revised paper 1 flashcards from topic questions

1
Q

state what is meant by metadata

A

Data about the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

state the maximum number of different colours that can be represented in 4 bits

A

(2^4 - FOR SOME REASON THATS THE FORMULA EVERYTIME) 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The colour depth is increased to 2 bytes

state two effects that this change can have on the image

A

1) the quality of the image can be improved
2) file size will increase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

identify the most suitable type of compression for the text document. Justify your choice

A

1) lossless
2) lossless will not remove any data
3) text files require all data to be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

identify the most suitable type of compression for the image file. Justify your choice

A

1) lossy
2) will reduce the file size more significantly
3) image will only lose quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

explain why a computer needs both primary and secondary storage

A

1) primary - to store active data that the processor needs to access
2) secondary - to store data long term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describe how an analogue sound wave is converted into digital form

A

1) sound wave is sampled
2) amplitude is measured
3) converted to binary
4) stored in a computer as binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

identify a secondary character set

A

unicode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

identify one appropriate type of secondary storage for the smart television. Justify your choice

A

Magnetic:
1) large storage capacity
2) for storing software
3) television unlikely to be moved
4) therefore portability not required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

define what is meant by an embedded system

A

a computer system that is built into another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

identify three devices, other than a satnav which contains embedded systems

A

1) dishwasher
2) washing machine
3) mobile phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

explain the effect of performing a 2-place shift to the right on the binary number 11001011

A

1) divided by 4
2) loses precision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

describe what the internal secondary storage device will store

A

1) software
2) including OS
3) files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

give three beneifts of the tablet having a solid state device instead of a magnetic device

A

1) more durable
2) smaller in physical size
3) faster access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

give two drawbacks of the tablet having a solid state device instead of a magnetic device

A

1) very expensive
2) smaller capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

describe how the file size of the sound recording could be reduced

A

1) reduce the sample rate
2) so fewer samples are taken per seconds
3) use lossy compression
4) to remove data that won’t be noticed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

give two reaosns why computer scientists use hexidecimal to represent numbers instead of binary

A

1) easier to enter
2) they are smaller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

state what is meant by the term image resolution

A

numbers of pixels in an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

give two ways that the file size of the image could be reduced

A

1) use less colours
2) use less pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

give one example of a solid state device

A

SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

explain how bitmap images are represented in binary

A

1) image made of pixels
2) each pixel given a binary code
3) which represents the colour of that pixel
4) each colour given a unique binary code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

explain how virtual memory can compensate for the lack of ram in alicia’s computer

A

1) when ram is full, data is sent to VM which holds data
2) data is sent back to ram when it needs to be used therefore transmitting the most frequently used data back to the ram
3) part of the secondary storage used a temporary ram
4) data from ram is moved to the vm to make space in ram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

explain why it would be beneficial for alicia to get more ram instead of relying on virtual memory

A

1) RAM is faster at processing data which makes the cpu more efficient
2) more rm will improve performance of the computer
3) Vm is slower to aaccess than RAM direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

explain how reducing the number of colours in an image can reduce its file size

A

1) fewer bits are needed per colour
2) which means fewer bits per pixel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

describe how the cpu and ram work together to enable the tablet computer to operate

A

1) instructions are stored in the ram
2) these are fetched from the ram in the cpu
3) where the instructions are executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

describe what is meant by an overflow error

A

1) there is an extra carry
2) as the number cannot fit into 8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

give two reasons why protocols have layers

A

1) each layer is independent
2) one layer can be changed without affecting the other

28
Q

give one other characteristic of a LAN

A

-uses internal hardware
- no third party hardware

29
Q

describe the benefits of the student changing their home LAN to include wireless connections

A
  • allows more devices to connect
  • easy to connect devices
  • devices can move around
  • cheaper to purchase
30
Q

state two drawbacks of changing their home LAN to include wireless connections

A

1) prone to interference
2) slower rate of transmission

31
Q

explain why the number of devices using the network at the same time can affect the performance of the network

A

1) slower transmission of data
2) lower bandwidth for each device
3) as bandwidth is split between all the devices sending data
4) increased latency

32
Q

identify on other factor that can affect the performance of the network

A

bandwidth

33
Q

explain why ethernet is a standard

A
  • it’s used by all manufacturers
  • ethernet is used in many devices
  • ethernet has a high bandwidth
34
Q

define what is meant by a network protocol

A

a set of rules for communication

35
Q

describe one advantage of using layers to construct network protocols

A
  • one layer can be changes without affecting the other layer
  • it promotes interoperability between vendors and systems
36
Q

give two reasons why the bakery may use a star network topology for their LAN

A

1) It is easy to add a new node or device
2) fewer data collisions can occur

37
Q

identify one device that hope can use to connect her home network to the internet

A

router

38
Q

explain why hope’s network uses a peer-to-peer model and not a client-server model

A

1) no server required for client server
2) computers are directly connected to each-other
3) computers are independent

39
Q

describe the benefits and drawbacks to Hope of storing her files on the cloud

A

Benefits:
1) can access files from any device
2) may be free of cost
3) provides additional storage

Drawbacks:
1) no security provided
2) easy for files to be hacked and intercepted by hackers
3) cannot access files if no internet access

40
Q

explain how the url is converted into the IP address

A
  • url sent to dns
  • dns looks up ip in its database
  • DNS returns IP
  • if IP not found, DNS sends to a higher level DNS.
41
Q

describe the role of the swich in the office network

A

1) receives packets
2) sends packets only to its destination
3) connects the devices together

42
Q

describe how introducing wireless access could’ve slowed down the network

A

1) prone to interferences
2) slower transmission of data than cabled
3) more devices could be connected

43
Q

identify two other factors that can affect the performance of a network

A

1) bandwidth available
2) number of users using the network at the same time

44
Q

describe the relationship between the website URL, the IP address and the webserver

A
  • the website is hosted on a webserver
  • the website has an IP address
  • browser sends url to dns
  • URL has a linked IP
  • DNS finds ip
  • higher level DNS
45
Q

explain why the TCP/IP model uses layers

A
  • they allow for one layer to be removed and edited
  • without affecting other parts
46
Q

identify if the house network is a LAN or a WAN. justify your choice

A

1) lan
2) no external hardware needed
3) covers a small geographical area

47
Q

describe the purpose of the router in the house’s network

A

1) directs packets to destination
2) receives packets from the network

48
Q

describe two benefits to the ocr supermarkets of using a client server network instead of a peer to peer network

A

1) all files can be moved centrally, so workers can access files from any computers
2) backups are central, all data is backed up each time

49
Q

describe two differences between IP addresses and MAC addresses

A

1) - IP addresses can be changed
- MAC addresses can’t be changed

2) - IP addresses are normally written in denary
- MAC addresses are normally written in hex

50
Q

name and describe one threat to a computer system that is not given in question

A

1) trojan
2) malware disguised as legitimate software
3) once installed, it acts like a virus e.g by deleting files

51
Q

Identify ande describe two software based security methods that the company can use to protect their computer systems and data

A

1) encryption
- scrambles data using an algorithm
- so hackers are unable to interpret/read data
-renders data useless

2) user access levels
- data can be read
- prevents accidental change
- limits data users can access

52
Q

Anti - malware

A

removes viruses from infecting the system

53
Q

describe the problems that can arise from unauthorised access to his laptop and confidential documents

A
  • malware could be put on the computer
  • delete files
  • so important work is lost
  • data could be stolen
  • use for illegal activity
  • data could be locked
54
Q

data interception

A
  • data could be intercepted by hackers and used against the user
55
Q

spyware

A
  • piece of software that records actions and sends to a third party for analysis
56
Q

state the need for utility software in a computer

A

performs housekeeping actions

57
Q

explain how defragmentation software could overcome the issue of the slow computer system

A

1) files on the hard disk drive are moved
2) empty spaces collected together
3) files are moved to be stored together
4) fewer disc accesses are needed

58
Q

identify and describe two functions of an operating system

A

1) user interface
- allows the user to communicate with the hardware
- allows the user to input data

2) memory management
- moves data between RAM and VM
- gets data from the RAM

59
Q

explain how defragmentation will change how the files and free space are arranged on the hard disk

A
  • collate free space together
  • collate file fragments together
  • all of file 1 will be stored consecutively
60
Q

explain why Ali’s computer can access files faster after defragmentation

A
  • when one page is read, it doesn’t have to search for second page
  • doesn’t have to physically move as far to get the next part of the file
  • less physical movement saves time
61
Q

describe two beenfits to the artist and the programmer of releasing the software as proprietary

A

1)
- authors can earn money
- by selling it for a fee
2)
- no-one can see the code
- users cannot edit the software

62
Q

describe one benefit to the users of releasing the software as open source

A
  • users can edit the source code
  • so errors can be fixed
63
Q

describe the environmental impacts of the company bringing out new devices twice a year

A

1) old devices may just be thrown
2) increasing pollution

64
Q

describe the cultural impacts of the company bringing out new devices twice a year

A
  • people may feel their devices are out of date
  • increased cost
65
Q

what is meant by an opcode

A

The part of the CPU instruction that specifies the operation to be performed.

66
Q

What is meant by an operand

A

The part of the CPU instruction that specifies the data or address to be used in the operation