Download as pdf
Download as pdf
You are on page 1of 4
(iii) The company uses parallel half-d lex data transmission to trans New videos to the web server. "= eee xslin why parallel halt duplex data transmission isthe most appropriate method : Fasellel. Las. Fasctere. oasealeGlone wo thathan dont be.typlaaded. sed. oo west....oct! He. Sanne. a (ce) The company is concemed about a distibuled denial of service (DDoS) attack, (i) Describe what is meant by a DDoS attack. (li) Suggest one security device that can be used to help prevent a DDoS attack. Treswsal [Tum over ovcies 20 o47aouser23 Scanned with CamScanner 6 Robots are used in a factory to build cars. (a) One characteristic of a robot is its mechanical structure. State two other characteristics of a robot. clerical. ComoancalS (b) Suggest two advantages of using robots, instead of humans, to build cars in the factory. A \ cat. Wacnaseod - 2 7 The Unicode character set is used to represent text that is typed into a computer. {a)_ Describe what is meant by a character set. 4 MIN OS Vala... aa, claatacteli Aics.. (b) One disadvantage of using the Unicode character set, instead of the ASCII character set, is that the text stored takes up more storage space. Give one reason why it takes up more storage space. Eel. check set 15 cuccned Scanned with CamScanner 10 8 (a) Draw a diagram to represent how wrtual memory is created and used _ AID. vidlisa lnon) | \ v oanclatn (4) {b) A student is using sofware to create 3D models. This process often requires the use of virtual memory. Explain why virtual memory is needed for this process. EMA Rowey....G.% pacity. 1as. Shaing waver... Qter.16. Lol. oe oy wee coureren Acolkk ek AN aS valay ANON. ovanme erecvoray Scanned with CamScanner 10 " Complete the sentences about symmetric encryption. Use the terms from the list. ‘Some of the terms in the list will not be used. You should only use a term once. algorithm cipher copied delete key plain private public ‘standard stolen understood unreadable The data before encryption is known as .. To scramble the data, an encryption Cin ‘The data after encryption is known as ..... text. Encryption prevents the data from being .....VAAN.£.6.¢A tulale. by a hacker. ro An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on Describe the process of SSL and explain how it provides a secure connection. . = tal. “cotibeate.. ou _ oi sl - (Gus 24. Met. Balsie. Meat. As. gull Ahad Ale... Losithe. 5s. safe. omee...cont cated @uCLES 2020 on7eio1isPr23 Scanned with CamScanner

You might also like