[go: up one dir, main page]

0% found this document useful (0 votes)
13 views30 pages

O level Computer

The document covers various computer science concepts including data transmission, encoding methods, the role of CPU, and the purpose of different types of storage. It also discusses machine learning applications, error detection methods, and characteristics of different storage types. Additionally, it highlights the functions of integrated development environments (IDEs) and the differences between various data encryption methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views30 pages

O level Computer

The document covers various computer science concepts including data transmission, encoding methods, the role of CPU, and the purpose of different types of storage. It also discusses machine learning applications, error detection methods, and characteristics of different storage types. Additionally, it highlights the functions of integrated development environments (IDEs) and the differences between various data encryption methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

O level Computer

2025 FM 12

Describe Run Length Encoding (RLE)


-​ Store consecutive pixels of same colour and number of repetitions
Explain how a file is broken down in packets and transmitted over a network
●​ Data is split into fixed size packets
●​ The data is the payload
●​ Each packet is given a header …
●​ … with data e.g. Destination IP
●​ Each packet has a trailer
●​ Router directs each packet towards its destination …
●​ … by selecting the most efficient route
●​ Each packet can take a different route to the destination
●​ Packets can arrive out of order
…after the last packet has arrived they are reordered

State three registers that are found in the Von Neumann architecture
-​ Accumulator ​ ​ ​ - Current Instruction Register ​ - Program Counter

Purpose Of CPU
-​ Execute/process instructions and data to produce output

Why can a computer execute more instructions than others


●​ It has a higher clock speed
●​ More FDE cycles can run per second
●​ More instructions can be executed per second

Describe purposes of NIC


-​ Provide the computer with MAC address
-​ Receive data from the network … and convert it to be understood by the computer
-​ Convert data from the computer to a form to be transmitted over the network
-​ To allow a physical connection between a computer and a network
Characteristics of MAC Address
●​ (Represented) in hexadecimal
●​ Numbers are separated by colons
●​ Six groups of digits
●​ Sets of 2-digit (hex) numbers

Explain how HTTPS makes transmission of data secure


●​ Uses SSL/TSL
●​ Encrypts data
●​ … using asymmetric encryption
●​ … data is encrypted using the web server's public key
●​ … data can only be decrypted by the web server's private key
●​ Data transmitted to the server can only be decrypted by the server

Describe the characteristics of AII


●​ Collection of data
●​ Rules for data
●​ Ability to reason
●​ Ability to adapt
●​ Ability to learn

Explain how machine learning is used by search engine


●​ Changes its data and rules
●​ … according to feedback/results
●​ … for example if a result does not give a suitable response this is recorded
●​ … next time the result is changed
●​ Supervised/unsupervised learning
●​ Use of ranking algorithm to decide which appears first

2024 ON 11
Benefits of reducing file size

• The file requires less storage space • Takes less time to transmit
• A lower bandwidth can be used to transmit the file • Less data usage for data allowance
• More likely to meet file size limits set by email clients/apps

Explain the purpose of secondary storage and identify why one is suitable
• To store data/files permanently
• … otherwise, data/programs would need to be downloaded/entered/installed every time the
smartphone was turned on
• To allow software to be downloaded/installed on the smartphone //
• To store user files
• For the creating of virtual memory

SSD IS SUITABLE
• It is small/thin in size
• … so it would fit easily into the smartphone device
• It is lightweight
• … so it wouldn’t make the smartphone heavy to carry
• It has no moving parts
• … so it would be durable/robust
• … if the smartphone is dropped the data is less likely to be damaged/lost
• It has fast read/write speeds
• … so it would be quick to load files/software
• It runs at a cool temperature
• … so it wouldn’t make the smartphone hot to hold for the user
• It doesn’t make a lot of noise
• … so it wouldn’t ruin the user’s experience of listening to music/watching videos
• It doesn’t require much power
• … so it won’t drain the battery
• It can have a large storage capacity
• … so can store files that are multimedia

Why parallel full-duplex may have been used


• It sends the data multiple bits at the same time // It uses multiple wires • … so the transmission
speed of the data will be fast • Data may not need to travel a long distance • … as the devices are all
within a single room • It sends data in both directions at the same time • … so users on the network
can send data to each other with no delay

Registers used in fetch stage of cycle


• Program counter // PC • Memory address register // MAR • Memory data register // MDR •
Current instruction register // CIR

Registers used in execute cycles


Accumulator • Memory address register // MAR • Memory data register // MDR

What happens at decode stage of fde cycle


• CIR/CU receives the instruction from the MDR // Instruction sent from MDR to CIR/CU • … using
the data bus • Instruction is separated into opcode and operand • Control unit decodes the
instruction • … using an instruction set

What is embedded system


Computer system that is designed to a perform dedicated/single function • Computer system that
contains a microprocessor (and)/dedicated hardware • Computer system that is built into a larger
system

Benefits of assembly
More control over manipulating the hardware • Faster execution for testing than a high-level
language • They can use machine specific instructions

How can IDE help programmer


Code editor … … that allows the user to enter and amend code in their program
Run-time environment … that allows a program to be run and see the outputs of their program
Error-diagnostic … to show the programmer where there are errors in the program
Auto-completion … to give the user options/suggestions of key commands to select
Auto-correction … to correct a command that has a minor misspelling
Prettyprint … changes the colour of key commands do they are easy to identify
A built-in translator.. To convert the program into machine code

Describe function of OS and its purpose

• Memory management • … managing what gets allocated where in memory


• Managing peripherals and drivers • … managing the communication between any input and output
devices that are connected to the computer
• Multitasking • … managing the process of switching between tasks that are being carrying out
• Platform for running applications • … allowing communication between the applications software
and the hardware
• System security • … proving features such as username and password
• User accounts • … allowing multiple user accounts to be created on a computer

Diagram of payment transaction using digital currency and blockchain


2024 ON 12
What is software
-​ Instructions/Program used to operate a computer or hardware

Operating system manages Input and Output

Similarity between hexa and binary


They are both number systems
Differences between hexa and binary
• Binary is base-2 whereas hexadecimal is base-16 • Binary only uses numbers whereas hexadecimal
also uses letters // Binary only uses 0 and 1 whereas hexadecimal uses 0 to 9/A to F

Why a smartwatch need ROM


To store the BIOS • To store the bootstrap • To help start-up the smart watch // to store start-up
instructions • To store the firmware • For non-volatile storage // to store data permanently • To
store data/instructions that should not change (unless needed)

Describe what is cloud storage and benefits


• A collection of servers • Allows access to data remotely // Stores data in a remote location •
Hardware can be owned/managed by a third party • Data storage that is stored/accessed using the
internet

Benefits
• No need to maintain the hardware • … the third party is responsible for maintaining the hardware /
security of the data
• Resources can be increased / decreased (on demand) // Can have unlimited storage capacity
• … no need to worry about running out of storage space • … can save cost of purchase of hardware
• Need less/no (secondary) storage space on the watch • … watch can remain/is small in size • …
costs of watch can be kept lower
• Can access the data from other/any devices • … if the watch breaks/is lost data is still available

Disadvantages:
− Internet connection is needed/needs to be stable … − … and if this is not available/unstable the
data cannot be accessed − Employees could be pressured to work outside of hours … − … as they can
access the data from any location

How is watch not a general purpose computer


• The watch can only perform a dedicated/limited functions/tasks • … and a general purpose
computer performs many/multiple functions • … (this means that) it is an embedded system • You
cannot plug in peripherals • You cannot reprogram the smartwatch // Cannot install other
software/apps • It would only have a microprocessor

How does barcode scanning operate


• A check digit is calculated from/using the barcode data • … using an algorithm // by example e.g.
Modulo 11 • … and added to the barcode • When/after the barcode is scanned the check digit is
recalculated … • … using the same algorithm • If the check digits do not match an error has
occurred when scanning the barcode // If the check digits match no error has occurred when
scanning the barcode

Web page located and retrieved to be displayed


How a vacuum cleaner can use machine learning
• It could gather data during vacuuming • … and adapt its own processes • … such as where
obstacles are placed in the room • … such as where dirtier areas are • … such as a path through a
room • … such as the shape of a room • … such as the most efficient route to vacuum a room • … so,
it knows areas to avoid/concentrate on/use different cleaning tools

2024 ON 13

Primary storage and purpose


• RAM
• To store data/instruction that is currently in use
• To store software/programs that are currently in use
• For volatile storage // to store data temporarily
• To allow data to be accessed directly by the CPU/processor // To allow data
to be stored closer to the CPU/processor
• ROM
• To store the BIOS
• To store the bootstrap/bootloader
• To store start-up instructions
• To store the firmware
• For non-volatile storage // to store data permanently
• To store data/instructions that should not change (unless needed)
• Cache
• To store frequently used instructions/data
• For volatile storage // to store data temporarily
-​ Speed up data access
-​ Faster than RAM
- Has different levels L1 -L3

Explain why lossy is not appropriate for a report


• Data will be permanently removed • … and that could be important/necessary data • (The report
will have text in it and) lossy is not suitable for text files • … as it will damage/corrupt the file • The
report may have images in it and the quality of these will be reduced

Advantages of unicode
• It can represent more characters • It can represent emojis/symbols • It can represent more
languages

How we sure if checksum value not match, error has occurred


• The checksum is calculated from/using the data • … using the same algorithm • … so, if the values
are different the data must be different

Differences between symmetric and asymmetric encryption

• Symmetric uses one/public key whereas asymmetric uses two/public and private keys • Symmetric
can send the key with the data whereas asymmetric does not • Symmetric decrypts the data using
the same key whereas asymmetric decrypts the data using a different key • Symmetric is less secure
than asymmetric
Diagram of data decoded once fetched in MDR

Role of microprocessor in ploughing

• It receives data from the sensor • It analyses the data // It checks if the data is within/out of a
range // • It sends signals to trigger actions based on the data

How machine learning is used in plowing


• It could make use of machine learning • It could gather data from ploughing • … and use this data
to adapt its own process • … so that it will make fewer mistakes • … such as the dimensions of the
field • … such as the landscape of the field • … such as where obstacles are in the field • … to create a
map of the field • … to develop the most efficient route to take • … so, it knows what to avoid in
future

Use of cookies:
• User preferences // by example • Login details • Payment details • User’s personal details e.g.
address • Contents of a shopping cart • Targeted advertising
Purposes of IDE

• It is a piece of software • … used to write/develop/edit code • … used test/debug the code • … with
features such as auto-completion // any suitable example • To translate the code to low level
language/machine code

2024 MJ 11

Diagram of fetch stage of FDE cycle

Examples of system software:


Operating system Utility software

Characteristics of robot
It has a mechanical structure/framework It has electrical components It is programmable It can
move

How a robot uses machine learning to improve


The robot can now adapt itself by changing its own rules/data/ processes The robot will become
more efficient … as it has a greater knowledge of its surroundings/environment … as it can
remember where a fence is … as it can remember the route it needs to take … as it can remember
where any obstacles are to avoid … as it can remember where to start and stop sowing seeds … as it
may make fewer errors

Explain how data may have errors after transmission


Data could be lost Data could be gained/added Data could be changed Bits could be reassembled
in the wrong order Interference could occur Crosstalk could occur Data collisions could occur
Data packets could time out/reach their hop count Network could be infected with malware

Error detection using odd parity and positive ARQ


The 1s are counted (in each byte) Each byte has a parity bit If the number of 1s are odd the parity
bit is 0 (otherwise it is 1) (The first packet of) data is sent and a timer is started The receiving
device counts the number of 1s (in each byte) If the number of 1s are odd/data meets odd parity an
acknowledgement is sent to say the data is error free … … the sender then sends the next packet of
data … … and the timer is restarted If the number of 1s is even an acknowledgement is not sent If
no acknowledgement is received within a set timeframe/before timeout … … the data packet is
resent

Error detection methods: Echo check Checksum Even parity check Negative ARQ


How firewall protects:
Criteria can be set (for traffic) … such as a blacklist/whitelist (of IP addresses) It will examine
traffic coming into the network It will check that the traffic meets the set criteria … and will reject
it if it does not meet criteria Certain ports used by hackers can be blocked/closed

2024 MJ 12
Instruction set: A list of machine code commands that can be processed by CPU
Diagram of DDoS

Differences between solid state and optical


Solid-state has no moving parts … optical does have moving parts
Solid-state is faster to access data … optical is slower to access data
Solid-state uses less power to operate … optical uses more power to operate
Solid-state runs quietly … optical makes more noise
Solid state is more durable/robust … optical is less durable/robust
Solid state storage has a large storage capacity … optical has a much smaller limit to its storage
capacity Solid-state is more expensive per GB of data … optical is cheaper per GB of data
Solid-state stores data onto silicon chips/transistors using logic (floating/control/NAND/NOR)
gates to control the movement of electrons … optical stores data by using lasers to burning pits
and lands onto a disk

What is meant by AI
The simulation of intelligent behaviours by computers A collection of data and the rules for using
that data Has the ability to reason Has the ability to learn/adapt

How expert system work


The user will enter data into the interface // The user will plug the car into an interface // The user
is given questions using the interface The inference engine will decide which questions to ask … by
using the previous answers given The inference engine will decide on a diagnosis … by comparing
the data/answers entered to the knowledge base and rule base … by calculating which option is
most likely if there are multiple The interface will output the diagnosis/result The explanation
system shows how the diagnosis was reached

Difference between internet and world wide web


The internet is the infrastructure The world wide web is a collection of web pages

2024 MJ 13

What is 16 bit color depth


16 bits used to represent each colour in the image

State characteristics of ROM that makes it primary storage


-​ Directly access by CPU

Why sensors are beneficial


●​ Data can be collected without human intervention
●​ Gathers data faster than a human
●​ It will be accurate at taking readings
●​ It can take readings continuously (24/7)
●​ It can take readings in dangerous environments

Data transmission using serial half-duplex


Functions of proxy server used to protect web server
●​ Can limit the number of requests sent to the web server at a time
●​ Can process common requests that will not need to enter the network
●​ Act as a firewall
●​ Examine incoming data to the webserver/network
●​ Can have set rules/criteria for data to meet
●​ Can have a blacklist/whitelist/list of IP addresses to block
●​ Blocks traffic that doesn’t meet criteria
●​ Closing certain ports

Describe how web pages are located, retrieved and displayed


●​ The users type the URL into the address bar/web browser
●​ The web browser sends the URL to the DNS
●​ The DNS searches for the matching IP address
●​ The DNS returns the IP address to the web browser
●​ If the DNS cannot find the IP address it sends the URL to the next DNS
●​ The web browser sends a request to the IP address/web server
●​ The web server sends the data for the web page to the web browser
●​ The web browser renders the HTML data to display the web page

Use of register : To temporarily store data/instruction/address and To allow immediate access to


data during the FDE cycle
Registers in CPU:
Memory address register // MAR Memory data register // MDR Accumulator // ACC Program
counter // PC Current instruction register // CIR

Purpose of ALU:
●​ To execute instructions
●​ To perform calculations // by example
●​ To perform logical operations // by example
●​ To store interim results of calculations
●​ Stores/reads/writes data to/from the accumulator

Functions of OS relating memory: Memory management and multitasking

2024 FM 12
Explain how the word “RED” can be represented by character set
• Unique binary/denary number given/stored for each character • The code for R is stored, then the
code for E then D in sequence

Explain how the processor manages the current program and the interrupt
• Interrupt is given priority • …and placed in interrupt queue • Processor finishes current FE cycle
for program • Processor checks interrupt priority queue // processor checks for higher priority
interrupt than program/process • If lower priority processor runs next FDE cycle for
program/process // if lower priority processor continues with program/process • (if higher priority)
processor stores current process/registers on stack • Checks source of interrupt • … and calls the
appropriate ISR • ISR handles/resolves interrupt • If there is another higher priority interrupt (than
process) then repeat • … (otherwise) processor retrieves content of stack/registers/previous process
(to continue with process from program)

Diagram of the process of user entering URL to web browser and displaying iti
Some digital currencies have digital ledgers called a blockchains. These are decentralised
databases where each transaction is stored as a new set of data with a time-stamp and is linked to
the previous set of data. This means that transactions cannot be altered, only new transactions
added, which allows the location of the data to be traced.

2023 ON 11

Role of MDR in fetch-decode-execute cycle

− Stores data … − … that has been fetched/to be written to memory

Explain how the analogue sound is recorded and converted to digital


− (The analogue sound is) recorded using a microphone − The sound wave is sampled − … measuring
the height/amplitude − Each amplitude has a unique binary value − The sample rate is set − … that is
the number of samples taken per second − The sample resolution is set − … that is the number of
bits used for each sample − Each sample taken is converted to binary
Differences between UNICODE and ASCII
− ASCII has limited/fewer characters // Unicode has a more characters − ASCII covers a limited set
of languages/fewer languages − Unicode includes many/more languages/emojis − ASCII requires
7/8 bits per character − Unicode requires up to 16/32 bits per character − ASCII has 128/256
characters − Unicode has 65 536/4 294 967 296 characters // approx. 60/70 thousand/4 billion
characters

Diagram of firewall

Features of magnetic storage


− Data is stored on platters − (Platters) are divided into tracks and sectors − Has components that
are spun − Data is read/written using a read/write arm − Data is read/written using electromagnets
− Magnetic field determines the binary value − It is non-volatile
Features of solid-state storage
− Flashes data onto chips − Uses transistors − Uses NAND/NOR technology − Uses control gates −
Uses flow gates − Controls the flow of electrons − It can be volatile or non-volatile
Describe how interrupts are used when a key is pressed on a keyboard
− Key press generates the interrupt − Interrupt given a priority − Interrupt is sent to CPU −
Interrupt is placed in a queue − CPU stops current task to check the queue/service the interrupt … −
… using an interrupt service routine − If key press is highest priority the interrupt is processed
Examples of hardware interrupt: − Moving the mouse − Clicking a mouse button − Plugging in a
device − Paper jam in printer − Printer out of paper
Examples of software interrupt: − Division by zero − Two processes accessing the same memory
location − Null value

2023 ON 12
Characteristics of embedded system:
− Performs a single/limited/dedicated function/task − It has a microprocessor − It has dedicated
hardware − Uses firmware − It is normally built into a larger device/system − User normally cannot
reprogram − It does not require much power − It is cheap to manufacture − Works automatically //
works without human intervention − It is small (in size) − It is a real-time system
Describe what is meant by sample resolution
− The number of bits that are used per sample − … that provides the variation in amplitude that can
be stored for each sample // defines the number of different amplitudes that can be recorded − …
that determines how quiet/loud the sounds are that can be recorded − Example e.g. 16-bit
Diagram of cyber security threat of data interception

Features of digital currency


-​ Can be used to pay for products and services
-​ Often tracked using digital ledgers
-​ Exist electronically
-​ Can be centralized/decentralized
-​ Usually encrypted

. Blockchain uses a digital ledger to track the use of digital currency

2023 ON 13

Describe the purpose of operating system


− It performs the basic functions of a computer − It manages the hardware − It provides a platform
to run software − It provides a user interface − It performs tasks such as (any example of function
of an operating system)
Explain what's meant by a binary number system
Any two from: − It has a base of 2 − It only uses two values − … that are 1 and 0

Define image resolution: − The dimensions of an image // Number of pixels wide by number of pixels
high
Define image color depth: − The number of bits used to represent each/a colour

Benefits of compressing file:


− Quicker to transmit/upload/download − Not as much bandwidth needed to transmit file − To fit in
limitation of file size on e.g. email

Role of router
Differences between primary and secondary
− Primary storage is directly accessible by the CPU − … whereas secondary storage is not directly
accessible by the CPU − Primary storage stores the data that is currently in use/for booting the
system − … whereas secondary storage stores user’s files/data/operating system/application
software − Primary storage normally has a small capacity − … whereas secondary storage normally
has a larger capacity − Some parts of primary storage are volatile − … whereas secondary storage is
non volatile − Some parts of primary storage the data cannot be changed − … whereas data in
secondary storage can be changed − Primary storage has faster access speeds to data − … whereas
secondary storage has slower access speeds to data

Describe what is meant by machine learning capabilities:


− It is a form of artificial intelligence − Means it can adapt/change (its own processes) // It can edit
its own algorithms − It can edit its own data − It can be trained − … this can be
supervised/unsupervised − … meaning it can learn with/without human interaction − Analyses
patterns and stores successful/unsuccessful results … − … to influence future decisions −
(Supervised) means a user tells the system the input and output − (Unsupervised) means the system
is given the input and needs to work out the output
2023 MJ 11

Describe what is meant by a dynamic IP address


It can be used to uniquely identify a device (on a network) It can change … … each time the device
is connected to the network

Describe how brute force work and why carried out


●​ Trial and error to guess a password
●​ Combinations are repeatedly entered …
●​ … until correct password is found
●​ Can be carried out manually or automatically by software

Why?
Steal/view/access data Delete data Change data Lock account // Encrypt data Damage
reputation of a business
Security solutions:
Two-step verification//Two-factor authentication//by example Biometrics Firewall // Proxy-server
Strong/complex password // by example Setting a limit for login attempts Drop-down boxes
Request for partial entry of password

Diagram for process of pharming


Differences between session cookie and persistent cookies
Session cookies are stored in memory/RAM … whereas persistent cookies are stored on the hard
drive/secondary storage When the browser is closed a session cookie is lost … whereas a persistent
cookie is not lost … until deleted by the user/they expire

2023 MJ 12

Describe how text is converted to binary to be processed


A character set is used … such as Unicode/ASCII Each character has a unique binary value

Describe how lossless compress file


A compression algorithm is used … such as RLE/run length encoding Repeating
words/characters/phrases are identified // Patterns are identified … and indexed … with number
of occurrences … with their position

Describe how compiler translates a computer program and how it report errors
It translates the (high-level language) to low-level language/object code/machine code It
translates all the code before it is executed It creates an executable file

It creates an error report after trying to compile … displaying all errors in the code … that require
correction before execution can take place

Process of DDos
Aim of Ddos and solutions:
Aim: Revenge To affect a company’s reputation Entertainment value To demand a ransom to stop
it To test a system’s resilience
Solution: proxy and firewall

Describe characteristics of IPv4 address:

Any FOUR from: It is denary based … with numbers between 0 and 255 It is 32 bits 4 sets/groups
of numbers … separated by dots Any TWO from: It is a unique address It can be static or dynamic
It can be public or private It contains the network prefix … and the host number

2023 MJ 13
Describe solutions for pharming
Checking the spelling and tone of the email/website Checking the URL attached to a link Scanning
a download with anti-malware Only downloading data / software from trusted sources Never
providing personal details online Install a firewall to check if the website is valid

Describe what is meant by social engineering


Manipulating / deceiving / tricking people … … to obtain data // to force them to make an error

Describe what is meant by access levels

Providing users with different permission for the data Limiting access to reading data limiting the
data that can be viewed Limiting access to editing data // limiting the data that can be deleted /
changed Normally linked to a username

Differences between IPv4 and IPv6


IPv4 is usually written as denary … IPv6 usually written as hexadecimal
IPv4 is separated using dots … Pv6 is separated using colons
IPv4 is 32-bit … IPv6 is 128-bit IPv4 is 4 groups of digits … IPv6 is 8 groups of digits
IPv4 digits are between 0 and 255 … IPv6 digits are between 0000 and FFFF
IPv4 all 0s are displayed … IPv6 can use double colons to replace repeated groups of 0000
IPv4 has fewer available unique addresses ... IPv6 has more available unique addresses

A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to the RAM but
the RAM is full. Page B is not needed immediately. Explain how virtual memory can be used in this
scenario.

●​ Keeping track of the status of each memory location


●​ Managing the movement of data to and from RAM
●​ Checks that processes have enough memory located to them
●​ Makes sure that two processes don’t try to access the same memory location
●​ Manage the transfer of pages between virtual memory and RAM
●​ Allows multitasking

Describe what is meant by managing memory


Keeping track of the status of each memory location Managing the movement of data to and from
RAM Checks that processes have enough memory located to them Makes sure that two processes
don’t try to access the same memory location Manage the transfer of pages between virtual
memory and RAM Allows multitasking
2023 FM 12

Descriptions of malware

Virus • Software/code that replicates • …when the user runs it // with an active host •
Deletes/damages/corrupts data/files // takes up storage/memory space
Worm • Software/code that replicates itself on a network • …without user input // without active
host • Takes-up bandwidth • Deletes/damages/corrupts data/files // takes up storage/memory
space • Opens back doors to computers over the network • Used to deposit other malware on
networked computers
Trojan horse • Software/code that is hidden within other software // Software that is disguised as
authentic software • …when downloaded/installed the other malware/by example it contains is
installed
Adware • Software/code that generates/displays (unwanted) adverts on a user's computer • Some
may contain spyware/other malware • Some when clicked may link to viruses • Reduces device
performance // reduces internet speed • Redirects internet searches/user to fake websites
Ransomware • Software/code that stops a user accessing/using their computer/data • …by
encrypting the data/files/computer • A fee has to be paid to decrypt the data // A fee has to be paid
to 'release' the computer/device/data

Similarities and differences between proxy-server and firewalls:

Similarities
e.g. • Check incoming and outgoing signals // filter traffic
• Store whitelist/blacklist
• Block incoming/outgoing signals
• Both block unauthorised access
• Keep a log of traffic
• Both can be hardware or software (or both)
Differences
e.g. • Proxy can hide user's IP address, firewall does not hide the user's IP address
• Proxy intention is to divert attack from server, firewall is to stop unauthorised access
• Proxy protects a server, firewall protects individual computer
• Proxy examines/processes requests for a website but a firewall does not (checks type of signal) /
/ Proxy processes client-side requests whereas firewall filters packets
• Proxy transmits website data to the user, but a firewall does not (it allows valid signals)
• Proxy allows faster access to a web page using cache, but a firewall does not (allow faster access
or have cache)
• Proxy can hide internal network from internet, but a firewall cannot
Explain how a program will use AI to pathfind through puzzles
• Use machine learning algorithms • Collects data about where it has been • Collect data about
obstacles/problems • Store successful actions • Stores unsuccessful actions • Identify/store
patterns • … to make sure it does not repeat the same incorrect route • … so, it knows how to react
to obstacles next time • …so, it knows what is most likely to work next time

2023 SPECIMEN Paper A


Describe what is meant by a MAC address.

used to identify a device • it is a unique (address) • it is a static address // it does not change • it is
set by the manufacturer • the first part is the manufacturer ID / number / identifies the
manufacturer • the second part is the serial number / ID.

Describe what is meant by a DDoS attack.


• multiple computers are used as bots • designed to deny people access to a website • a large
number / numerous requests are sent (to a server) … • … all at the same time • the server is unable
to respond / struggles to respond to all the requests • the server fails / times out as a result.

Describe the purpose of the control unit (CU) within a computer with Von Nueman architecture

• It sends control signals • … that manage the transfer of data and instructions within the CPU • It
decodes an instruction • … using an instruction set

Describe what is meant by a character set.


• All the characters and symbols that can be represented by a computer system. • Each character
and symbol is assigned a unique value.
Why does unicode symbol take more space
Each character is encoded using more bits.

Diagram of virtual memory


A student is using software to create 3D models. This process often requires the use of virtual
memory. Explain why virtual memory is needed for this process.
• to extend the RAM capacity • … to stop the 3D modelling software from freezing/crashing when
the physical RAM is full • to allow the computer to process the large amount of data required for 3D
modelling.

Describe the process of SSL and explain how it provides a secure connection.
• SSL is a (security) protocol. • It encrypts any data that is sent. • It uses/sends digital certificates …
• … which are sent to the (buyer’s/user’s) browser // requested by the (buyer’s/user’s) browser • …
that contains the gallery’s public key • … that can be used to authenticate the gallery. • Once the
certificate is authenticated, the transaction will begin.

2023 SPECIMEN PAPER B

The laptop has a central processing unit (CPU) that performs the fetch–decode–execute cycle. The
CPU has several components, including the memory data register (MDR) and the arithmetic logic
unit (ALU). Describe how the MDR and the ALU are used in the fetch–decode–execute cycle.

• Data fetched from RAM is stored in the MDR


• Data from MDR is sent to ALU to be executed
• ALU performs calculation and logical operations on data
• ALU has a built-in register ... • ... where it stores interim results of calculations
• After calculations, ALU sends data to MDR
• Data is sent from MDR to be written to RAM
How to protect against Virus:
Anti-Malware/virus:• Scans the computer system (for viruses) • Has a record of known viruses •
Removes/quarantines any viruses that are found • Checks data before it is downloaded • … and
stops download if virus found/warns user may contain virus
Firewall:• Monitors traffic coming into and out of the computer system • Checks that the traffic
meets any criteria/rules set • Blocks any traffic that does not meet the criteria/rules set // set
blacklist/whitelist
How to protect against Hacking:
• Firewall: • Monitors traffic coming into and out of the computer system • Checks that the traffic
meets any criteria/rules set • Blocks any traffic that does not meet the criteria/rules set // set
blacklist/whitelist
• Passwords: • Making a password stronger // by example • Changing it regularly • Lock out after
set number of attempts // stops brute force attacks // makes it more difficult to guess
• Biometrics: • Data needed to enter is unique to individual • … therefore it is very difficult to
replicate • Lock out after set number of attempts
• Two-step verification: • Extra data is sent to device, pre-set by user • … making it more difficult for
hacker to obtain it • Data has to be entered into the same system • … so if attempted from a remote
location, it will not be accepted
How to protect against spyware:
Anti - malware/spyware: • Scans the computer for spyware • Removes/quarantines any spyware that
is found • Can prevent spyware being downloaded
Firewall: • Monitors traffic coming into and out of the computer system • Checks that the traffic
meets any criteria/rules set • Blocks any traffic that does not meet the criteria/rules set // set
blacklist/whitelist
Two Step Verification: • Extra data is sent to device, pre-set by user • … making it more difficult for
hacker to obtain it • Data has to be entered into the same system • … so if attempted from a remote
location, it will not be accepted

Describe how virtual memory is created and used:


• The hard drive is partitioned to create virtual memory • When RAM is full • … pages of data that
are not required … • … are transferred from RAM to virtual memory • When the data is required
again the pages are transferred back to RAM

What is digital currency: A currency that exists in electronic form

Describe the process of blockchain in digital currency


• It acts as a ledger • … by tracking each transaction • It keeps a series of time-stamped records • …
that cannot be altered
• A (compression) algorithm is used
• No data is removed in the process // original file can be restored
• Repeated words/symbols (are identified) // Patterns in the data (are identified)
• … and are indexed/put into a table // by example
• … and are replaced with their index // by example
• … and their positions are stored (in the table) // by example
• … and the number of times the word/pattern appears is stored (in the table) // by example

Why an expert system needs knowledge base?


• It needs facts … • … to generate the rules • … to make the decisions // The data it contains is
essential to the decision making process

Describe what is meant by microprocessor


Type of integrated circuit … … that is contained on a single chip

You might also like