Paper 1 Completed 24th May Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Identify one cause of data loss (1 mark) give 2 tho

A
  • Natural Disasters
  • Human Error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State the number of bits used to represent a non-primary color, such as yellow (1 mark)

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State the maximum number of colours that can be represented in a computer pixel. (1 mark)

A

256^3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain why abstraction is required in the design of algorithms (3 marks)

A

Abstraction allows us to create a general idea of what the problem is and how to solve
it; Abstraction removes all specific detail, and any patterns that will not help in solving a
problem. This helps in forming a “model” and guides the programmer to solve the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify two organizational issues related to the implementation of the new system. [2]

A
  • User roles
  • issues of software compatibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State one type of testing that involves users. [1]

A

Beta Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify three consequences of inadequate testing. [3]

A
  • Can lead to software which is not appropriate for the purpose it was
  • Can lead to end user dissatisfaction
  • Can lead to decreased reliability of the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Discuss the social and ethical issues associated with the introduction of a new
computer system. [4]

A
  • Physical safety
  • The new system may be designed to replace some staff
  • There should be a code of ethics so system resources are not used without approval
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Outline two advantages of a school using a computer network. [4]

A
  • File sharing/resource sharing;
    instead of using a disk or USB key to carry files from one computer to another
    files can be shared directly using a network
  • Improved network security;
    if the school has its own network, it can monitor network traffic / can create a
    security culture (everyone who has a username and password is responsible for
    keeping data secure)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Outline why protocols are necessary (in a network). [2]

A
  • Computer networks consists of various types of equipment (such as routers,
    switches, hubs and network interface cards) and the equipment comes from
    different vendors, but they must all work together or the network does not operate
    correctly;

or/and

Protocols work in layers (the highest being what the user sees, and the lowest
being the wire that the information is transferred along) and these layers
communicate with each other according to the rules (allowing communication
to occur accurately and efficiently);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evaluate the use of trusted media access control (MAC) addresses as one method of
network security [4]

A
  • Each (wireless network) adapter has a unique label called a MAC address;
  • Routers uses these addresses to identify/authenticate computers
  • One disadvantage is that the whitelist should be amended any time a new device
    is purchased
  • Also this method is useless against hackers who use programs which intercept
    data passing through network and mimic the MAC address of that device on the network, therefore allowing them access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly