Paper 1 May 2019 Flashcards

1
Q

5.

(a) Outline one advantage of using virtual memory. [2]

(b) Outline one disadvantage of using virtual memory. [2]

A

(a)
Allows for expanding of primary memory even if it is full so programs can keep running through the use of swap files.

(b)
When a computer’s virtual memory resources are overused, disk thrashing can occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Identify two characteristics of a personal area network (PAN). [2
A
  • Smallest type of network;
  • Consists of connected devices in close proximity to the individual using them;
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Outline one reason why protocols are used in communications between computers. [2]
A

To provide a set of rules that enables for successful communication between two or more computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Outline why a binary tree would be a good choice of data structure for maintaining an
    address book. [2]
A

Binary trees allow for time efficient searching since in each iteration it reduces the addresses that need to be searched by half.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A large mail order company is concerned about the security of its stored data.

(b) Outline two backup strategies that may be used to limit data loss. [4]

A
  • Offsite data storage that holds regularly backed up copies of the data. It is unlikely that the offsite would be affected by for example, a natural disaster.
  • Failover system that stores an exact copy of the data that can be switched to in the case that the main system fails.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The company decides to improve its service by introducing a new user interface for its
customers and has developed this interface to the point that it needs to be tested by users
who are outside of the company.

(c) Explain why beta testing is used to gather feedback for the new user interface. [3]

A

Beta testing is important because it involves users outside the company to try the UI in a real-world setting, enabling unbiased feedback to be given to developers so that the software can be improved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(d) Outline one consequence of not involving end-users in the design and testing stages. [2]

A

The program may not meet end-users’ expectations and requirements since it may be missing key features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A company that provides training for teachers plans to set up a training room in its offices
    with a network of 15 computers. Each computer has 1TB of storage and 16GB of random
    access memory (RAM).

(a) Identify two characteristics of RAM.

A
  • Volatile
  • Fast access speed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The company has decided to allow the teachers to use their own devices in its training room
by adding wireless networking.

(d) (i) Outline one advantage to the company of implementing this change. [2]

A

(d) (i)
Teachers can bring their own devices which can save the company money by not having to supply all training computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(e) Describe one method of security that may be used on this wireless network. [2]

A

User ID and passwords can be used which means that only authorized users can access the network.

btw another valid one is:
Firewall can be installed to check traffic coming into the network and leaving the network, and can block suspicious data/traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain why the speed of data transmission on the wireless network in the training
room may vary. [4]

A

The speed of data transmission may vary as since bandwidth available for transmission is finite, high network traffic/demand can slow down transmission speeds.

Also, the passing of the network through obstructions (such as solid walls) can slow down transmission speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A singly linked list has been created including the following surnames; Bale, Cousens,
Davies, Pugh, Williams.

Explain the steps to insert “Jones” into this singly linked list. You may draw a labelled
diagram in your answer. [5]

A

Create a new node with data field Jones and a pointer field. Start searching from the beginning of the list and find the position where the new node is to be inserted (Jones to be inserted after Davies). Set the pointer in the Jones node to the pointer in the node Davies (so that the new node will be point to Pugh node). Set Davies node to point to the new Jones node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The developers of the smart home system are considering developing a smart home system
that uses a distributed control system to manage the temperature.
(d) Contrast the use of a distributed air conditioning system with a centralized air
conditioning system for maintaining a constant temperature in the smart home. [3]

A

Centralized system allows control from one central point which makes changes to all rooms while distributed system allows individual control of each room.

Furthermore, centralized systems are more difficult to install due to the connectivity required between the various components while distributed system is easier to install since there are few connections needed.

Finally, distributed systems are more expensive than centralized systems because they require more hardware to install.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly