1
2
3
4
5
100

Explain what is meant by non-composite and composite data types

non-composite data types can be defined without referencing another type. 

composite data types refer to other data types in their definition

100

 Identify one type of cryptography.

asymmetric, symmetric, quantum

100

Describe the purpose of both the A* algorithm and Dijkstra’s algorithm.

to find the optimal route between two nodes based on distance/cost/time

100

State two functions of SSL/TLS

Ensure security/privacy when using the internet 

Data encryption

Identification / authentication of client and server

100

Describe what is meant by the OOP feature inheritance.

Inheritance is where a derived class takes properties / behaviours attributes / methods  of a parent / super class / base class  

200

Explain why user-defined types are necessary

used to create new data types that help to extend the flexibility of a programming language as the programmer can create data types based on the application’s requirements.

200

Explain what is meant by supervised learning

enables learning by mapping an input to an output based on example input– output pairs

200

Explain what is meant by Deep learning 

It simulates the data-processing capabilities of the human brain to make decisions

200

Describe what is meant by multi-tasking and how it benefits process management.

Running multiple processes concurrently which benefits process management by allowing more tasks to complete than would be the case if they had to run one task after another.

200

Describe the sequential method of file access.

sequential access method searches for records one after the other from the physical start of the file until the record is found/the end of file.

300

Identify and describe two communication protocols that are used when sending or receiving emails.

SMTP, IMAP, POP3

300

Identify three process states.

running, ready, blocked

300

Explain why protocols are essential for communication between computer systems. [2]

Protocols establish a standard set of rules for communication.

Protocols enable compatibility between devices from different manufacturers/platforms.

Two devices wouldn’t be able to communicate/send messages to each other if they were using different protocols.

300

Give two examples of situations where the use of SSL/TLS would be appropriate.

When transmitting authentication data e.g. passwords, session cookies 

When transmitting data that must be protected from modification on its way to or from a server e.g. user input, or results from the server

300

State 3 features of RISC processors.

Uses hard-wired code/control units

Uses relatively few instructions / simple instructions

Uses relatively few addressing modes

Makes use of a single-cycle for each instruction 

Makes use of fixed length / fixed format instructions 

Makes use of general-purpose registers

Pipelining is straightforward to apply

The design emphasis is on the software 

Processor chips require few transistor

400

State the purpose of the optimisation stage in the compilation of a program. [3]

to improve the code so it minimises program storage, CPU time, memory use, program execution time

400

Describe the function of the shortest job first scheduling routine and give a benefit of this routine.

The process with the shortest time to complete/burst time is selected first and executed. The process will continue until complete or put in a waiting state once execution has begun // it is non-pre-emptive. The scheduler will continue to choose shorter processes over longer processes if they continue to be added to the queue can cause starvation for longer jobs.

Benefits:
Shorter jobs don’t have to wait for longer jobs to complete before processing // Significantly reduces the average overall waiting time for processes // Ensures starvation doesn’t occur for process with shorter burst times
Higher throughput of processes

400

Define these Object-Oriented Programming (OOP) terms: 

Encapsulation 

Getter 

Setter 

Polymorphism

Encapsulation – putting properties and methods inside a class // ensures sensitive data is hidden from users by hiding values of a structured data object inside a class.

Getter – method that is used to return the value of a property.

Setter – method that is used to update the value of a property.

Polymorphism - when methods with the same name are redefined / behave differently in derived / inherited classes / subclasses

400

Explain the process of syntax analysis during program compilation.

It takes input from the lexical analyser in the form of token streams.

The source code is analysed / parsed against the rules of the language to detect any errors in the code.

The output from this phase is a parse tree.

Syntax errors are reported.

400

Explain what is meant by disk thrashing.  

Disk thrashing is a problem that may occur when virtual memory is being used.

As the main memory fills up, more and more pages need to be swapped in and out of virtual memory. 

This swapping leads to a very high rate of hard disk access / excessive disk head movements.

Moving a hard disk read/write head takes a relatively long time / long latency time.

Eventually, more time is spent swapping pages than processing data which can cause the program to freeze or not run.

500

Describe two ways in which packet switching ensures a complete message is received when passing messages across a network.

Packets checked at receiving end / on arrival [1] … if packets arrive damaged or don’t arrive at all, a re-send request is sent [1] 

Packets routed through different paths / sent individually [1] … if a route is blocked, the packet is sent through a different route to ensure it arrives [1] 

If the packet’s hop count is exceeded [1] … the packet will be retired, which can generate a re-send request [1]

500

Outline the process followed to acquire a digital certificate.

the company requests a digital certificate from a Certificate Authority (CA) 

the CA responds with its public key and digital certificate, … signed with its private key  

the company gathers authentication information e.g. its public key … and sends it to the CA signed with the company’s private key and encrypted with the CA’s public key

the CA verifies the received information and generates/issues the digital certificate.  

500

Describe the function of a router in packet switching. [4]

The router reads the IP address of the destination from the packet header.

A router uses a routing table to find information … about e.g., available hops / netmask / gateway used / adjacent routers / the status of the routers along the route.

The router determines the next hop / optimum route. // The router sends the packet on its next hop. 

The router manages the hop counter // The hop counter is reduced by 1 every time the packet passes a router  

500

BONUSSSS

BONUSSSS

500

State the purpose of each layer in the TCP/IP protocol suite. 

*answer*

M
e
n
u