IB Computer Science Paper 1 (Topic 1, 2, 3, 6, 7)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/424

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:51 PM on 4/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

425 Terms

1
New cards

Identify the functions of an operating system.

(1) Process management - allocates CPU time and manages running processes; (2) Memory management - allocates and deallocates RAM; (3) File system management - organizes and controls access to files; (4) Device management - controls peripherals using drivers; (5) Security management - manages authentication and access rights; (6) User interface provision - CLI or GUI; (7) Interrupt handling - manages hardware/software interrupts.

2
New cards

What is process management in an operating system?

Process management is the function of the OS that creates, schedules, suspends, resumes and terminates processes while allocating CPU time efficiently (e.g., via scheduling algorithms).

3
New cards

What is memory management in an operating system?

Memory management allocates RAM to processes, prevents unauthorized access between processes, manages virtual memory and handles paging/swapping.

4
New cards

What is file system management?

The OS function that organizes files into directories, manages file storage, naming, permissions and access control.

5
New cards

What is device management?

The OS controls hardware devices through drivers and manages input/output operations between hardware and software.

6
New cards

What is interrupt handling?

Interrupt handling allows the OS to respond to hardware or software signals that require immediate CPU attention (e.g., I/O completion, timer interrupts).

7
New cards

Explain one benefit of using a dedicated operating system instead of a generic operating system.

A dedicated OS is optimized for a specific task, resulting in improved performance, reduced resource usage, better security, greater reliability, fewer background processes, lower attack surface, and more predictable behavior (important in real-time/control systems).

8
New cards

What are advantages of a dedicated operating system in embedded or control systems?

(1) Optimized for specific hardware, (2) Faster boot time, (3) Lower memory usage, (4) Increased security due to limited features, (5) Greater stability, (6) Reduced power consumption, (7) More reliable real-time performance.

9
New cards

What are disadvantages of a dedicated operating system?

(1) Limited flexibility, (2) Less compatible with third-party software, (3) Harder to update/upgrade, (4) Higher development cost.

10
New cards

Explain how sensors and microprocessors maintain a constant temperature in a smart house.

A temperature sensor measures the current temperature and sends analog data to an ADC. The microprocessor compares the measured value to a preset target temperature. If there is a difference (error), the processor sends signals to an actuator (air conditioning unit). The system uses feedback in a closed-loop control system to continuously adjust output until the error is minimized.

11
New cards

What is a sensor in a control system?

A sensor is an input device that detects physical quantities (temperature, pressure, light) and converts them into electrical signals.

12
New cards

What is an actuator?

An actuator is an output device that converts electrical signals into physical action (e.g., turning on air conditioning, opening a valve).

13
New cards

What is a microprocessor's role in a control system?

The microprocessor processes sensor input, compares it to desired values, calculates error, and sends control signals to actuators.

14
New cards

What is a closed-loop control system?

A control system that uses feedback from sensors to compare actual output with desired output and automatically adjust to reduce error.

15
New cards

What is an open-loop control system?

A control system that does not use feedback; output is not adjusted based on actual result.

16
New cards

What is feedback in a control system?

Feedback is information about the system's output that is returned to the controller to reduce error.

17
New cards

What is the error value in a control system?

Error = Desired value (set point) − Actual measured value.

18
New cards

What is a set point?

The target or desired value a control system attempts to maintain (e.g., 22°C).

19
New cards

Why is ADC needed in temperature control systems?

Sensors often produce analog signals; the ADC (analogue to digital converter) converts them into digital signals the microprocessor can process.

20
New cards

What is the difference between analog and digital signals?

Analog signals are continuous; digital signals are discrete binary values.

21
New cards

Contrast centralized and distributed air conditioning control systems.

Centralized system: One main controller manages entire system; simpler design; single point of failure; less flexible; easier maintenance. Distributed system: Multiple controllers operate independently; more fault-tolerant; scalable; faster localized responses; more complex coordination; higher implementation cost.

22
New cards

What is a centralized control system?

A system where one central controller manages all sensors and actuators.

23
New cards

Advantages of centralized control systems

Simpler architecture, easier monitoring, lower hardware cost, easier data aggregation.

24
New cards

Disadvantages of centralized control systems

Single point of failure, scalability issues, possible slower response, higher network dependency.

25
New cards

What is a distributed control system (DCS)?

A system where multiple controllers manage different parts independently but communicate with each other.

26
New cards

Advantages of distributed control systems

Improved reliability (no single point of failure), scalable, faster local response, modular design, better fault isolation.

27
New cards

Disadvantages of distributed control systems

More complex design, higher cost, synchronization challenges, more maintenance.

28
New cards

Why are distributed systems often used in smart homes or industrial environments?

They improve fault tolerance, scalability, and allow independent operation if one controller fails.

29
New cards

What is fault tolerance?

The ability of a system to continue operating correctly even if part of it fails.

30
New cards

Why is real-time processing important in temperature control systems?

Real-time processing ensures sensor input is processed immediately so corrective action occurs without delay, preventing temperature overshoot or instability.

31
New cards

What is a real-time operating system (RTOS)?

An OS designed to process data and respond within strict timing constraints.

32
New cards

Why would an RTOS be suitable for a smart home temperature system?

It guarantees predictable response times, ensuring stable temperature regulation.

33
New cards

What is multitasking in an operating system?

The ability to run multiple processes seemingly simultaneously by allocating CPU time slices.

34
New cards

Why is multitasking necessary in smart home systems?

The system must manage air conditioning, alarms, surveillance and user inputs concurrently.

35
New cards

Identify two roles that a computer can perform in a network.

A computer in a network can act as: (1) Client - requests services/resources; (2) Server - provides services/resources; (3) Peer - acts as both client and server in P2P networks; (4) Gateway - connects different networks; (5) Proxy server - acts as intermediary for requests.

36
New cards

What is a client in a network?

A client is a computer that requests services, resources or data from a server.

37
New cards

What is a server?

A server is a computer that provides resources, services or data to clients over a network.

38
New cards

What is a peer-to-peer (P2P) network?

A network where each computer can act as both client and server without centralized control.

39
New cards

What is a gateway in networking?

A device that connects two different networks, often translating between protocols.

40
New cards

What is a proxy server?

A server that acts as an intermediary between a client and another server, often for security or caching.

41
New cards

Define the term "data packet."

A data packet is a unit of data formatted for transmission across a network. It contains a header (source address, destination address, sequence number, error checking) and payload (actual data).

42
New cards

What information is contained in a packet header?

Source IP, destination IP, sequence number, protocol information, error-detection data (checksum).

43
New cards

Why are packets used in networking?

They allow large data to be broken into smaller units, enabling efficient routing, error handling, and reassembly.

44
New cards

What is packet switching?

A method of transmitting data where packets travel independently through different routes and are reassembled at the destination.

45
New cards

Identify two reasons why fibre optic cable would be preferred over wireless connectivity.

Fibre optic is preferred because: (1) Higher bandwidth; (2) Faster transmission speed; (3) Lower latency; (4) More secure (harder to intercept); (5) Less interference; (6) More reliable over long distances.

46
New cards

What are advantages of fibre optic cables?

High speed, high bandwidth, low signal degradation, immunity to electromagnetic interference, secure transmission.

47
New cards

What are disadvantages of fibre optic cables?

Higher installation cost, fragile cables, complex installation.

48
New cards

What are advantages of wireless connectivity?

Mobility, easy installation, lower initial infrastructure cost.

49
New cards

What are disadvantages of wireless connectivity?

Interference, lower security, limited range, lower bandwidth compared to fibre.

50
New cards

Describe one method of implementation for a new computer system.

Implementation methods include: (1) Direct changeover - old system replaced immediately; (2) Parallel running - both systems run simultaneously; (3) Phased implementation - system introduced in stages; (4) Pilot running - introduced in one location first.

51
New cards

What is direct changeover?

The old system is immediately replaced by the new system; fast but high risk.

52
New cards

What is parallel running?

Both systems operate together until the new system is proven reliable; low risk but expensive.

53
New cards

What is phased implementation?

System introduced in stages; reduces risk but takes time.

54
New cards

What is pilot implementation?

System tested in one department/location before full rollout.

55
New cards

Outline one method of collecting information from stakeholders concerning requirements for a new system.

Methods include: (1) Interviews; (2) Questionnaires; (3) Observation; (4) Document analysis; (5) Workshops/focus groups; (6) Prototyping.

56
New cards

What are advantages of interviews?

Detailed responses, clarification possible, in-depth understanding.

57
New cards

What are advantages of questionnaires?

Cost-effective, large audience, quantitative analysis.

58
New cards

What is observation in requirements gathering?

Watching users perform tasks to identify system needs.

59
New cards

What is prototyping?

Creating an early model of the system to gather user feedback.

60
New cards

Identify two reasons why patches may be necessary for an operating system.

Patches are necessary to: (1) Fix security vulnerabilities; (2) Fix software bugs; (3) Improve performance; (4) Add compatibility; (5) Improve stability.

61
New cards

Identify two methods used to obtain operating system patches.

(1) Automatic updates via internet; (2) Manual download from vendor website; (3) Update via installation media; (4) Network administrator deployment.

62
New cards

What is a software patch?

A software update designed to fix bugs, vulnerabilities or improve functionality.

63
New cards

Why are security patches important?

They protect systems from malware, hacking and data breaches.

64
New cards

Why is hexadecimal used in computing?

It provides a compact representation of binary numbers (1 hex digit = 4 bits).

65
New cards

Define the term peripheral.

A peripheral is any external device connected to a computer that provides input, output, or storage but is not part of the core CPU or memory.

66
New cards

What are types of peripherals?

Input devices (keyboard, mouse), Output devices (monitor, printer), Storage devices (external HDD), Communication devices (network card).

67
New cards

Identify two features of a graphical user interface (GUI).

GUI features include: (1) Windows; (2) Icons; (3) Menus; (4) Pointer; (5) Scroll bars; (6) Toolbars; (7) Dialog boxes.

68
New cards

What is WIMP in GUI design?

Windows, Icons, Menus, Pointer.

69
New cards

Identify one common feature in application software to improve usability.

Common usability features include: (1) Help menu; (2) Tooltips; (3) Consistent layout; (4) Undo/redo; (5) Keyboard shortcuts; (6) Search function; (7) Error messages.

70
New cards

What is usability?

The degree to which software is easy, efficient and satisfying to use.

71
New cards

What are usability principles?

Consistency, feedback, simplicity, error prevention, accessibility.

72
New cards

What are basic logic gates?

AND, OR, NOT, NAND, NOR, XOR.

73
New cards

What is an AND gate?

Outputs 1 only if all inputs are 1.

74
New cards

What is an OR gate?

Outputs 1 if at least one input is 1.

75
New cards

What is a NOT gate?

Inverts input (0→1, 1→0).

76
New cards

What is NAND?

NOT(AND); outputs 0 only if all inputs are 1.

77
New cards

What is NOR?

NOT(OR); outputs 1 only if all inputs are 0.

78
New cards

What is XOR?

Outputs 1 if inputs are different.

79
New cards

What is Boolean algebra?

A mathematical system used to represent and simplify logic expressions using AND, OR, NOT operations.

80
New cards

Describe two hardware components needed to implement a wireless network.

A wireless network requires: (1) Wireless Access Points (WAPs) to transmit/receive Wi-Fi signals; (2) Wireless Network Interface Cards (NICs) in devices; (3) A router to manage traffic between networks; (4) Switches to connect wired infrastructure; (5) A modem for internet access; (6) Firewalls for security.

81
New cards

What is a Wireless Access Point (WAP)?

A device that allows wireless devices to connect to a wired network using Wi-Fi.

82
New cards

What is a wireless NIC?

A wireless network interface card is a hardware component that enables a device to connect to a wireless network.

83
New cards

What is the function of a router in a wireless network?

It routes data packets between networks and assigns IP addresses (via DHCP).

84
New cards

What is a network switch?

A device that connects multiple devices in a LAN and forwards data using MAC addresses.

85
New cards

Identify two advantages of a wireless network for students.

Advantages include: (1) Mobility — access network anywhere on campus; (2) Convenience — no physical cables required; (3) Supports BYOD devices; (4) Flexible learning environments; (5) Easier device connectivity.

86
New cards

What are advantages of wireless networks?

Mobility, scalability, easier installation, reduced cabling costs, flexible workspace.

87
New cards

What are disadvantages of wireless networks?

Security risks, interference, lower speed than fibre, signal degradation.

88
New cards

Outline two methods to prevent unauthorized access to wireless data.

Security methods include: (1) Encryption (WPA3/WPA2); (2) Strong authentication/password protection; (3) MAC address filtering; (4) Firewalls; (5) VPN usage; (6) Network monitoring; (7) Two-factor authentication.

89
New cards

What is WPA encryption?

Wi-Fi Protected Access encrypts wireless data to prevent interception.

90
New cards

What is MAC address filtering?

A security measure allowing only approved device MAC addresses to connect.

91
New cards

What is a firewall?

A security system that monitors and controls network traffic based on rules.

92
New cards

What is two-factor authentication (2FA)?

A security method requiring two forms of verification (password + code).

93
New cards

Identify two technologies required to provide a VPN.

A VPN requires: (1) VPN server software; (2) VPN client software; (3) Encryption protocols (IPSec/SSL/TLS); (4) Secure authentication system; (5) Internet connectivity.

94
New cards

What is a VPN?

A Virtual Private Network creates an encrypted tunnel over a public network to securely access a private network.

95
New cards

What encryption protocols are used in VPNs?

IPSec, SSL/TLS, OpenVPN.

96
New cards

Explain one benefit to staff of using a VPN for remote access.

A VPN allows secure remote access to school resources as if the user were on-site, protecting sensitive data through encryption and maintaining confidentiality.

97
New cards

What are benefits of VPN usage?

Secure remote access, data encryption, protects from interception, enables safe public Wi-Fi use.

98
New cards

What are limitations of VPNs?

Reduced speed due to encryption overhead, configuration complexity, cost of maintenance.

99
New cards

Outline one reason why protocols are used in communication.

Protocols ensure standardized communication rules so devices can reliably exchange data, including formatting, error handling, synchronization, and addressing.

100
New cards

What is a network protocol?

A set of agreed rules governing communication between devices.