Paper 1 Completed 24th May Flashcards
Identify one cause of data loss (1 mark) give 2 tho
- Natural Disasters
- Human Error
State the number of bits used to represent a non-primary color, such as yellow (1 mark)
24
State the maximum number of colours that can be represented in a computer pixel. (1 mark)
256^3
Explain why abstraction is required in the design of algorithms (3 marks)
Abstraction allows us to create a general idea of what the problem is and how to solve
it; Abstraction removes all specific detail, and any patterns that will not help in solving a
problem. This helps in forming a “model” and guides the programmer to solve the problem.
Identify two organizational issues related to the implementation of the new system. [2]
- User roles
- issues of software compatibility
State one type of testing that involves users. [1]
Beta Testing
Identify three consequences of inadequate testing. [3]
- Can lead to software which is not appropriate for the purpose it was
- Can lead to end user dissatisfaction
- Can lead to decreased reliability of the organization
Discuss the social and ethical issues associated with the introduction of a new
computer system. [4]
- Physical safety
- The new system may be designed to replace some staff
- There should be a code of ethics so system resources are not used without approval
Outline two advantages of a school using a computer network. [4]
- File sharing/resource sharing;
instead of using a disk or USB key to carry files from one computer to another
files can be shared directly using a network - Improved network security;
if the school has its own network, it can monitor network traffic / can create a
security culture (everyone who has a username and password is responsible for
keeping data secure)
Outline why protocols are necessary (in a network). [2]
- Computer networks consists of various types of equipment (such as routers,
switches, hubs and network interface cards) and the equipment comes from
different vendors, but they must all work together or the network does not operate
correctly;
or/and
Protocols work in layers (the highest being what the user sees, and the lowest
being the wire that the information is transferred along) and these layers
communicate with each other according to the rules (allowing communication
to occur accurately and efficiently);
Evaluate the use of trusted media access control (MAC) addresses as one method of
network security [4]
- Each (wireless network) adapter has a unique label called a MAC address;
- Routers uses these addresses to identify/authenticate computers
- One disadvantage is that the whitelist should be amended any time a new device
is purchased - Also this method is useless against hackers who use programs which intercept
data passing through network and mimic the MAC address of that device on the network, therefore allowing them access.