paper 1 - another one Flashcards
name three types of utility software
- Anti-virus
- Anti-spyware
- Firewall
Instructions written in a high-level language must be
converted to_____ so that they can be executed by the _____
binary / CPU
Explain one reason why compiled code helps protect intellectual property
Compiled code is not human readable, so nobody else can alter it
State the name of the component of the CPU that performs comparisons
Arithmetic Logic Unit / ALU
State the function of cache memory
To store frequently used instructions
Explain why it is important for computing technology to be inclusive
Inclusion reduces the divide in society because more people have access
Describe one freedom that open source software provides to developers
Freedom to view the source code and modify/distribute it
Describe how abstraction could be applied to playing cards when creating a
card game to run on a computer
essential features e.g colour / rank can be used to represent a general model of the card
Capital to Lowercase in ASCII
+32
Compare the use of 8 bits and 24 bits to represent sound
Sample resolution - More levels of amplitude can be represented (with 24 bits)
Accuracy of representation - The sound is more like the original (with 24 bits)
what happens when you have to add too many 1’s at the end of an addition?
overflow error - because there are not enough available bits
Explain why a game console requires RAM.
To store actions /progress during the game because this data is changeable
Describe how hardware and software work together to start a computer
ROM contains the BIOS that loads the operating system from secondary storage into RAM
Compare the storage media options available to a cloud storage provider.
Lower order responses: -
HDD vs SSD
Low cost/High capacity vs High cost/Low capacity
Low vs High energy efficiency
Slow vs fast access speeds
Higher order responses:
Access speeds negated by network latency
SSD access speeds faster, so could be used for database software to provide quicker lookups.
Larger storage capacity means used for file storage provided by HDD
Files written to SSD as faster and then permanently stored / Backed up to HDD
Frequently stored data ‘cached’ on SSD.
Identify one way in which a WAN differs from a LAN.
WANs are always connected via gateways
Explain why the IMAP protocol is more suitable for this than the POP3 protocol.
- IMAP retains the data on a server (1) which can be read by any
computer (1) - POP3 downloads the data to the client (1) so it would not be available from a different computer (1
Describe the role of the transmission control protocol (TCP).
Splits the data into packets (1) and numbers them (1)
using a checksum (1) to see if packets have been delivered correctly
(1) to avoid error/data corruption detection (1) before reordering
them at their destination (1)
Describe the role of a server in a client-server network.
Responds to incoming client requests by supplying a service
A company stores data about employees on networked computers.
Discuss the methods available to maintain network security and protect the data
from cyberattacks.
Validation and authentication techniques (access control, physical security and firewalls)
* Security issues associated with the ‘cloud’ and other contemporary storage
* Different forms of cyberattack (based on technical weaknesses and behaviour) including social
engineering (phishing, shoulder surfing), unpatched software, USB devices, digital devices and
eavesdropping
* Methods of identifying vulnerabilities including penetration testing, ethical hacking, commercial
analysis tools and review of network and user policies
* How to protect software systems from cyber-attacks, including considerations at the design stage,
audit trails, securing operating systems, code reviews to remove code vulnerabilities in
programming languages and bad programming practices, modular testing and effective network
security provision