System Architecture
Data Representation
Network
Cyber Security or OS
Ethics
100

Describe the purpose of the CPU

To execute instructions stored in memory by repeatedly carrying out the fetch-execute cycle

100

What is the smallest unit of data?

Bit

100

Define LAN

Local Area Network - operates on a single site or within a single organisation across buildings close to each other

100

Define Penetration testing

Used to find weaknesses in a system by employing someone to break in before a hacker has an opportunity to identify any weaknesses

100

Define open source software

is licensed but free to use, source code can be viewed and edited

200

Name 4 common CPU components

ALU

CU

Cache

Registers

RAM

ROM

200
What are the rules for Binary addition?

0+0 =

0+1=

1+1=

1+1+1=

0+0 = 0

0+1= 1

1+1= carry a 1

1+1+1= 1 carry a 1

200

What is the difference between an IP and MAC address

IP address is a unique public address for the router or gateway of a network

MAC address is a unique hexadecimal identification number assigned to every Network Interface Card

200

Define user interface and provide an example

A means in which the user can interact with the computer

Voice

GUI

WIMP

Menu driven

200

Provide one principle of the Data Protection Act 2018

Data must be:

- fairly and lawfully processed

- used for specific purposes

- adequate, relevant and not excessive

- Accurate and up to date

- Not kept longer than necessary

- Kept secure

300

Explain what virtual memory is and provide an example of when you would use this

A small section of the hard disk reserved to 'act' like RAM. The program is stored in virtual memory, when it is needed is swapped with something else in RAM.

An example: Program stored in VM is Word, when word is needed it is swapped with Excel that was running in RAM.

300

Define metadata and provide 3 examples of some metadata

Metadata is data about data. The data stored in a file alongside the actual file data.

examples: type of data, date it was created, who created it, colour depth, image dimensions

300

Provide one advantage and one disadvantage of mesh networks

Advantages: 

- Highly robust/not one single point of failure

- Data can be transmitted from several devices simultaneously 

- Local networks run faster because data does not have to travel through a central switch

Disadvantages: 

- Very expensive to set up

- Self maintenance and administration is complex

300

List four features of an operating system's file management system?

Naming and saving files

Creating, renaming and deleting folders

Moving or copying files and folders between storage devices

Allocating user rights such as RO, RW , No access etc

Searching for files

Restoring deleted files

300

What legislation is infringed by:

Unauthorized access and modification of company financial accounts

Computer Misuse act

400

Provide an example of magnetic, solid state and optical and an appropriate use


Magnetic - HDD - Back ups 

Solid state - USB Memory Stick - Students school work

Optical - CD - music album

400

Anil has made a sound recording of a short piece of muysic. The quality of the playback is poor.

Explain why this could be?

bit depth or sample resolution

400

Describe two factors which effect the performance of a network

The number of active devices will increase the number of data collisions

Interference can disrupt the signal causing connections to become unreliable

Type of cabling, signal strength, distance from WiFi

400

Identify 4 different forms of cyber attacks

Malware - spyware/viruses

Social Engineering - blagging/phishing

Shouldering 

DOS

Brute-Force attacks

400

Provide two security measures a company should put in place in order to provide adequate security of customer data

firewall, anti-virus software, passwords, encryption

500

How many cycles is a 4.5 GHz, dual core processor able to perform each second?

9 billion

500

Explain how lossless compressions differs from a lossy compression

Lossless compression: original quality is preserved, no data or information is lost but has a less reduction compared to lossy.

Lossy compression: smallest file size, least transmission time however data or information is lost permanently

500

Define 'open source software'

Source code is distributed with the software

Cx can modify the source code

Cx can redistribute the source code (with same licence/restrictions)

500

Explain defragmentation

Files are stored on the hard-disk drive in blocks. As different sized files are added and deleted over time, gaps appear which may not fit all of the next file to be stored

500

Businesses commonly have a policy of replacing their computer hardware and equipment every 3 years.

Describe the environmental impacts of replacing working hardware and equipment so regularly?

waste of resources, environmental damage, landfill, heavy metals being leaked, pollutes air, waterways and land.