Yr 11 Mock Paper 1 Flashcards

(45 cards)

1
Q

What does the term “ROM” Stand for and what does it store?

A

ROM stands for read only memory. This stores the start-up instructions
for a computer and cannot be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the term “RAM” Stand for and what does it store?

A

RAM stands for random access memory. This stores the instructions and
data that are currently being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the term “Cache memory” mean?

A

Memory located close to the processor that allows faster access than from RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State the purpose of a CPU?

A

CPU performs the FDE cycle
or….
* Process instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the term single core mean

A
  • Single core means there is only one processor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State what is meant by a single core 2.5 GHz processor?

A

Single core means there is only one processor
* 2.5Ghz means it can run 2.5 billion FDE cycles per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Von Neumann architecture includes registers.
Identify two registers used in Von Neumann architecture.

A

PC (Program Counter)
Accumulator (Performs calculation )
MDR
MAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify and describe two functions of an operating system

A

user interface
* allows the user to communicate with the hardware
* e.g. GUI/command prompt

  • allows the user to input data
  • outputs data to the user
  • memory management / multitasking
  • moves data between RAM and VM
  • gets data from RAM
  • stores data to RAM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State the purpose of utility system software?

A

Perform housekeeping
or
maintenance tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layla uses a backup utility. She performs both full and incremental backups.

Explain the reasons why Layla performs both full and incremental backups

A

full backup will copy every file and all data

  • incremental will only copy files/data that have changed
  • …incremental can only be done once a full backup has been completed
  • …reduces time taken to backup each time
  • …reduces storage/memory used to backup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

one benefit and one drawback of Layla releasing her game as open source

A

benefit : other people can improve the program

drawback : cannot charge a fee //
other people can use her code..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the environmental impacts of the company bringing out new devices twice a year

A
  • …increasing pollution / e-waste
  • …that will not degrade
  • new equipment uses up natural resource

sold devices may just be thrown
* …that will not degrade
* new equipment uses up natural resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the cultural impacts of the company bringing out new devices twice a year.

A

people may feel their devices are out-ofdate
* increased cost
* social pressure to keep up-to-date
* increase digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe what the internal secondary storage device will store

A

Software / applications / programs
* …including OS
* files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give three benefits of the tablet having a solid state device instead of a magnetic device

A

faster access/read/write speed
* Smaller in physical size // more compact // weighs less
* More durable/robust
* Uses less power
* Runs cooler
* Quieter when running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give two drawbacks of the tablet having a solid state device instead of a magnetic
device

A

limited number of read/write times
* more expensive (per byte)
* (usually) smaller capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the difference between a LAN and a WAN

A
  • LAN is small geographical area
  • WAN is over a large geographical area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Identify one other factor that can contribute to the performance of a network

A

Error rate
If using wireless or wired
Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the threat malware can pose to the university’s network and give a prevention method

A

PREVENTION
anti-spyware
* anti-malware
* anti-virus
* firewall

EXPLANATION
an delete/corrupt files/data
* can change files/data
* can prevent the users accessing files
* can replicate through (all connected) devices
* record keypresses and transmit to third party
* steal data
* slow network speed // block access to network

19
Q

Describe the threat a brute force attack can pose to the university’s network and give a
prevention method that the university can use.

A

PREVATION
firewall
* strong password
* two-step verification

EXPLANATION
gains access to user’s account//access your password
* …can access (private/confidential) data
* …can edit data
* …can delete data
* …can install malware
* …use your gained password elsewhere
* …block your access to your account

21
Q

Identify any legislation misus act

A

Copyright Designs and Patents Act (programmer wants to protect their work from being copied or distributed.)

  • Computer Misuse Act (A person logs into a computer without permission by guessing the password.)
  • Freedom of Information Act ( provides public access to information held by public authorities)
  • Computer Misuse Act (A hacker gains access to a company’s files over a network without permission.)
  • Data Protection Act (A company collects data that it does not need about its customers)
22
Q

Describe what is meant by a virtual network.

A

using a software layer to apply security restrictions over a physical network

23
Q

How do you prevent unauthorised access
to computer?

A

Firewall
//(strong) password
//physical security
// access rights
//security questions
// two-step authentication

24
How do you prevent Virus
Anti-virus //malware // firewall //network restrictions // do not plug in unknown storage devices
25
How do you prevent Data interception
// Encryption
25
How do you prevent Phishing
// Firewall // do not click on unknown links // spam filter // education about what to do/not do // check sender/website to see if real/fake
26
Name two other threats to the data in a computer system and give a method of preventing each.
Spyware (1) anti-spyware (1) Pharming (1) Check web address is valid(1) DOS/DDOS (1) Use of proxy server/firewall (1) Ransomware (1) Use of antimalware (1) SQL injection (1) Network forensics/suitable form validation(1) Social engineering // people as a weak point(1) training (1) Poor network policy (1) education/setting rules (1) Hardware failure/loss (1) Backup (1)
27
Explain why network uses a peer-to-peer model and not a client-server model.
No server (required for client-server) * Computers will have software installed/updated individually * Less initial cost / maintenance * Specialist required to setup client-server * Easier to add new devices * Lesser need for file sharing
28
Describe the benefits and drawbacks of storing her files on the cloud.
Benefit * Can access files from any device * May be free of cost * Easier to increase storage capacity (not memory) * Can be used a backup in case of data loss Drawback * Cannot access files if no Internet access * Not in control of security (bod less secure) * …data may be hacked/stolen * May cost monthly fee
29
What does the term "Register" mean?
A small piece of memory that can hold an instruction or
30
What does the term "Cache"
High speed memory that stores recently used instructions
31
What does the term "Control Unit (CU)"
Sends signals to direct the operations
32
What does the term "Arithmetic Logic Unit"
Performs mathematical operations
33
Give three additional examples of utility programs
// Backup * Encryption * Compression * Firewall * Anti-virus // anti-malware * Anti-spyware // anti-malware
34
After defragmentation, Ali’s computer is able to access files faster. Explain why Ali’s computer can access the files faster after defragmentation
// Less physical movement saves time //fewer individual accesses
35
Explain how defragmentation will change how the files and free space are arranged on hard disk?
1 mark for: * Collate free space together Max 2 from * Collate file fragments together/contiguously
36
Each packet has a header. State three items of data that would be contained in a packet header.
Destination IP/address * Sender IP/address * Packet Number * Packet size * Number of packets
36
Describe the purpose of ROM
Stores data that must be retained when the computer turns off OR.... Store BIOS
37
Ali thinks his tablet is an embedded system. State whether Ali is correct or incorrect, justifying your choice
Choice: Embedded system has one/few functions Justification: * ….the tablet may only be able to perform a small number of tasks
38
Fill in gaps The operating system provides a user .................................................... . This displays the output to the user and allows the user to interact with the .................................................... .
The operating system provides a user interface. This displays the output to the user and allows the user to interact with the hardware.
39
The operating system controls the movement of data from secondary storage to .................................................... and vice-versa. This is known as memory management
to... *RAM*
40
An operating system allows device .................................................... to be installed to allow an external piece of hardware to interact with the .................................................... . To be installed to allow an external piece of hardware to interact with the .................................................... .
device... *drivers* with the.... *password* the.. *processor*
41
The operating system can only perform one process at a time, but by managing the memory the computer can appear to be completing more than one process at a time. This is known as .................................................... .
as....*Multi-tasking*
42
The operating system provides security through user accounts and ................................. It also creates and maintains a file system to organise files and ................................
accounts and *passwords*. and *directories*