Systems architecture
Memory and storage
Computer Networks, Connections and Protocols
Network Security & Systems Software
Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
100

A component of the cpu that does calculations, boolean logic and comparisons.

What is the arithmetic logic unit?

100

The two types of primary storage in a computer.

What are RAM and ROM?

100

The definition of the internet.

What is a collection of INTERconnected NETworks?

100

Three types of malware.

Eg. What are viruses, worms and Trojan horses?

100

Define the digital divide.

What is the separation and difference between those without and with access to technology?

200

All the registers in the central processing unit (as outlined in the OCR gcse specification)

What are the PC, MAR, MDR, CIR, ACC?

200

The most cost effective of the three main secondary storage types.

What is magnetic storage / a hard disk drive?

200

The two main network topologies.

What are star and mesh topologies?

200

The definition of a firewall.

What is a filter That separates a trusted and untrusted network and drops packets from malicious device?

200

A material that is renewable and one that is non renewable in the entire life cycle of a mobile phone.

Eg. What is fossil fuels? What is water?

300

The three factors that affect central processing unit performance.

What is clock speed, cache size and number of cores?

300

The expression/formula for audio file sizes discounting metadata.

What is sample rate (Hz) * duration (s) * bit depth?

300

The definition of a wireless access point (WAP) and what it is usually wired to in a LAN.

What is a device that allows wireless devices to connect to a wired network using Wi-Fi and is usually wired to the router?

300

An advantage and disadvantage to a command line interface.

Eg. What is they require less ram and processing, but requires expertise in the syntax?

300

2 examples of how to reduce e-waste.

Eg. What is recycling devices and using rechargeable batteries?

400

The order of the 4 main storage types in a computer in terms of high to low speed of access 

What is the register, cache, RAM and secondary storage?

400

10110110 in hexadecimal.

What is B6?

400

The definition of transmission media and the three main types.

What is the way devices are connected so data can be transmitted, and what are copper cables, fibre optics and wireless transmission/radiowaves?

400

The types of secondary storage you should and shouldn’t defragment and why.

What is hard disk drive so that the driver head only needs to move once to access the full contents of a file? What is a solid state drive because they have limited write cycles so can deteriorate quickly by defragmenting?

400

The names of the main 3 computer legislations.

What is the data protection act 2018, the computer misuse act 1990 and the copyright designs and patents act 1988?

500

The definition and 2 characteristics of embedded systems.

What is a system designed for 1 specific task within a larger system, and what is (two of these):

compact, time efficient/fast, long lifetime/low maintenance, adapted to specific conditions (eg. heatproof for a dishwasher), reliable (due to its use in critical systems), both soft and hardware/FIRMware, low power consumption, etc. ?

500

The two types of file compression, their definitions,  an example of a file type that suits each compression, and which one is reversible.

What are lossy and lossless compression? What is a compression that reduces file size by removing detail/data imperceptible to humans? What is a compression that find patterns in file data to shorten it? What are audio files for lossy and text files for lossless? What is lossless?

500

Three examples of protocols.

What are: HTTP, HTTPS, FTP, POP, IMAP, SMTP, TCP/IP (3 only) ?

500

Definition of an interrupt and a hard and software example.

What is a signal sent to the CPU by external devices due to an event that needs immediate attention? What is a printer out of paper? What is a divide by 0 error?

500

An example of an offense created from the 3 main computer legislations.

Eg. What is unauthorised access with intent to commit or facilitate a crime? What is copyright infringement? What is hiding collected data from a user?