Processor
Processor 2
Storage
Software
Ethics
100

 What is the function of the arithmetic logic unit (ALU)?

It performs arithmetic operations (e.g., addition) and logical operations (e.g., AND, OR).

100

Discuss the advantages and disadvantages of using GPUs for general-purpose computing (GPGPU).

Advantages: High parallelism, efficient for large-scale data tasks.
Disadvantages: Limited instruction set, less efficient for sequential tasks, requires specialised programming.

100

Explain how the characteristics of magnetic, optical, and solid-state storage affect their use in different applications.

Magnetic: High capacity, low cost – used for backups.
Optical: Portable, low cost – used for media distribution.
Solid-state: Fast, durable – used in mobile and embedded systems.

100

Explain how an operating system manages concurrency in a multi-user environment.

It uses process scheduling, context switching, and resource allocation to ensure fair and efficient execution of multiple processes without conflict or starvation.

100

Evaluate the ethical concerns surrounding the use of AI in decision-making systems.

Concerns include bias, lack of transparency, accountability, and potential job displacement. Ethical AI requires fairness, explainability, and human oversight.

200

It manages and coordinates the activities of the CPU, directing the flow of data and instructions.

control unit 

200

 Compare the instruction sets and execution models of RISC and CISC architectures.

RISC uses a small set of simple instructions with uniform execution time, enabling pipelining. CISC has complex instructions that may take multiple cycles, reducing code size but complicating decoding.

200

Compare the use of RAM and cache memory in terms of speed, cost, and role in system performance.

Cache is faster and more expensive than RAM, storing frequently accessed data to reduce latency. RAM holds active programs and data. Cache improves CPU efficiency; RAM supports multitasking.

200

Compare the advantages and disadvantages of using a virtual machine for software development.

Advantages: Isolation, portability, easy testing.
Disadvantages: Overhead, slower performance, complex configuration.

200

Discuss the social implications of widespread surveillance technologies.

Surveillance can improve security but threatens privacy and civil liberties. It may lead to self-censorship and misuse by authorities.

300

What is the difference between general-purpose and dedicated registers?

General-purpose registers store temporary data; dedicated registers have specific roles (e.g., PC, MAR).

300

Evaluate the suitability of multi-core processors for real-time systems.

Multi-core processors can improve responsiveness and multitasking, but real-time systems require predictable timing, which can be disrupted by thread scheduling and shared resource contention.

300

Evaluate the impact of storage latency and throughput on system performance.

High latency slows data access, reducing responsiveness. Low throughput limits data transfer rates, affecting performance in data-intensive tasks. SSDs outperform HDDs in both metrics.

300

Analyse how memory management techniques like paging and segmentation support multitasking.

Paging divides memory into fixed-size blocks, while segmentation uses logical divisions. Both allow efficient memory use and isolation between processes, supporting multitasking.

300

Analyse the environmental impact of large-scale data centres and suggest mitigation strategies.

Data centres consume vast energy and produce heat. Mitigation includes renewable energy, efficient cooling, and server virtualisation.

400

Explain how the use of pipelining improves CPU performance.

Pipelining allows multiple instructions to be processed simultaneously at different stages (fetch, decode, execute), increasing instruction throughput and reducing idle CPU cycles.

400

Analyse how the use of co-processors can enhance system performance in specialised applications.

Co-processors offload specific tasks (e.g., floating-point, encryption) from the CPU, improving performance and efficiency in domains like scientific computing or multimedia processing.

400

Discuss the trade-offs between using cloud storage and local storage for enterprise systems.

Cloud: Scalable, accessible, but dependent on internet and raises security concerns.
Local: Fast, secure, but limited scalability and higher maintenance costs.

400

Evaluate the role of interrupt handling in maintaining system responsiveness.

Interrupts allow the CPU to respond to urgent tasks, improving responsiveness. Efficient handling is crucial; poor design can lead to missed or delayed responses.

400

Explain how digital rights management (DRM) affects both content creators and consumers

Creators: Protects intellectual property.
Consumers: Limits usage rights, may reduce accessibility and usability.

500

limitations of the Von Neumann architecture in modern computing.

The Von Neumann bottleneck limits performance due to shared memory for data and instructions, causing delays. Modern systems use techniques like cache memory and Harvard architecture to mitigate this.

500

Explain how SIMD and MIMD differ in parallel processing

SIMD (Single Instruction, Multiple Data) applies the same instruction to multiple data points simultaneously, ideal for graphics. MIMD (Multiple Instruction, Multiple Data) allows different instructions on different data, suitable for general-purpose parallel computing

500

Analyse how the use of virtual memory can affect system performance and reliability.

Virtual storage extends memory using disk space, enabling multitasking but slowing performance due to disk access. It can improve reliability by preventing crashes from memory overflows.

500

Discuss the implications of using open-source versus proprietary operating systems in a business context.

Open-source: Cost-effective, customisable, but may lack support.
Proprietary: Reliable support, polished UI, but costly and less flexible.

500

Evaluate the role of legislation (e.g., GDPR) in protecting user data in the digital age.

Legislation enforces data protection, transparency, and user rights. It holds organisations accountable but can be complex to implement and enforce globally.