PAPER: Computer Systems Specimen Flashcards
(28 cards)
Identify two parts of a computer (besides the number of cores, cache size, and clock speed) which could improve the performance of a computer [2]
1) RAM
2) SSD (solid state drive)
3) HDD
4) Graphics card (GPU)
Explain one reason why cache size affects the performance of a CPU [2]
1) Data is transferred faster…which makes a CPU more efficient [2]
2) It is faster to transfer to and from cache…that transferring to and from RAM [2]
Define secondary storage [1]
Long-term, non-volatile storage of data or files
A computer records an audio file of someone playing a guitar. Describe what happens when the computer converts the music into a file. [2]
1) The height of the wave is measured/sampled at regular intervals
2) …and then it is stored as binary
The sample rate is increased on the computer when recording the guitar. Give two effects this will have on the recording. [2]
1) The quality will improve
2) The file size will increase
Explain the effect of performing a 2-place shift to the right on the binary number 11001011. [2]
1) Divide the number by 4
2) Loses precision
Explain how the word MOP will be represented in ASCII. [2]
1) each character from MOP has its ASCII code stored in the order written
-> 77 79 80 (MOP)
2) ASCII code converted to 8-bit binary number
Define what is meant by a ‘network protocol’. [1]
A set of rules for communication
With regards to network protocols, define what is meant by a ‘layer’. [1]
A division of network functionality
Describe one advantage of using layers to construct network protocols. [2]
1) It is self-contained -> it allows different developers to concentrate on one aspect of the network [2]
2) A layer can be taken out and edited without affecting other layers -> it promotes interoperability between vendors and systems [2]
Give two reasons why a bakery may use a star network topology for their LAN. [2]
1) Fewer data collisions can occur
2) If a device fails, it does not affect the rest of the network
Staff already use strong passwords to protect systems. Explain, with reference to system security, three other ways that the hospital could protect the network system. [6]
1) Firewall -> prevents unauthorised access [2]
2) Anti-malware -> removes viruses/spyware from infecting the system [2]
3) User access levels -> users have restricted access [2]
Identify three errors that the hospital staff could make that may endanger the security of the network. Outline a procedure that could be put in place to prevent each error. [6]
1) Downloading infected files from the internet -> restricting access to insecure websites [2]
2) Allowing physical access to the surgery’s network -> locking of doors [2]
3) Sharing sensitive data with third parties -> restricting access to email/internet/printing [2]
A restaurant has a computer-based ordering system which is running slowly. A technician has said that the hard disc drive is fragmented.
Explain how the restaurant’s hard disc could have become fragmented. [4]
1) Orders have been saved onto the system as they order food and then deleted once processed [1]
2) Once other orders have been made, new files are created [1] which may be bigger than the spaces left by the deleted files [1]
3) The order files are split up [1]
Explain how defragmentation software could overcome the issue of the slow computer system. [3]
1) Files on the hard disk drive are moved [1]
2) Empty spaces collected together [1]
3) Files are moved to be stored together [1]
4) Fewer disc accesses are needed [1]
Define what is meant by a Wide Area Network. [1]
1) The computers are geographically remote/ distanced/ more than a mile apart
2) Communication medium is not owned by the law firm
Explain two advantages to the law company of storing their data in the Cloud. [4]
1) It would offer additional storage [1] so the company can take on more cases [1]
2) It would allow their employees to work from anywhere [1] so they can take cases from other countries [1]
3) You don’t need specialist network skills [1] so the firm don’t need to employ more staff [1]
Explain two disadvantages to the law company of storing their data in the Cloud. [4]
1) You need a constant internet connection [1] which lawyers who travel a lot may not always have [1]
2) Data stored in the Cloud will be vulnerable to hacking and other threats [1] which the firm have no control over [1]
Which legislation applies to this action?
-> Using a picture for the law company’s new logo without the original creator’s permission
Copyright Designs and Patents Act 1988
Which legislation applies to this action?
-> A secretary accessing a lawyer’s personal email account without permission
Computer Misuse Act 1990
Which legislation applies to this action?
-> Making a copy of the latest Hollywood blockbuster movie and sharing it with a client.
Copyright Designs and Patents Act 1988
Which legislation applies to this action?
-> Storing customer data insecurely.
Data Protection Act 2018
Which legislation applies to this action?
-> A lawyer installing a key logger on the secretary’s computer.
Computer Misuse Act 1990
Which legislation applies to this action?
-> Selling client’s personal legal data to a marketing company without their permission
Data Protection Act 2018