Paper 1 Flashcards

1
Q

what is the function of the Program Counter

A

Stores the address of the next instruction to be fetched from memory. Increments during each fetch-execute cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the function of the Control Unit

A

Controls the flow of data in and out of the cpu. Manages the fetching, decoding and execution of instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of the MAR (Memory Address Register)

A

Stores the address of the data to be fetched from or the address where the data is to be stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function of the ALU

A

Performs mathematical calculations and logical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain why the number of devices using the network at the same time can affect the performance of the network

A
  • more people trying to access more data on the same network slows down the performance of the network
  • less bandwidth
    -slower transmission of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain why Ethernet is a standard

A

-Ethernet is used by all manafacturers
-to allow comparability with other devices
-Has a high bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify three tasks carried out by a router

A

1) Recieve packets
2) Transmitting packets
3) assign IP addresses to nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give two reasons why the library should use encryption

A

1) data cannnot be understood if intercepted
2) so that only authorise users an access the confidential material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify and describe two software based security methods that the company can use to protect their computer systems and data

A

1) Encryption - the operating system provides additional security by encrypting data. This prevents hackers from understanding data if accessed.

2) User access levels - prevents users from making changes to the system. Data can be read and it limits the data that users can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe how an analogue sound wave is converted into digital form

A

1) the sound wave is sampled at the amplitude of the wave
2) at regular intervals
3) and converted into binary which is stored in a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify three pieces of metadata that is often stored with an image

A

1) file type
2) file size
3) height

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

give two benefits of compressing the data before its emailed

A

1) allows for a quicker upload of data
2) reduces file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

explain why lossy compression may not be appropriate to compress all of the student’s files

A

It will permanently remove data and may reduce the quality of the students files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

identify once appropriate type of secondary storage for the smart television. Justify your choice.

A

Magnetic:
- large storage capcity for storing software
- television unlikely to be moved therefore portability is not required
- cost to purchase is low so the TV will be cheaper to purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain one reason why the cache size affects the performance of the cpu

A

1) data is transferred faster in the cache which makes the cpu more efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define what is meant by secondary storage

A

Non volatile storage of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Identify three common types of storage you can choose from

A

1) optical
2) magnetic
3) solid state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

State 4 characteristics of secondary storage devices that you should consider whn choosing a device

A

1) portability
2) durability
3) speed
4) capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The sample rate is increased on the computer when recording the guitar

Give two effects this will have on the recording

A

1) increase file size
2) increase the quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

explain the effect of performing a 2-place shift to the right on a binary number

A

1) divides by 4
2) loses precision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

define what is meant by a network protocol

A

A set of rules for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

with regards to network protocols, define what is meant by a ‘layer’

A

A division of network functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

describe one advantage of using layers to construct network protocols

A
  • It is self contained
  • It allows for different developers to concentrate on once aspect of the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Give two reasons why the bakery may use a star network topology for their LAN

A

1) fewer data collisions
2) It is easier to add a new node or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

explain how the restaurant’s hard disc could have become fragmented

A

1) orders have been saved onto the system as they order food and then deleted once processed
2) once other orders have been made, new files are created
3) Which may be bigger than the spaces left by the deleted files
4) the order files are split up

26
Q

Explain how defragmentation software could overcome the issue of the slow computer system

A

1) files on the hard disk drive are moved
2) empty spaces collected together
3) files are moved to be stored together
4) fewer disc accesses are needed

27
Q

Define what is meant by a Wide Area Network

A

The computers are geographically distanced

28
Q

explain two advantages to the law company of storing their data in the cloud

A

1) it would offer additional storage to the company so they could take on more cases

2) The third party provides backup to the company, saves money on staff and software

29
Q

Explain two disadvantages to the law company of storing their data in the cloud

A

1) data stored on the cloud is vulnerable to hacking and other threats which the firm have no control over
2) Reliant on third party to carry out security procedures but the firm are still legally responsible if things go wrong

30
Q

one type of system software is the operating system

identify and describe two functions of an operating system

A

1) user interface - allows the user to communicate with the hardware. Allows the user to input data.

2) memory management/multitasking - moves data between RAM and Virtual Memory. Gets data from RAM

31
Q

State the purpose of utility system software

A

performs maintenance tasks

32
Q

explain the reasons why Layla performs both full and incremental backups

A
  • full will copy every file and all data
  • incremental will copy files that have changed
  • incremental can only be done once a full backup has been completed
33
Q

Give one benefit and one drawback of Layla releasing her game as open source

A

benefit - other people will be able to improve the program

drawback - she won’t be able to charge a fee

34
Q

Describe what the internal secondary storage device will store

A

1) software
2) Including OS
3) files

35
Q

give three benefits of the tablet having a solid state device instead of a magnetic device

A

1) faster access
2) more durable
3) smaller in physical size

36
Q

Give two drawbacks of the tablet habing a solid state device instead of a magnetic device

A

1) limited number of read times
2) Usually smaller capacity

37
Q

Site B has a higher network performance than Site A

explain how each of the following can contribute to the performance of a network

A

Wifi frequency - 5GHz frequency can carry more data per second than a 2.4GHz

Interference - Limits range

Number of concurrent users - more traffic means the same bandwidth is spent

Type of network traffic - transmitting video files will take up more bandwidth than the text files

38
Q

Descibe how packet switching can be used when sending data from one site to the other.

A

1) data is split up into packets
2) each packet has a fixed size
3) each packet has a header
4) that includes packet number/destination
5) packets are sent individually

39
Q

Describe what is meant by a virtual network

A
  • software governed network
  • multiple physical networks can appear as one virtual network
40
Q

The network has one WAP in the kitchen that transmits data on the 5GHZ frequency

When the laptop is in the kitchen, it has better network performance

Explain why the laptop’s network performance is lower in the bedroom

A

It is further away from the WAP and therefore gets slower data transmission. Bandwidth is weaker because 5GHz is only short range.

41
Q

State two ways hope could improve the wireless network performance in the bedroom

A

1) install another WAP in the bedroom
2) change to 2.4GHz

42
Q

Explain why Hope’s network uses a peer-to-peer model and not a client-server model.

A

1) no server
2) computers are directly connected to each other
3) computers are independent

43
Q

Explain how defragmentation will chnage how the files and free space are arranged on Ali’s hard disk

A

1) collate free space togetehr
2) collate file fragments together
3) All of files will be stored consecutively

44
Q

Explain why Ali’s computer can access the files faster after defragmentation

A

1) when one page is read, it doesn’t have to search for another page
2) Doesn’t have to physically move as far to get the next part of the file

45
Q

Give three additional examples of utility programs

A

1) antivirus
2) firewalls
3) encryption

46
Q

Describe the purpose of ROM in Ali’s tablet computer

A

1) stores data that must be retained when the computer is turned off
2) Stores BIOS
3) The boot up instructions

47
Q

Explain how the URL www.ocr.org.uk is converted into the IP address

A

1) URL sent to DNS
2) DNS looks up to input database
3) DNS returns IP
4) If not found, DNS sends to higher level DNS

48
Q

Explain why the digital video camera needs secondary storage

A

1) for non-volatile storage
2) to store the videos

49
Q

Explain why solid state storage is the most appropriate type of storage for the digital video camera

A

1) it’s portable
2) it’s lightweight which is good becasue the device needs to be carried
3) no moving parts, wont be damaged when moving around
4) reliable

50
Q

Identify the backup method William should use to backup the computer, justifying your choice.

A

Incremental - only the changes need to be backed up. The software settings are unlikely to have changed between backups. Takes less time to backup.

51
Q

Give one additional utility program WIlliam could make use of and describe how he would use it.

A

Defragmentation - more free space together. More files together. Faster to access files

52
Q

Explain how a creative commons license will impact the use of William’s videos by other people

A

1) other people can redistribute his work
2) can choose to restrict other people to be able to use the videos.
3) work is still copyrighted
4) allows free distribution

53
Q

Describe the purpose of the router in the house’s network.

A

1) directs packets to destination
2) recieves packets from the network
3) connects networks together
4) Has IP addresses for LAN

54
Q

Identify two addiotinal items of network hardware, apart from cables and a router, that may be used within the house network.

A

1) Switch
2) NIC

55
Q

Describe the purpose of two registers that are used by Von Neumann architecture.

A

MAR - stores the location where data will be fetched

Accumulator - stores the result of calculation

56
Q

“My computer has a quad-core processor, so it will run twice as fast as a computer with a dual-core processor.”

Explain why this statement is not always true

A
  • Software may be designed to run on 1 core and not multiple cores
  • clock speed also affect sspeed
  • RAM size also affects speed
  • cache size also affects speed
57
Q

Explain how virtual memory can compensate for the lack of RAM in Alicia’s computer.

A
  • VM is used when RAM is full
  • part of the secondary storage is used as RAM
  • Data from the RAM is moved to the secondary storage
  • RAM can then be filled with new data
58
Q

Explain why it would be beneficial for Alicia to get more RAM instead of relying on virtual memory

A

1) More RAM will improve the performance of the computer
2) VM is slower to access than RAM directly.

59
Q

Explain what is meant by a protocol

A

A set of rules for how computers shoudl communicate

60
Q
A
61
Q
A