data files can be recovered.
•Restore files from a backed-up data file;
Ensuring it is a recent copy to minimise loss;
•A parallel/failover system could be operated;
That could be switched to if the current system or live system is corrupt;
•Data recovery software could be installed and run;
To repair corrupted files.
The company is considering implementing a virtual private network (VPN).
Explain one benefit to the company using a VPN.
•A VPN improves data security;
By passing the company’s data through a hidden tunnel;
And encrypting the Internet traffic inside encapsulated data packets;
•Remote Access;
VPN is not dependent on any particular network or wifi connection to worm;
The company can have a remote workforce/employees or freelance staff working from different geographic locations/can connect their different office locations;
A new higher level programming language is being developed.
(a) identify two reasons why consistent grammar and syntax should be essential features of a higher level programming language.
•Easy to learn/use;
Otherwise time may be wasted in learning the new language;
- There will be no/less complication errors;
- There will be no/less logical errors;
- (reduction of time to create software);
- Future maintenance or Development is possible by other programmers.
Identify two features of a user interface that will allow application programmers to interact more easily with the programming language.
- GUI;
- Toolbars;
- Menus;
- Built in command for inputting from touch screen;