Yr 11 Mock Paper 1 Flashcards
(45 cards)
What does the term “ROM” Stand for and what does it store?
ROM stands for read only memory. This stores the start-up instructions
for a computer and cannot be changed
What does the term “RAM” Stand for and what does it store?
RAM stands for random access memory. This stores the instructions and
data that are currently being used.
What does the term “Cache memory” mean?
Memory located close to the processor that allows faster access than from RAM
State the purpose of a CPU?
CPU performs the FDE cycle
or….
* Process instructions
What does the term single core mean
- Single core means there is only one processor
State what is meant by a single core 2.5 GHz processor?
Single core means there is only one processor
* 2.5Ghz means it can run 2.5 billion FDE cycles per second
Von Neumann architecture includes registers.
Identify two registers used in Von Neumann architecture.
PC (Program Counter)
Accumulator (Performs calculation )
MDR
MAR
Identify and describe two functions of an operating system
user interface
* allows the user to communicate with the hardware
* e.g. GUI/command prompt
- allows the user to input data
- outputs data to the user
- memory management / multitasking
- moves data between RAM and VM
- gets data from RAM
- stores data to RAM
State the purpose of utility system software?
Perform housekeeping
or
maintenance tasks
Layla uses a backup utility. She performs both full and incremental backups.
Explain the reasons why Layla performs both full and incremental backups
full backup will copy every file and all data
- incremental will only copy files/data that have changed
- …incremental can only be done once a full backup has been completed
- …reduces time taken to backup each time
- …reduces storage/memory used to backup
one benefit and one drawback of Layla releasing her game as open source
benefit : other people can improve the program
drawback : cannot charge a fee //
other people can use her code..
Describe the environmental impacts of the company bringing out new devices twice a year
- …increasing pollution / e-waste
- …that will not degrade
- new equipment uses up natural resource
sold devices may just be thrown
* …that will not degrade
* new equipment uses up natural resources
Describe the cultural impacts of the company bringing out new devices twice a year.
people may feel their devices are out-ofdate
* increased cost
* social pressure to keep up-to-date
* increase digital divide
Describe what the internal secondary storage device will store
Software / applications / programs
* …including OS
* files
Give three benefits of the tablet having a solid state device instead of a magnetic device
faster access/read/write speed
* Smaller in physical size // more compact // weighs less
* More durable/robust
* Uses less power
* Runs cooler
* Quieter when running
Give two drawbacks of the tablet having a solid state device instead of a magnetic
device
limited number of read/write times
* more expensive (per byte)
* (usually) smaller capacity
Describe the difference between a LAN and a WAN
- LAN is small geographical area
- WAN is over a large geographical area
Identify one other factor that can contribute to the performance of a network
Error rate
If using wireless or wired
Bandwidth
Describe the threat malware can pose to the university’s network and give a prevention method
PREVENTION
anti-spyware
* anti-malware
* anti-virus
* firewall
EXPLANATION
an delete/corrupt files/data
* can change files/data
* can prevent the users accessing files
* can replicate through (all connected) devices
* record keypresses and transmit to third party
* steal data
* slow network speed // block access to network
Describe the threat a brute force attack can pose to the university’s network and give a
prevention method that the university can use.
PREVATION
firewall
* strong password
* two-step verification
EXPLANATION
gains access to user’s account//access your password
* …can access (private/confidential) data
* …can edit data
* …can delete data
* …can install malware
* …use your gained password elsewhere
* …block your access to your account
Is POP
Identify any legislation misus act
Copyright Designs and Patents Act (programmer wants to protect their work from being copied or distributed.)
- Computer Misuse Act (A person logs into a computer without permission by guessing the password.)
- Freedom of Information Act ( provides public access to information held by public authorities)
- Computer Misuse Act (A hacker gains access to a company’s files over a network without permission.)
- Data Protection Act (A company collects data that it does not need about its customers)
Describe what is meant by a virtual network.
using a software layer to apply security restrictions over a physical network
How do you prevent unauthorised access
to computer?
Firewall
//(strong) password
//physical security
// access rights
//security questions
// two-step authentication