Describe the purpose of the CPU
To execute instructions stored in memory by repeatedly carrying out the fetch-execute cycle
What is the smallest unit of data?
Bit
Define LAN
Local Area Network - operates on a single site or within a single organisation across buildings close to each other
Define Penetration testing
Used to find weaknesses in a system by employing someone to break in before a hacker has an opportunity to identify any weaknesses
Define open source software
is licensed but free to use, source code can be viewed and edited
Name 4 common CPU components
ALU
CU
Cache
Registers
RAM
ROM
0+0 =
0+1=
1+1=
1+1+1=
0+0 = 0
0+1= 1
1+1= carry a 1
1+1+1= 1 carry a 1
What is the difference between an IP and MAC address
IP address is a unique public address for the router or gateway of a network
MAC address is a unique hexadecimal identification number assigned to every Network Interface Card
Define user interface and provide an example
A means in which the user can interact with the computer
Voice
GUI
WIMP
Menu driven
Provide one principle of the Data Protection Act 2018
Data must be:
- fairly and lawfully processed
- used for specific purposes
- adequate, relevant and not excessive
- Accurate and up to date
- Not kept longer than necessary
- Kept secure
Explain what virtual memory is and provide an example of when you would use this
A small section of the hard disk reserved to 'act' like RAM. The program is stored in virtual memory, when it is needed is swapped with something else in RAM.
An example: Program stored in VM is Word, when word is needed it is swapped with Excel that was running in RAM.
Define metadata and provide 3 examples of some metadata
Metadata is data about data. The data stored in a file alongside the actual file data.
examples: type of data, date it was created, who created it, colour depth, image dimensions
Provide one advantage and one disadvantage of mesh networks
- Highly robust/not one single point of failure
- Data can be transmitted from several devices simultaneously
- Local networks run faster because data does not have to travel through a central switch
Disadvantages:
- Very expensive to set up
- Self maintenance and administration is complex
List four features of an operating system's file management system?
Naming and saving files
Creating, renaming and deleting folders
Moving or copying files and folders between storage devices
Allocating user rights such as RO, RW , No access etc
Searching for files
Restoring deleted files
What legislation is infringed by:
Unauthorized access and modification of company financial accounts
Computer Misuse act
Provide an example of magnetic, solid state and optical and an appropriate use
Magnetic - HDD - Back ups
Solid state - USB Memory Stick - Students school work
Optical - CD - music album
Anil has made a sound recording of a short piece of muysic. The quality of the playback is poor.
Explain why this could be?
bit depth or sample resolution
Describe two factors which effect the performance of a network
The number of active devices will increase the number of data collisions
Interference can disrupt the signal causing connections to become unreliable
Type of cabling, signal strength, distance from WiFi
Identify 4 different forms of cyber attacks
Malware - spyware/viruses
Social Engineering - blagging/phishing
Shouldering
DOS
Brute-Force attacks
Provide two security measures a company should put in place in order to provide adequate security of customer data
firewall, anti-virus software, passwords, encryption
How many cycles is a 4.5 GHz, dual core processor able to perform each second?
9 billion
Explain how lossless compressions differs from a lossy compression
Lossy compression: smallest file size, least transmission time however data or information is lost permanently
Define 'open source software'
Source code is distributed with the software
Cx can modify the source code
Cx can redistribute the source code (with same licence/restrictions)
Explain defragmentation
Files are stored on the hard-disk drive in blocks. As different sized files are added and deleted over time, gaps appear which may not fit all of the next file to be stored
Businesses commonly have a policy of replacing their computer hardware and equipment every 3 years.
Describe the environmental impacts of replacing working hardware and equipment so regularly?
waste of resources, environmental damage, landfill, heavy metals being leaked, pollutes air, waterways and land.