OCR Computer Science Paper 1

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/78

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

79 Terms

1
New cards

What is the purpose of systems software?

Software designed to run or maintain a computer

2
New cards

Describe the functionality of systems software.

It controls the operations of computer hardware

3
New cards

What is an operating system?

A piece of software responsible for running the computer, managing hardware, applications, users and resources

4
New cards

What are the 5 things that operating systems are used for?

providing a UI, memory management/multitasking, peripheral management and drivers, user management, file management

5
New cards

What is utility software?

Software designed to help maintain a computer system

6
New cards

What is encryption software?

Software used for encrypting data

7
New cards

What is defragmentation software?

Reorganising data on a hard drive to put broken up files back together and collect up the free space

8
New cards

What is data compression?

The process of making the size of a file smaller

9
New cards

Give the 2 types of backup.

full and incremental

10
New cards

What is Hacking?

Illegal access or attack on a computer network or device

11
New cards

What is malware?

Malicious software created to damage or gain illegal access to computer systems

12
New cards

What is Phishing?

When criminals send emails or text to someone claiming to be a well-known business.

13
New cards

Describe social engineering.

A way of gaining illegal access to data or networks by influencing people.

14
New cards

What is a Brute Force Attack?

A network attack which uses software to crack security passwords through trial and error.

15
New cards

What is a Denial of Service attack?

A network attack which stops users from accessing a part of a network or website.

16
New cards

What is data interception and theft?

When data is intercepted when travelling across a network. This can be done through packet sniffing or having a wireless connection.

17
New cards

What is SQL injection?

A piece of SQL code which can be typed into an input box to try and attack the SQL database

18
New cards

Give an example of a poor network policy.

unencrypted data, no user access levels, no passwords, no anti-malware or firewall software

19
New cards

What is penetration testing?

The process of simulating attacks on a network to identify its weaknesses

20
New cards

What does network forensics involve?

monitoring the traffic on a network

21
New cards

What is a network policy?

A set of rules and procedures an organisation will follow to ensure their network is protected against attacks

22
New cards

What is anti-malware software?

Software designed to stop malware from damaging a computer or network

23
New cards

What is a firewall?

Software that limits access to and from a computer system

24
New cards

Describe user access levels.

Controls what files or areas of the network different groups of users can access

25
New cards

How can a password be made secure?

more varied range of characters

26
New cards

What is encryption?

Coding data so that it can only be decoded with the correct key.

27
New cards

Give examples of network topologies.

star, mesh, bus, tree

28
New cards

What is a star network?

A network topology where all devices are connected to a central switch or server which controls the network

29
New cards

What is a mesh network?

A network topology where every device is directly or indirectly connected to every other without a central switch or server

30
New cards

What is Wi-Fi?

The standard used for wireless connections between devices

31
New cards

What is ethernet?

Network protocol used on LANs

32
New cards

What is an IP address?

A unique identifier given to a device when it accesses an IP network

33
New cards

What is a MAC address?

A unique identifier assigned to a device that cannot be changed.

34
New cards

Give the 7 most common protocols

TCP/IP, HTTP, HTTPS, FTP, POP, IMAP, SMTP

35
New cards

Describe the layering system.

groups of protocols that have similar functions

36
New cards

What is the Application layer?

Turning data into websites and other applications and vice versa.

37
New cards

What is the Transport layer?

Controlling data flow- e.g. splitting data into packets and checking packets are correctly sent and delivered.

38
New cards

What is the Internet layer?

Making connections between networks, directing data packets and handling traffic. Used by routers.

39
New cards

What is the Network layer?

Passing data over the physical network. Responsible for how bits are sent as electrical signals over cables, wireless and other hardware.

40
New cards

What is a packet?

Small, equal-sized units of data used to transfer files over networks

41
New cards

What is packet switching?

The process of directing data packets on a network using routers and the IP protocol.

42
New cards

Name 2 types of network.

LAN WAN

43
New cards

What is LAN?

(Local area network) A network which only covers a single site

44
New cards

What is WAN?

(wide area network) A network which connects networks in different geographical locations

45
New cards

Give some factors that might affect the performance of a network.

Bandwidth, number of users, wired connection, hardware, network topology

46
New cards

What is a client-server network?

A type of network managed by a server, which takes requests from client devices

47
New cards

What is a peer-peer network?

A network in which all devices are equal and connect directly to each other

48
New cards

Give 4 required pieces of hardware used to connect standalone computers to a LAN.

WAP, routers/switches, NIC, transmission media

49
New cards

What is the internet?

A worldwide collection of computer networks

50
New cards

Name the 3 computer networks that make up the internet.

DNS, hosting, the cloud

51
New cards

What is DNS?

(domain name server) A server which stores website domain names and their IP addresses

52
New cards

What does hosting mean?

When a business uses its servers to store the files of another organisation

53
New cards

What is the cloud?

The use of the internet to store files and provide software

54
New cards

What is a virtual network?

A software-based network that exists between devices on a physical network

55
New cards

What is secondary storage?

external data storage used to store data so that the computer can be switched off.

56
New cards

Why is capacity important?

To aid in the choice of media

57
New cards

How could you estimate the required capacity?

By adding together the file sizes for all the files that need to be stored.

58
New cards

Name 3 common types of storage.

optical, magnetic, solid state

59
New cards

State the 6 characteristics when choosing suitable storage devices.

capacity, speed, portability, durability, reliability, cost.

60
New cards

What is the difference between RAM and ROM?

RAM is volatile-temporary, ROM is non-volatile- permanent

61
New cards

What is the purpose of ROM in a computer system?

Tells the CPU how to boot up (BIOS)

62
New cards

What is the purpose of RAM in a computer system?

Main memory which stores data, programs and the OS while in use.

63
New cards

What is virtual memory?

A section of the hard disc used as if it were RAM to supplement the amount of main memory available to the computer

64
New cards

What is flash memory?

Very common form of personal portable file storage

65
New cards

Give examples of flash memory.

USB drive, SD card, SSD

66
New cards

What is the purpose of the CPU?

The brain of the computer which processes all data and instructions

67
New cards

Name 4 parts of Von Neumann architecture.

MAR MDR PC Accumulator

68
New cards

What is the MAR?

Holds any memory address about to be used by the CPU

69
New cards

What is the MDR?

Holds actual data or instruction. Either fetched or written to memory

70
New cards

What is the PC?

Holds the memory address of the instruction for each cycle

71
New cards

What is the Accumulator?

Stores intermediate results of calculations in the ALU

72
New cards

Name 3 common CPU components.

CU ALU Cache

73
New cards

What is the function of the ALU?

Does all of the mathematical calculations

74
New cards

What is the function of the CU?

Overall control, controls data, follows FDE cycle

75
New cards

What is Cache?

Very fast memory close to the CPU, stores regular data, cache always checked first

76
New cards

How does the CPU function?

FDE cycle

77
New cards

Name 3 things that affect the performance of a CPU.

Clock speed, cache size, number of cores

78
New cards

What is an embedded system?

Computers that are built into other devices. Control systems, dedicated tasks

79
New cards

Give examples of embedded systems.

Dishwasher, microwave, TV