Paper 1 Flashcards

1
Q

Identify one reason why programmers use hexadecimal notation.

A

Easier for humans to read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify the number of binary patterns that can be represented by 8 bit

A

(2 to the power of 8)

256 values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give the number of bits per character used by standard ASCII.

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State what is meant by the term pixel.

A

The smallest block of colour in an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

[…]16 different colours.
State the minimum number of bits that would be needed to represent
one pixel.

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give one reason for connecting computers in a local area network.

A

communicate (e.g. email)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

State the purpose of network protocols.

A

enable
communication
between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify the layer of the TCP/IP model that would add the File Transfer Protocol (FTP)

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give one task carried out by the network layer

A

Adds the source/destination IP address to each packet so that they can reach their designated destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benefit of Bus topology

A

The length of cable required is less than star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disadvantage of bus topology

A

If the main cable/a terminator fails or gets
damaged the whole network will fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give two reasons why lossy compression is used when distributing music files over the internet

A

Reduces time taken to upload/download

People have a limited hearing range / can’t
tell the difference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identify a file format that uses lossy compression

A

JPEG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why must a computer have hardware and software

A

The software “tells” the hardware which tasks to perform, and hardware makes it possible to actually perform them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give two reasons, other than cost and capacity, why Zakir may choose a solid state drive rather than a hard disc drive

A
  • Less heat generated
  • Silent operation
  • Longer battery life
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain one difference between flash memory and RAM

A

Flash memory is non-volatile (1) whereas RAM is
volatile

17
Q

Explain the purpose of cache memory

A

cache is a temporary storage
and is used to speed up processing

18
Q

types of anti-malware software

A
  • Antivirus (1)
  • Anti-spyware (1)
  • firewall
19
Q

Give one reason, other than cost, why scientists use simulations.

A

Predict/model outcomes

20
Q

Explain one reason why a simulation may require a powerful processor.

A
  • Simulations (may) use/collect large amounts of
    data (1)
  • Simulations (may) involve a large number of
    calculations (1)
21
Q

Describe the stored program concept

A

Instructions are stored in memory (1)
* Instructions (and data) are fetched, decoded, and
executed (1)

22
Q

types of registers

A
  • Program counter / PC
  • Memory address / MAR
  • Accumulator/ACC
23
Q

Describe the role of the address bus and the data bus during the fetch part of the cycle.

A

Address of instruction carried on address bus to main memory. Contents at that address carried back to the CPU on the data bus

24
Q

Effect of Increasing the width of the
data bus

A

Increases the number of data

25
Effect of Increasing the width of the address bus
Increases the number of memory locations that can be directly addressed
26
Explain why the variable Temp is needed
You need to swap the contents of array values (1) and without Temp one of the values would be lost (1)
27
two advantages of choosing a programming language that uses a compiler,rather than an interpreter, for a program that will be distributed on a DVD.
Compiled code is smaller than the original code (1), which may not fit on the DVD
28
Explain one difference between DNA computing and traditional computing
DNA uses chemical reactions (1) rather than electrical properties (1)
29
Give a definition of the term superposition in quantum computing.
Multiple probabilities at the same time
30
Ethically, everyone should be able to access the benefits of technology. Give two reasons why this may not be possible.
- Some people may not want to use technology - Some people may not be able to afford to use technology
31
(PART ONE )Discuss the negative environmental impact of using computers and actions that could be taken to reduce it.
- needs lots of water for manufacturing - Some countries require sellers to recycle own waste
32
(PART TWO)Discuss the negative environmental impact of using computers and actions that could be taken to reduce it.
- Computing devices sent to landfills contaminate ground and water - Find charities which take donations of old devices
33
(PART THREE)Discuss the negative environmental impact of using computers and actions that could be taken to reduce it.
- Alot of energy used to keep machines cool with air conditioning or fans - Turn off machines when not in use
34
analougue to digitaL
- set the sample rate - sample the analogue sound - measure the sound amplitude
35
internal and external differences
HDDs or SSDs : - large amounts of data - portable - moving parts USB sticks SD cards: - smaller - reasonably large amounts of data
35
exernal
HDDs or SSDs large amounts of data portable moving parts USB sticks SD cards (smaller/reasonable large amounts of data)
36
wireless advantages
convinient - move around while connected cheaper easy to add more users
37
wireless dissadvantages
- generaly less secure (access point available to all devices so hackers can gain access) - less reliable