Yr 11 Mock Paper 1 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What does the term “ROM” Stand for and what does it store?

A

ROM stands for read only memory. This stores the start-up instructions
for a computer and cannot be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the term “RAM” Stand for and what does it store?

A

RAM stands for random access memory. This stores the instructions and
data that are currently being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the term “Cache memory” mean?

A

Memory located close to the processor that allows faster access than from RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State the purpose of a CPU?

A

CPU performs the FDE cycle
or….
* Process instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the term single core mean

A
  • Single core means there is only one processor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State what is meant by a single core 2.5 GHz processor?

A

Single core means there is only one processor
* 2.5Ghz means it can run 2.5 billion FDE cycles per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Von Neumann architecture includes registers.
Identify two registers used in Von Neumann architecture.

A

PC (Program Counter)
Accumulator (Performs calculation )
MDR
MAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify and describe two functions of an operating system

A

user interface
* allows the user to communicate with the hardware
* e.g. GUI/command prompt

  • allows the user to input data
  • outputs data to the user
  • memory management / multitasking
  • moves data between RAM and VM
  • gets data from RAM
  • stores data to RAM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State the purpose of utility system software?

A

Perform housekeeping
or
maintenance tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layla uses a backup utility. She performs both full and incremental backups.

Explain the reasons why Layla performs both full and incremental backups

A

full backup will copy every file and all data

  • incremental will only copy files/data that have changed
  • …incremental can only be done once a full backup has been completed
  • …reduces time taken to backup each time
  • …reduces storage/memory used to backup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

one benefit and one drawback of Layla releasing her game as open source

A

benefit : other people can improve the program

drawback : cannot charge a fee //
other people can use her code..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the environmental impacts of the company bringing out new devices twice a year

A
  • …increasing pollution / e-waste
  • …that will not degrade
  • new equipment uses up natural resource

sold devices may just be thrown
* …that will not degrade
* new equipment uses up natural resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the cultural impacts of the company bringing out new devices twice a year.

A

people may feel their devices are out-ofdate
* increased cost
* social pressure to keep up-to-date
* increase digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe what the internal secondary storage device will store

A

Software / applications / programs
* …including OS
* files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give three benefits of the tablet having a solid state device instead of a magnetic device

A

faster access/read/write speed
* Smaller in physical size // more compact // weighs less
* More durable/robust
* Uses less power
* Runs cooler
* Quieter when running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give two drawbacks of the tablet having a solid state device instead of a magnetic
device

A

limited number of read/write times
* more expensive (per byte)
* (usually) smaller capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the difference between a LAN and a WAN

A
  • LAN is small geographical area
  • WAN is over a large geographical area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Identify one other factor that can contribute to the performance of a network

A

Error rate
If using wireless or wired
Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the threat malware can pose to the university’s network and give a prevention method

A

PREVENTION
anti-spyware
* anti-malware
* anti-virus
* firewall

EXPLANATION
an delete/corrupt files/data
* can change files/data
* can prevent the users accessing files
* can replicate through (all connected) devices
* record keypresses and transmit to third party
* steal data
* slow network speed // block access to network

19
Q

Describe the threat a brute force attack can pose to the university’s network and give a
prevention method that the university can use.

A

PREVATION
firewall
* strong password
* two-step verification

EXPLANATION
gains access to user’s account//access your password
* …can access (private/confidential) data
* …can edit data
* …can delete data
* …can install malware
* …use your gained password elsewhere
* …block your access to your account

20
Q

Is POP

A
21
Q

Identify any legislation misus act

A

Copyright Designs and Patents Act (programmer wants to protect their work from being copied or distributed.)

  • Computer Misuse Act (A person logs into a computer without permission by guessing the password.)
  • Freedom of Information Act ( provides public access to information held by public authorities)
  • Computer Misuse Act (A hacker gains access to a company’s files over a network without permission.)
  • Data Protection Act (A company collects data that it does not need about its customers)
22
Q

Describe what is meant by a virtual network.

A

using a software layer to apply security restrictions over a physical network

23
Q

How do you prevent unauthorised access
to computer?

A

Firewall
//(strong) password
//physical security
// access rights
//security questions
// two-step authentication

24
Q

How do you prevent Virus

A

Anti-virus
//malware
// firewall
//network restrictions
// do not plug in unknown
storage devices

25
Q

How do you prevent Data interception

A

// Encryption

25
Q

How do you prevent Phishing

A

// Firewall
// do not click on unknown
links
// spam filter
// education about
what to do/not do
// check sender/website to see if real/fake

26
Q

Name two other threats to the data in a computer system and give a method of preventing each.

A

Spyware (1) anti-spyware (1)
Pharming (1)
Check web address is valid(1)
DOS/DDOS (1)
Use of proxy server/firewall (1)
Ransomware (1)
Use of antimalware (1)
SQL injection (1)
Network forensics/suitable form validation(1)
Social engineering // people as a weak point(1)
training (1)
Poor network policy (1)
education/setting rules (1)
Hardware failure/loss (1) Backup (1)

27
Q

Explain why network uses a peer-to-peer model and not a client-server model.

A

No server (required for client-server)
* Computers will have software installed/updated individually

  • Less initial cost / maintenance
  • Specialist required to setup client-server
  • Easier to add new devices
  • Lesser need for file sharing
28
Q

Describe the benefits and drawbacks of storing her files on the cloud.

A

Benefit
* Can access files from any device
* May be free of cost
* Easier to increase storage capacity (not memory)
* Can be used a backup in case of data loss

Drawback
* Cannot access files if no Internet access
* Not in control of security (bod less secure)
* …data may be hacked/stolen
* May cost monthly fee

29
Q

What does the term “Register” mean?

A

A small piece of memory that
can hold an instruction or

30
Q

What does the term “Cache”

A

High speed memory that stores
recently used instructions

31
Q

What does the term “Control
Unit (CU)”

A

Sends signals to direct the
operations

32
Q

What does the term “Arithmetic
Logic Unit”

A

Performs mathematical
operations

33
Q

Give three additional examples of utility programs

A

// Backup
* Encryption
* Compression
* Firewall
* Anti-virus
// anti-malware
* Anti-spyware
// anti-malware

34
Q

After defragmentation, Ali’s computer is able to access files faster.

Explain why Ali’s computer can access the files faster after defragmentation

A

// Less physical movement saves time
//fewer individual accesses

35
Q

Explain how defragmentation will change how the files and free space are arranged on hard disk?

A

1 mark for:
* Collate free space together
Max 2 from
* Collate file fragments together/contiguously

36
Q

Each packet has a header.
State three items of data that would be contained in a packet header.

A

Destination IP/address
* Sender IP/address
* Packet Number
* Packet size
* Number of packets

36
Q

Describe the purpose of ROM

A

Stores data that must be retained when the computer turns off
OR….
Store BIOS

37
Q

Ali thinks his tablet is an embedded system.
State whether Ali is correct or incorrect, justifying your choice

A

Choice: Embedded system has one/few functions

Justification: * ….the tablet may only be able to perform a small number of tasks

38
Q

Fill in gaps
The operating system provides a user ……………………………………………. . This displays the
output to the user and allows the user to interact with the ……………………………………………. .

A

The operating system provides a user interface. This displays
the output to the user and allows the user to interact with the
hardware.

39
Q

The operating system controls the movement of data from secondary storage to
……………………………………………. and vice-versa. This is known as memory management

A

to… RAM

40
Q

An operating system allows device ……………………………………………. to be installed to allow
an external piece of hardware to interact with the ……………………………………………. . To be installed to allow
an external piece of hardware to interact with the ……………………………………………. .

A

device… drivers
with the…. password
the.. processor

41
Q

The operating system can only perform one process at a time, but by managing the memory
the computer can appear to be completing more than one process at a time. This is known as
……………………………………………. .

A

as….Multi-tasking

42
Q

The operating system provides security through user accounts and
…………………………… It also creates and maintains a file system to
organise files and …………………………..

A

accounts and passwords.

and directories