exam questions Flashcards
Tracking cookies can be created and used when browsing a website.
Describe a security risk associated with tracking cookies.
Unauthorised access to personal
data (sent to third parties
through the tracking cookie)
Explain how public and private keys help to keep these details secure when
transmitted between the customer and the bank’s server
A public key is used to encrypt
the personal data (1)
A private key is used to
decrypt the personal data
Describe how watchpoints are used to help programmers locate errors
Watchpoints are used to stop
execution when the value of a
specific variable changes/predetermined conditions are met. (1)
This allows the programmer to
compare the value with the
expected value (1)
Describe two benefits of using local variables.
More efficient as memory
assigned to a local variable
becomes available once
function is terminated (1)
Aids modularity (1)
Describe the process of usability testing of the new website.
Users given task/scenario to
perform on the software (1)
Feedback is given to
developers (1)
Move some cat ears ? State
whether this task is easier to do with the bitmapped or the vector
graphic. Explain your answer
Vector (1 mark)
Ear could be grouped as a set
of objects
Describe the effect on the file size of adding the star to both the
vector and bitmapped graphic.
Vector increases
Bitmap stays the same
Describe the steps of
the fetch-execute cycle.
Address of instruction placed on address bus Read line (on control bus) is activated Contents of location (instruction) transferred to a register along data bus Instruction decoded/executed
Explain how cache improves performance
Stores frequently accessed
instructions/data
Faster access times than main
memory
Describe the difference between a bit depth of 16 bits and that of 24 bits
for the quality of video.
24 bit can store more than 16 million colours
16 can store 6.5K colours
more colours
Pupils access files from a shared folder on their school network server.
These
files are available for the pupils to open, but only a teacher can edit and save
the files to this folder.
Describe how this is implemented.
Pupils have read only access to
this folder (1)
Teachers have read/write
access to this folder (1)
Explain why a compound key is could be required for table
No single field provides a unique
value
State two
items that would be specified in a data dictionary.
Field/data type Keys / PK/FK Validation Field length/size Format Required Unique Sample data Table name
State one reason why the increased use of technology has had a negative
effect on the environment.
Answer must refer to
manufacture, use or disposal of
technology.
State two benefits of using parameter passing rather than global
variables.
code is more readable/easier to
maintain
Aids modularity
Reduces impact or load on
main memory