O level Computer
O level Computer
2025 FM 12
State three registers that are found in the Von Neumann architecture
- Accumulator - Current Instruction Register - Program Counter
Purpose Of CPU
- Execute/process instructions and data to produce output
2024 ON 11
Benefits of reducing file size
• The file requires less storage space • Takes less time to transmit
• A lower bandwidth can be used to transmit the file • Less data usage for data allowance
• More likely to meet file size limits set by email clients/apps
Explain the purpose of secondary storage and identify why one is suitable
• To store data/files permanently
• … otherwise, data/programs would need to be downloaded/entered/installed every time the
smartphone was turned on
• To allow software to be downloaded/installed on the smartphone //
• To store user files
• For the creating of virtual memory
SSD IS SUITABLE
• It is small/thin in size
• … so it would fit easily into the smartphone device
• It is lightweight
• … so it wouldn’t make the smartphone heavy to carry
• It has no moving parts
• … so it would be durable/robust
• … if the smartphone is dropped the data is less likely to be damaged/lost
• It has fast read/write speeds
• … so it would be quick to load files/software
• It runs at a cool temperature
• … so it wouldn’t make the smartphone hot to hold for the user
• It doesn’t make a lot of noise
• … so it wouldn’t ruin the user’s experience of listening to music/watching videos
• It doesn’t require much power
• … so it won’t drain the battery
• It can have a large storage capacity
• … so can store files that are multimedia
Benefits of assembly
More control over manipulating the hardware • Faster execution for testing than a high-level
language • They can use machine specific instructions
Benefits
• No need to maintain the hardware • … the third party is responsible for maintaining the hardware /
security of the data
• Resources can be increased / decreased (on demand) // Can have unlimited storage capacity
• … no need to worry about running out of storage space • … can save cost of purchase of hardware
• Need less/no (secondary) storage space on the watch • … watch can remain/is small in size • …
costs of watch can be kept lower
• Can access the data from other/any devices • … if the watch breaks/is lost data is still available
Disadvantages:
− Internet connection is needed/needs to be stable … − … and if this is not available/unstable the
data cannot be accessed − Employees could be pressured to work outside of hours … − … as they can
access the data from any location
2024 ON 13
Advantages of unicode
• It can represent more characters • It can represent emojis/symbols • It can represent more
languages
• Symmetric uses one/public key whereas asymmetric uses two/public and private keys • Symmetric
can send the key with the data whereas asymmetric does not • Symmetric decrypts the data using
the same key whereas asymmetric decrypts the data using a different key • Symmetric is less secure
than asymmetric
Diagram of data decoded once fetched in MDR
• It receives data from the sensor • It analyses the data // It checks if the data is within/out of a
range // • It sends signals to trigger actions based on the data
Use of cookies:
• User preferences // by example • Login details • Payment details • User’s personal details e.g.
address • Contents of a shopping cart • Targeted advertising
Purposes of IDE
• It is a piece of software • … used to write/develop/edit code • … used test/debug the code • … with
features such as auto-completion // any suitable example • To translate the code to low level
language/machine code
2024 MJ 11
Characteristics of robot
It has a mechanical structure/framework It has electrical components It is programmable It can
move
Error detection methods: Echo check Checksum Even parity check Negative ARQ
How firewall protects:
Criteria can be set (for traffic) … such as a blacklist/whitelist (of IP addresses) It will examine
traffic coming into the network It will check that the traffic meets the set criteria … and will reject
it if it does not meet criteria Certain ports used by hackers can be blocked/closed
2024 MJ 12
Instruction set: A list of machine code commands that can be processed by CPU
Diagram of DDoS
What is meant by AI
The simulation of intelligent behaviours by computers A collection of data and the rules for using
that data Has the ability to reason Has the ability to learn/adapt
2024 MJ 13
Purpose of ALU:
● To execute instructions
● To perform calculations // by example
● To perform logical operations // by example
● To store interim results of calculations
● Stores/reads/writes data to/from the accumulator
2024 FM 12
Explain how the word “RED” can be represented by character set
• Unique binary/denary number given/stored for each character • The code for R is stored, then the
code for E then D in sequence
Explain how the processor manages the current program and the interrupt
• Interrupt is given priority • …and placed in interrupt queue • Processor finishes current FE cycle
for program • Processor checks interrupt priority queue // processor checks for higher priority
interrupt than program/process • If lower priority processor runs next FDE cycle for
program/process // if lower priority processor continues with program/process • (if higher priority)
processor stores current process/registers on stack • Checks source of interrupt • … and calls the
appropriate ISR • ISR handles/resolves interrupt • If there is another higher priority interrupt (than
process) then repeat • … (otherwise) processor retrieves content of stack/registers/previous process
(to continue with process from program)
Diagram of the process of user entering URL to web browser and displaying iti
Some digital currencies have digital ledgers called a blockchains. These are decentralised
databases where each transaction is stored as a new set of data with a time-stamp and is linked to
the previous set of data. This means that transactions cannot be altered, only new transactions
added, which allows the location of the data to be traced.
2023 ON 11
Diagram of firewall
2023 ON 12
Characteristics of embedded system:
− Performs a single/limited/dedicated function/task − It has a microprocessor − It has dedicated
hardware − Uses firmware − It is normally built into a larger device/system − User normally cannot
reprogram − It does not require much power − It is cheap to manufacture − Works automatically //
works without human intervention − It is small (in size) − It is a real-time system
Describe what is meant by sample resolution
− The number of bits that are used per sample − … that provides the variation in amplitude that can
be stored for each sample // defines the number of different amplitudes that can be recorded − …
that determines how quiet/loud the sounds are that can be recorded − Example e.g. 16-bit
Diagram of cyber security threat of data interception
2023 ON 13
Define image resolution: − The dimensions of an image // Number of pixels wide by number of pixels
high
Define image color depth: − The number of bits used to represent each/a colour
Role of router
Differences between primary and secondary
− Primary storage is directly accessible by the CPU − … whereas secondary storage is not directly
accessible by the CPU − Primary storage stores the data that is currently in use/for booting the
system − … whereas secondary storage stores user’s files/data/operating system/application
software − Primary storage normally has a small capacity − … whereas secondary storage normally
has a larger capacity − Some parts of primary storage are volatile − … whereas secondary storage is
non volatile − Some parts of primary storage the data cannot be changed − … whereas data in
secondary storage can be changed − Primary storage has faster access speeds to data − … whereas
secondary storage has slower access speeds to data
Why?
Steal/view/access data Delete data Change data Lock account // Encrypt data Damage
reputation of a business
Security solutions:
Two-step verification//Two-factor authentication//by example Biometrics Firewall // Proxy-server
Strong/complex password // by example Setting a limit for login attempts Drop-down boxes
Request for partial entry of password
2023 MJ 12
Describe how compiler translates a computer program and how it report errors
It translates the (high-level language) to low-level language/object code/machine code It
translates all the code before it is executed It creates an executable file
It creates an error report after trying to compile … displaying all errors in the code … that require
correction before execution can take place
Process of DDos
Aim of Ddos and solutions:
Aim: Revenge To affect a company’s reputation Entertainment value To demand a ransom to stop
it To test a system’s resilience
Solution: proxy and firewall
Any FOUR from: It is denary based … with numbers between 0 and 255 It is 32 bits 4 sets/groups
of numbers … separated by dots Any TWO from: It is a unique address It can be static or dynamic
It can be public or private It contains the network prefix … and the host number
2023 MJ 13
Describe solutions for pharming
Checking the spelling and tone of the email/website Checking the URL attached to a link Scanning
a download with anti-malware Only downloading data / software from trusted sources Never
providing personal details online Install a firewall to check if the website is valid
Providing users with different permission for the data Limiting access to reading data limiting the
data that can be viewed Limiting access to editing data // limiting the data that can be deleted /
changed Normally linked to a username
A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to the RAM but
the RAM is full. Page B is not needed immediately. Explain how virtual memory can be used in this
scenario.
Descriptions of malware
Virus • Software/code that replicates • …when the user runs it // with an active host •
Deletes/damages/corrupts data/files // takes up storage/memory space
Worm • Software/code that replicates itself on a network • …without user input // without active
host • Takes-up bandwidth • Deletes/damages/corrupts data/files // takes up storage/memory
space • Opens back doors to computers over the network • Used to deposit other malware on
networked computers
Trojan horse • Software/code that is hidden within other software // Software that is disguised as
authentic software • …when downloaded/installed the other malware/by example it contains is
installed
Adware • Software/code that generates/displays (unwanted) adverts on a user's computer • Some
may contain spyware/other malware • Some when clicked may link to viruses • Reduces device
performance // reduces internet speed • Redirects internet searches/user to fake websites
Ransomware • Software/code that stops a user accessing/using their computer/data • …by
encrypting the data/files/computer • A fee has to be paid to decrypt the data // A fee has to be paid
to 'release' the computer/device/data
Similarities
e.g. • Check incoming and outgoing signals // filter traffic
• Store whitelist/blacklist
• Block incoming/outgoing signals
• Both block unauthorised access
• Keep a log of traffic
• Both can be hardware or software (or both)
Differences
e.g. • Proxy can hide user's IP address, firewall does not hide the user's IP address
• Proxy intention is to divert attack from server, firewall is to stop unauthorised access
• Proxy protects a server, firewall protects individual computer
• Proxy examines/processes requests for a website but a firewall does not (checks type of signal) /
/ Proxy processes client-side requests whereas firewall filters packets
• Proxy transmits website data to the user, but a firewall does not (it allows valid signals)
• Proxy allows faster access to a web page using cache, but a firewall does not (allow faster access
or have cache)
• Proxy can hide internal network from internet, but a firewall cannot
Explain how a program will use AI to pathfind through puzzles
• Use machine learning algorithms • Collects data about where it has been • Collect data about
obstacles/problems • Store successful actions • Stores unsuccessful actions • Identify/store
patterns • … to make sure it does not repeat the same incorrect route • … so, it knows how to react
to obstacles next time • …so, it knows what is most likely to work next time
used to identify a device • it is a unique (address) • it is a static address // it does not change • it is
set by the manufacturer • the first part is the manufacturer ID / number / identifies the
manufacturer • the second part is the serial number / ID.
Describe the purpose of the control unit (CU) within a computer with Von Nueman architecture
• It sends control signals • … that manage the transfer of data and instructions within the CPU • It
decodes an instruction • … using an instruction set
Describe the process of SSL and explain how it provides a secure connection.
• SSL is a (security) protocol. • It encrypts any data that is sent. • It uses/sends digital certificates …
• … which are sent to the (buyer’s/user’s) browser // requested by the (buyer’s/user’s) browser • …
that contains the gallery’s public key • … that can be used to authenticate the gallery. • Once the
certificate is authenticated, the transaction will begin.
The laptop has a central processing unit (CPU) that performs the fetch–decode–execute cycle. The
CPU has several components, including the memory data register (MDR) and the arithmetic logic
unit (ALU). Describe how the MDR and the ALU are used in the fetch–decode–execute cycle.