Data representation
Data transmission
Hardware
Software
The internet and automated technologies
100

Which of the following values is larger:

F0

11111101

11111101

100

What is the name given to the method of transmitting data packets across a network, each data packet can take an individual pathway across the network.

Packet switching

100

Identify the names of three registers used by the CPU

MAR, CIR, MDR, PC, ACC
100

Identify two roles of the operating system

Providing an interface

Managing files

Managing peripherals

Managing memory

Multitasking

managing interrupts

providing a platform for applications to run

100

Identify three cyber security threats

Viruses, worms, phishing, pharming, malware, hacking etc

200
What does the term colour depth refer to?

The number of bits that are used to create each colour in an image

200

Identify two advantages of serial data transmission

Less chance of data be skewed

Less chance of interference

Cheaper as only one wire is needed 

200
Describe what a control bus is in the context of the CPU
Wires which are used for transmission of control signals between components in a computer. 
200

What is the name of a signal sent to the processor to tell it that its attention is required? 

Interrupt

200

What are the three main components of a URL?

The protocol, the domain name and the webpage or file name. 

300

Compare the two methods of data compression giving an example of when each should be used

Lossy compression uses an algorithm that finds unnecessary data and is permanently removed from the file. This is used in images and videos


Lossy compression reduces the size of a file by temporarily altering the data and restoring the data to its original. This is used in text files and program code. 

300

What is the difference between symmetric and asymmetric encryption?

Symmetric encryption uses the same key to encrypt and decrypt data. 

Asymmetric uses two different keys to encrypt and decrypt data.  

300

Identify 4 stages of an automated system that uses sensors and actuators 

Sensor captures reading

Reading is compared to the preset range

If the reading is outside the range then the actuator will take action  i.e. use a motor to open the door or turn a light on

The process is continuous.

300

Describe the difference between high-level and low-level language. 

High-level language is a programming language that uses English-like commands. 

Low-level language is closer to the machine's language, this could be assembly language or binary code. 

300

Describe the difference between persistent and session cookies

Session cookies are deleted when the web browser is closed. Persistent cookies are stored by the web browser until the user deletes it or because it has expired. 

400

Describe the difference between ASCII and UNICODE

ASCII is a 7-bit code representing 128 different characters. 

Unicode is 16 bit representing 65,536 different characters. 

400

Identify and describe the structure of a data packet

Header- stores the IP address of the destination and sender and the packet number.

Payload- Stores the actual data

Trailer- Stores any error-checking method. 

400
Describe the difference between primary storage and secondary storage. 

Primary storage is a type of storage directly accessed by the CPU. 

Secondary storage is a type of storage that is designed to store data permanently until the user deletes it. 

400

Identify two types of translators and describe the difference between them

Compiler- translates all of the code in one go. 

Interpreter- translates the high level language one line at a time

Assembler- translates assembly language into program code.

400
Identify four key features of an expert system

Knowledge base, rule base, inference engine and the user interface

M
e
n
u