paper 1 - another one Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

name three types of utility software

A
  • Anti-virus
  • Anti-spyware
  • Firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Instructions written in a high-level language must be
converted to_____ so that they can be executed by the _____

A

binary / CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain one reason why compiled code helps protect intellectual property

A

Compiled code is not human readable, so nobody else can alter it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State the name of the component of the CPU that performs comparisons

A

Arithmetic Logic Unit / ALU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State the function of cache memory

A

To store frequently used instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain why it is important for computing technology to be inclusive

A

Inclusion reduces the divide in society because more people have access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe one freedom that open source software provides to developers

A

Freedom to view the source code and modify/distribute it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how abstraction could be applied to playing cards when creating a
card game to run on a computer

A

essential features e.g colour / rank can be used to represent a general model of the card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Capital to Lowercase in ASCII

A

+32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compare the use of 8 bits and 24 bits to represent sound

A

Sample resolution - More levels of amplitude can be represented (with 24 bits)

Accuracy of representation - The sound is more like the original (with 24 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what happens when you have to add too many 1’s at the end of an addition?

A

overflow error - because there are not enough available bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain why a game console requires RAM.

A

To store actions /progress during the game because this data is changeable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe how hardware and software work together to start a computer

A

ROM contains the BIOS that loads the operating system from secondary storage into RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compare the storage media options available to a cloud storage provider.

A

Lower order responses: -
HDD vs SSD
Low cost/High capacity vs High cost/Low capacity
Low vs High energy efficiency
Slow vs fast access speeds
Higher order responses:
Access speeds negated by network latency
SSD access speeds faster, so could be used for database software to provide quicker lookups.
Larger storage capacity means used for file storage provided by HDD
Files written to SSD as faster and then permanently stored / Backed up to HDD
Frequently stored data ‘cached’ on SSD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identify one way in which a WAN differs from a LAN.

A

WANs are always connected via gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain why the IMAP protocol is more suitable for this than the POP3 protocol.

A
  • IMAP retains the data on a server (1) which can be read by any
    computer (1)
  • POP3 downloads the data to the client (1) so it would not be available from a different computer (1
17
Q

Describe the role of the transmission control protocol (TCP).

A

Splits the data into packets (1) and numbers them (1)
using a checksum (1) to see if packets have been delivered correctly
(1) to avoid error/data corruption detection (1) before reordering
them at their destination (1)

18
Q

Describe the role of a server in a client-server network.

A

Responds to incoming client requests by supplying a service

19
Q

A company stores data about employees on networked computers.
Discuss the methods available to maintain network security and protect the data
from cyberattacks.

A

Validation and authentication techniques (access control, physical security and firewalls)
* Security issues associated with the ‘cloud’ and other contemporary storage
* Different forms of cyberattack (based on technical weaknesses and behaviour) including social
engineering (phishing, shoulder surfing), unpatched software, USB devices, digital devices and
eavesdropping
* Methods of identifying vulnerabilities including penetration testing, ethical hacking, commercial
analysis tools and review of network and user policies
* How to protect software systems from cyber-attacks, including considerations at the design stage,
audit trails, securing operating systems, code reviews to remove code vulnerabilities in
programming languages and bad programming practices, modular testing and effective network
security provision