Yr 11 Mock Paper 1 Flashcards
What does the term “ROM” Stand for and what does it store?
ROM stands for read only memory. This stores the start-up instructions
for a computer and cannot be changed
What does the term “RAM” Stand for and what does it store?
RAM stands for random access memory. This stores the instructions and
data that are currently being used.
What does the term “Cache memory” mean?
Memory located close to the processor that allows faster access than from RAM
State the purpose of a CPU?
CPU performs the FDE cycle
or….
* Process instructions
What does the term single core mean
- Single core means there is only one processor
State what is meant by a single core 2.5 GHz processor?
Single core means there is only one processor
* 2.5Ghz means it can run 2.5 billion FDE cycles per second
Von Neumann architecture includes registers.
Identify two registers used in Von Neumann architecture.
PC (Program Counter)
Accumulator (Performs calculation )
MDR
MAR
Identify and describe two functions of an operating system
user interface
* allows the user to communicate with the hardware
* e.g. GUI/command prompt
- allows the user to input data
- outputs data to the user
- memory management / multitasking
- moves data between RAM and VM
- gets data from RAM
- stores data to RAM
State the purpose of utility system software?
Perform housekeeping
or
maintenance tasks
Layla uses a backup utility. She performs both full and incremental backups.
Explain the reasons why Layla performs both full and incremental backups
full backup will copy every file and all data
- incremental will only copy files/data that have changed
- …incremental can only be done once a full backup has been completed
- …reduces time taken to backup each time
- …reduces storage/memory used to backup
one benefit and one drawback of Layla releasing her game as open source
benefit : other people can improve the program
drawback : cannot charge a fee //
other people can use her code..
Describe the environmental impacts of the company bringing out new devices twice a year
- …increasing pollution / e-waste
- …that will not degrade
- new equipment uses up natural resource
sold devices may just be thrown
* …that will not degrade
* new equipment uses up natural resources
Describe the cultural impacts of the company bringing out new devices twice a year.
people may feel their devices are out-ofdate
* increased cost
* social pressure to keep up-to-date
* increase digital divide
Describe what the internal secondary storage device will store
Software / applications / programs
* …including OS
* files
Give three benefits of the tablet having a solid state device instead of a magnetic device
faster access/read/write speed
* Smaller in physical size // more compact // weighs less
* More durable/robust
* Uses less power
* Runs cooler
* Quieter when running
Give two drawbacks of the tablet having a solid state device instead of a magnetic
device
limited number of read/write times
* more expensive (per byte)
* (usually) smaller capacity
Describe the difference between a LAN and a WAN
- LAN is small geographical area
- WAN is over a large geographical area
Identify one other factor that can contribute to the performance of a network
Error rate
If using wireless or wired
Bandwidth
Describe the threat malware can pose to the university’s network and give a prevention method
PREVENTION
anti-spyware
* anti-malware
* anti-virus
* firewall
EXPLANATION
an delete/corrupt files/data
* can change files/data
* can prevent the users accessing files
* can replicate through (all connected) devices
* record keypresses and transmit to third party
* steal data
* slow network speed // block access to network
Describe the threat a brute force attack can pose to the university’s network and give a
prevention method that the university can use.
PREVATION
firewall
* strong password
* two-step verification
EXPLANATION
gains access to user’s account//access your password
* …can access (private/confidential) data
* …can edit data
* …can delete data
* …can install malware
* …use your gained password elsewhere
* …block your access to your account
Is POP
Identify any legislation misus act
Copyright Designs and Patents Act (programmer wants to protect their work from being copied or distributed.)
- Computer Misuse Act (A person logs into a computer without permission by guessing the password.)
- Freedom of Information Act ( provides public access to information held by public authorities)
- Computer Misuse Act (A hacker gains access to a company’s files over a network without permission.)
- Data Protection Act (A company collects data that it does not need about its customers)
Describe what is meant by a virtual network.
using a software layer to apply security restrictions over a physical network
How do you prevent unauthorised access
to computer?
Firewall
//(strong) password
//physical security
// access rights
//security questions
// two-step authentication
How do you prevent Virus
Anti-virus
//malware
// firewall
//network restrictions
// do not plug in unknown
storage devices
How do you prevent Data interception
// Encryption
How do you prevent Phishing
// Firewall
// do not click on unknown
links
// spam filter
// education about
what to do/not do
// check sender/website to see if real/fake
Name two other threats to the data in a computer system and give a method of preventing each.
Spyware (1) anti-spyware (1)
Pharming (1)
Check web address is valid(1)
DOS/DDOS (1)
Use of proxy server/firewall (1)
Ransomware (1)
Use of antimalware (1)
SQL injection (1)
Network forensics/suitable form validation(1)
Social engineering // people as a weak point(1)
training (1)
Poor network policy (1)
education/setting rules (1)
Hardware failure/loss (1) Backup (1)
Explain why network uses a peer-to-peer model and not a client-server model.
No server (required for client-server)
* Computers will have software installed/updated individually
- Less initial cost / maintenance
- Specialist required to setup client-server
- Easier to add new devices
- Lesser need for file sharing
Describe the benefits and drawbacks of storing her files on the cloud.
Benefit
* Can access files from any device
* May be free of cost
* Easier to increase storage capacity (not memory)
* Can be used a backup in case of data loss
Drawback
* Cannot access files if no Internet access
* Not in control of security (bod less secure)
* …data may be hacked/stolen
* May cost monthly fee
What does the term “Register” mean?
A small piece of memory that
can hold an instruction or
What does the term “Cache”
High speed memory that stores
recently used instructions
What does the term “Control
Unit (CU)”
Sends signals to direct the
operations
What does the term “Arithmetic
Logic Unit”
Performs mathematical
operations
Give three additional examples of utility programs
// Backup
* Encryption
* Compression
* Firewall
* Anti-virus
// anti-malware
* Anti-spyware
// anti-malware
After defragmentation, Ali’s computer is able to access files faster.
Explain why Ali’s computer can access the files faster after defragmentation
// Less physical movement saves time
//fewer individual accesses
Explain how defragmentation will change how the files and free space are arranged on hard disk?
1 mark for:
* Collate free space together
Max 2 from
* Collate file fragments together/contiguously
Each packet has a header.
State three items of data that would be contained in a packet header.
Destination IP/address
* Sender IP/address
* Packet Number
* Packet size
* Number of packets
Describe the purpose of ROM
Stores data that must be retained when the computer turns off
OR….
Store BIOS
Ali thinks his tablet is an embedded system.
State whether Ali is correct or incorrect, justifying your choice
Choice: Embedded system has one/few functions
Justification: * ….the tablet may only be able to perform a small number of tasks
Fill in gaps
The operating system provides a user ……………………………………………. . This displays the
output to the user and allows the user to interact with the ……………………………………………. .
The operating system provides a user interface. This displays
the output to the user and allows the user to interact with the
hardware.
The operating system controls the movement of data from secondary storage to
……………………………………………. and vice-versa. This is known as memory management
to… RAM
An operating system allows device ……………………………………………. to be installed to allow
an external piece of hardware to interact with the ……………………………………………. . To be installed to allow
an external piece of hardware to interact with the ……………………………………………. .
device… drivers
with the…. password
the.. processor
The operating system can only perform one process at a time, but by managing the memory
the computer can appear to be completing more than one process at a time. This is known as
……………………………………………. .
as….Multi-tasking
The operating system provides security through user accounts and
…………………………… It also creates and maintains a file system to
organise files and …………………………..
accounts and passwords.
and directories