(iii) The company uses parallel half-d lex data transmission to trans
New videos to the web server. "= eee
xslin why parallel halt duplex data transmission isthe most appropriate method
: Fasellel. Las. Fasctere. oasealeGlone
wo thathan dont be.typlaaded. sed.
oo west....oct! He. Sanne. a
(ce) The company is concemed about a distibuled denial of service (DDoS) attack,
(i) Describe what is meant by a DDoS attack.
(li) Suggest one security device that can be used to help prevent a DDoS attack.
Treswsal
[Tum over
ovcies 20 o47aouser23
Scanned with CamScanner6 Robots are used in a factory to build cars.
(a) One characteristic of a robot is its mechanical structure.
State two other characteristics of a robot.
clerical. ComoancalS
(b) Suggest two advantages of using robots, instead of humans, to build cars in the factory.
A \ cat. Wacnaseod
- 2
7 The Unicode character set is used to represent text that is typed into a computer.
{a)_ Describe what is meant by a character set.
4 MIN OS Vala...
aa, claatacteli Aics..
(b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is
that the text stored takes up more storage space.
Give one reason why it takes up more storage space.
Eel. check set 15 cuccned
Scanned with CamScanner10
8 (a) Draw a diagram to represent how wrtual memory is created and used
_ AID.
vidlisa lnon) |
\ v oanclatn
(4)
{b) A student is using sofware to create 3D models. This process often requires the use of
virtual memory.
Explain why virtual memory is needed for this process.
EMA Rowey....G.% pacity. 1as. Shaing
waver... Qter.16. Lol. oe
oy wee coureren Acolkk ek AN aS valay
ANON.
ovanme erecvoray
Scanned with CamScanner10
"
Complete the sentences about symmetric encryption.
Use the terms from the list.
‘Some of the terms in the list will not be used. You should only use a term once.
algorithm cipher copied delete key plain
private public ‘standard stolen understood unreadable
The data before encryption is known as ..
To scramble the data, an encryption
Cin
‘The data after encryption is known as ..... text.
Encryption prevents the data from being .....VAAN.£.6.¢A tulale. by a hacker. ro
An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on
Describe the process of SSL and explain how it provides a secure connection.
. = tal. “cotibeate.. ou _
oi sl - (Gus 24. Met. Balsie. Meat. As. gull
Ahad Ale... Losithe. 5s. safe. omee...cont
cated
@uCLES 2020 on7eio1isPr23
Scanned with CamScanner