Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

Computer science p1 notes with marking schemes

Computer ethics are a concern for any users of the Internet. Identify and describe three
ethical issues that could be a concern when using the Internet.
Virus
• Software/code that replicates
• …when the user runs it // with an active host
• Deletes/damages/corrupts data/files // takes up storage/memory space
Worm
• Software/code that replicates itself on a network
• …without user input // without active host
• Takes-up bandwidth
• Deletes/damages/corrupts data/files // takes up storage/memory space
• Opens back doors to computers over the network
• Used to deposit other malware on networked computers
Trojan horse
• Software/code that is hidden within other software // Software that is
disguised as authentic software
• …when downloaded/installed the other malware/by example it
contains is installed
Adware
• Software/code that generates/displays (unwanted) adverts on a user's
computer
• Some may contain spyware/other malware
• Some when clicked may link to viruses
• Reduces device performance // reduces internet speed
• Redirects internet searches/user to fake websites
Ransomware
• Software/code that stops a user accessing/using their computer/data
• …by encrypting the data/files/computer
• A fee has to be paid to decrypt the data // A fee has to be paid to
'release' the computer/device/data

Identify two similarities and one difference between proxy‑servers and firewalls.
Similarities e.g.
• Check incoming and outgoing signals // filter traffic
• Store whitelist/blacklist
• Block incoming/outgoing signals
• Both block unauthorised access
• Keep a log of traffic
• Both can be hardware or software (or both)
Differences e.g.
• Proxy can hide user's IP address, firewall does not hide the user's IP
address
• Proxy intention is to divert attack from server, firewall is to stop
unauthorised access
• Proxy protects a server, firewall protects individual computer
• Proxy examines/processes requests for a website but a firewall does
not (checks type of signal) // Proxy processes client-side requests
whereas firewall filters packets
• Proxy transmits website data to the user, but a firewall does not (it
allows valid signals)
• Proxy allows faster access to a web page using cache, but a firewall
does not (allow faster access or have cache)
• Proxy can hide internal network from internet, but a firewall cannot

High-level
• Easier for programmer to read/write/understand/edit
• … therefore, the programmer is less likely to make mistakes // can write
in shorter timeframe
• Easier to debug // Easier to find/correct errors
• …so, the programmer can find and correct errors in less time
• Game will be machine independent // Game will be portable (between
hardware)
• …the game can be used on any computer without a need for
understanding of the hardware / compilation for that hardware
• Programmer can focus on the problem instead of the manipulation of
memory/hardware
Low-level
• More memory/RAM efficient
• … 3D graphics will have high memory consumption anyway
• Allows direct manipulation of memory
• … allows for more efficient control/response time
• Allows for use of specialised hardware
Compiler
• Checks all code before executing any code
• Produces error report with all errors found for the whole code (before
translating/running any of the code)
• Produces executable file
Interpreter
• Checks/translates one line of code and then executes it before moving
on to the next line
• Stops when an error is found
• … when corrected the program can be run from the same position //
allows error correction in real time

Give three examples of data that is commonly stored in RAM.


• Currently running data
• Currently running (application) software
• Currently running instructions
• Currently running parts of OS
• Currently running utility software

(c) Describe the purpose of secondary storage.


• For non-volatile/permanent/long-term storage of files/data
• To store data that is not currently required by the CPU
• To store data to transfer it to another computer

Solid-state storage is non-volatile.


This means that the data is not lost when the power is turned off.
Solid-state storage is made of transistors that are laid out in a grid.
Gates are used to control the flow of the electrons through the transistors.
This changes the data in the transistors from 1 to 0, or from 0 to 1.

Serial
• Data arrives in order sent // does not need reordering
• Less likely to experience interference
• … less likely to have errors
• Can transmit over a longer distance (i.e. another room)
• Still fast transmission…
• …sufficient for this purpose
Parallel
• Faster transmission speed than serial
• … faster response to requests
• Very long connection not needed
• …next room is (likely) within distance for parallel
• … unlikely to error/arrive out of sequence/skew
Identify two other functions of a web browser.
• Storing bookmarks/favourites
• Storing history
• Allow multiple tabs/web pages to be open
• Allow movement back and forth between web pages // provides
navigation tools
• Allows the user to enter a URL/IP into the address bar
• Manages HTTP/HTTPS protocol
• Search cache for IP // Request IP from DNS // Send URL to DNS
• Sends a request to the IP address/web server (to obtain the contents
of a web page)
• Runs active script/JavaScript/client-side script
• Allows files to be downloaded from website/internet

Identify two ways that cookies can be used to enhance the user’s experience of this
website
• Storing preferences // so the user does not have to select their
preferences each time they visit the site
• Storing account details // so the user does not have to remember/enter
their username and password each time they visit the site
• Storing recent purchases // to allow the user to quickly re-order more
items
• Storing the pages visited/items selected // to display relevant adverts
• Storing shopping basket // so when the user leaves the site the items
are still in their basket

(i) Describe the characteristics of AI.


• Collects data
• Stores rules for using the data
• The ability to reason
• The ability to learn // uses machine learning
• … by adapting what it does
• … for example, from mistakes to not make them again // result from
previous decisions impacts future
• … by changing its own rules
• …by changing its own data
• …by being trained
• Makes one or more predictions (to make a decision)
• Find/analyse patterns

(ii) Explain how the file is transmitted using packet switching.


Data is broken/split/divided into packets
Each packet (could) take a different route
A router controls the route/path a packet takes
… selecting the shortest/fastest available route/path
Packets may arrive out of order
Once the last packet has arrived, packets are reordered
If a packet is missing/corrupted, it is requested again

(a) Describe what is meant by a low‑level language.


Close to the language processed by computers May use mnemonics An example is
assembly language/machine code

Give two reasons why the programmer would choose to write the computer program
in a low‑level language instead of a high‑level language.
Can directly manipulate the hardware
No requirement for the program to be portable
Program will be more memory efficient
No requirement for a compiler/interpreter
Quicker to execute
Can use specialised hardware

Explain the difference between session cookies and persistent cookies.


Session cookies are stored in memory/RAM
… whereas persistent cookies are stored on the hard drive/secondary storage
When the browser is closed a session cookie is lost
… whereas a persistent cookie is not lost
… until deleted by the user/they expire

(a) State the purpose of a core in the CPU.


To perform a fetch-decode-execute cycle
To process / execute an instruction

What happens when you increase the number of cores?


It may increase the performance
… because more instructions can be processed simultaneously

Address bus
Transmit / carries addresses …
… between components in the CPU
Data bus Transmit / carries data …
… between components in the CPU
Control bus
Transmits control signals …
… from the control unit to other components in the CPU

router a device that forwards packets to their correct destinations in a network


IP address this address is assigned by the network and used to identify a device on a
network
network interface card (NIC) this is a component in a device that enables it to connect to a
network
MAC address this address is assigned by the manufacturer and is used to uniquely identify
the device
firewall // proxy-server this can be hardware or software based and filters traffic coming
into and out of a network

4 A programmer writes a computer program in a high-level language.


(a) Tick (3) one box to show which statement is a benefit of writing a program in a
high-level
language, instead of a low-level language.
A The program can directly manipulate the hardware.
B The program is machine independent.
C The program is more memory efficient.
D The program is quicker to execute.

(b) Translators are used to translate the high-level language so that it can be
processed by the
computer.
(i) State what the high-level language is translated into.
..................................................................................................................................... [1]
(ii) One translator converts and executes the code line by line.
Identify which type of translator would do this.
..................................................................................................................................... [1]
(iii) One translator creates an error report displaying all the errors in the code before
it can
be executed.
Identify which type of translator would do this.
.......................................................................................................................................[1]
(iv) One translator creates an executable file. Identify which type of translator would
do this. .....................................................................................................................................
[1]

4(a) B
4(b)(i) Machine code // low-level language // object code
4(b)(ii) Interpreter
4(b)(iii) Compiler
4(b)(iv) Compiler

Solutions for pharming:


Checking the spelling and tone of the email/website
Checking the URL attached to a link
Scanning a download with anti-malware
Only downloading data / software from trusted sources
Never providing personal details online
Install a firewall to check if the website is valid

Describe what is meant by social engineering. Include one example of social


engineering in your answer
Manipulating / deceiving / tricking people …
… to obtain data // to force them to make an error
Phishing

Describe what is meant by access levels.


Providing users with different permission for the data
Limiting access to reading data limiting the data that can be viewed
Limiting access to editing data // limiting the data that can be deleted / changed
Normally linked to a username

(a) Give one similarity between IPv4 and IPv6.


They can both be used to identify a device (on a network)
They can both be static / dynamic
They are both unique (to a device on a network)
They can both be assigned by a router
They can both be public/private

(b) Describe two differences between IPv4 and IPv6.


IPv4 is usually written as denary
… IPv6 usually written as hexadecimal
IPv4 is separated using dots
… Pv6 is separated using colons
IPv4 is 32-bit
… IPv6 is 128-bit
IPv4 is 4 groups of digits
… IPv6 is 8 groups of digits
IPv4 digits are between 0 and 255
… IPv6 digits are between 0000 and FFFF
IPv4 all 0s are displayed
… IPv6 can use double colons to replace repeated groups of 0000
IPv4 has fewer available unique addresses
... IPv6 has more available unique addresses

(c) A web page is requested using an IP address.


(i) Identify the system that stores a database of uniform resource locators (URLs) and
their
corresponding IP addresses.
..................................................................................................................................... [1]
(ii) Identify the software that sends a request to the IP address to obtain the web page
data.
..................................................................................................................................... [1]

Domain Name Server


Web Browser

A computer has pages A, B and C that are stored in RAM. Page D needs to be sent to
the RAM
but the RAM is full.
Page B is not needed immediately.
Explain how virtual memory can be used in this scenario.
The secondary storage / hard drive can be partitioned to create the virtual memory
… and page B sent to the virtual memory …
… which makes space for page D in RAM
… Once page A / C / D / another page is not required / has been processed
… page B can be sent from the virtual memory back to RAM when it is required

11 Software is installed on a computer to manage files, memory and multitasking.


(a) State the name of the software that can do these tasks.
............................................................................................................................................. [1]
(b) Give one task that the software allows the user to do to manage files.
............................................................................................................................................. [1]
(c) Describe what is meant by managing memory.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(d) A signal is sent within the computer to allow multitasking to occur.
State the name of this type of signal.
............................................................................................................................................. [1]

11(a) Operating system


11(b) Any one from:
Create a file
Copy a file
Open a file
Close a file
Move a file
Delete a file
Rename a file
Save a file
Sort files
11(c) Keeping track of the status of each memory location
Managing the movement of data to and from RAM
Checks that processes have enough memory located to them
Makes sure that two processes don’t try to access the same memory location
Manage the transfer of pages between virtual memory and RAM
Allows multitasking
11(d) Interrupt

• Resistive
• … cheap to manufacture/buy
• … more simple/easier technology to manufacture
• … less affected by weather // more waterproof
• … does not need bare finger // can be pressed with most things
• … screen less likely to shatter/break
• … lower power consumption
• … (can) support multitouch
• Capacitive
• … good visibility in sunlight
• … supports multitouch
• … more longevity
• … faster response times
• … requires less/no pressure
• … high quality image/screen
• … doesn’t need to be calibrated
• … if screen is shattered, it will still register touch
• Infrared
• … good visibility in sunlight
• … supports multitouch
• … does not need bare finger // can be pressed with most things
• … high quality image/screen
• … if screen is shattered, it will still register touch
• … does not need to be calibrated
• … requires less/no pressure
• … faster response times

IP MAC SIMILARITIES
• They are both unique addresses
• They can both be used to identify a device (on a network)
• They are both assigned to hardware
• They can both be represented as hexadecimal

IP MAC DIFFERENCES
• A MAC address is assigned by the manufacturer, whereas an IP address is assigned by
the network/router/ISP
• A MAC address is represented as hexadecimal, whereas an IP address can sometimes be
represented as numeric
• A MAC address is normally static, whereas an IP address can be dynamic
• A MAC address has 6 groups of digits, whereas an IP address has 4/8 groups
• A MAC address is 6 bytes (48 bit), whereas an IP address is 4/16 bytes (32/128 bit)

How parity and ARQ is used together


• Odd or even parity is set/agreed for the data
• A parity bit is added to each byte of data
• … to make the number of 1s match parity
• Data is checked after transmission to see if parity is correct
• ARQ uses acknowledgement and timeout
• If no error is found, a positive acknowledgement is sent to the sender / no
acknowledgement is sent to the sender
• If an error is found, a negative acknowledgement is sent to the sender …
• … that triggers the data to be resent
• When the data is sent, a timer is started
• If an acknowledgement is not received within the time set, the data is resent ...
• … until an acknowledgement is received / resend limit is reached

MAGNETIC STORAGE − Storage device has platters − Platters/disk divided into tracks −
Storage platter / disk is spun − Has a read/write arm that moves across storage media −
Read/writes data using electromagnets − Uses magnetic fields to control magnetic dots of
data − Magnetic field determines binary value
MAGNETIC OVER SSD − Magnetic is cheaper per unit of data − Magnetic has more
longevity // Magnetic can perform more read/write cycles

HOW CHECKSUM WORKS − Sending device creates value from calculation on data // By
example − Value is transmitted with the data − Receiving device performs same calculation
− Values are compared after transmission // If values do not match « − « an error is detected
HIGH LEVEL LANGUAGE ADVANTAGE OVER LOW LEVEL − Closer to English
statements / human language − Easier / quicker to write / read / understand / remember −
Easier / quicker to debug − Less likely to make errors − One line of code can carry out
multiple commands − Portable language

High-level
• Easier for programmer to read/write/understand/edit
• … therefore, the programmer is less likely to make mistakes // can write
in shorter timeframe
• Easier to debug // Easier to find/correct errors
• …so, the programmer can find and correct errors in less time
• Game will be machine independent // Game will be portable (between
hardware)
• …the game can be used on any computer without a need for
understanding of the hardware / compilation for that hardware
• Programmer can focus on the problem instead of the manipulation of
memory/hardware
Low-level
• More memory/RAM efficient
• … 3D graphics will have high memory consumption anyway
• Allows direct manipulation of memory
• … allows for more efficient control/response time
• Allows for use of specialised hardware

examples of data that is commonly stored in RAM.


• Currently running data
• Currently running (application) software
• Currently running instructions
• Currently running parts of OS
• Currently running utility software

purpose of secondary storage.


• For non-volatile/permanent/long-term storage of files/data
• To store data that is not currently required by the CPU
• To store data to transfer it to another computer

an interpreter is mostly used when developing a program and a compiler is used to translate
the final program

• Applications are run on the operating system


• The operating system is run on the firmware
• The bootloader (firmware) is run on the hardware

• Software interrupts include division by zero and two processes trying to access the same
memory location
• Hardware interrupts include pressing a key on the keyboard and moving the mouse

• A router sends data to a specific destination on a network


• A router can assign IP addresses
• A router can connect a local network to the internet

• A network interface card is given a MAC address at the point of manufacture


• MAC addresses are usually written as hexadecimal
• MAC addresses are created using the manufacturer code and the serial code
• An IP address is allocated by the network and they can be static or dynamic

• Secondary storage is not directly accessed by the CPU and is necessary for more
permanent storage of data
• Magnetic storage uses platters which are divided into tracks and sectors. Data is read and
written using electromagnets
• Optical storage uses lasers to create and read pits and lands
• Solid-state (flash memory) uses NAND or NOR technology. Transistors are used as control
gates and floating gates
• Pages of data are transferred between RAM and virtual memory when needed
• Cloud storage can be accessed remotely in comparison to storing data locally
• Physical servers and storage are needed to store data in cloud storage

• An instruction set is a list of all the commands that can be processed by a CPU and the
commands are machine code
• An embedded system is used to perform a dedicated function, e.g. domestic appliances,
cars, security systems, lighting systems or vending machines. This is different to a general
purpose computer that is used to perform many different functions, e.g. a personal computer
(PC) or a laptop

• The CPU processes instructions and data that are input into the computer so that the result
can be output
• A microprocessor is a type of integrated circuit on a single chip
• Compression exists to reduce the size of the file
• The impact of this is, e.g.:
– less bandwidth required
– less storage space required
– shorter transmission time

• Text is converted to binary to be processed by a computer


• Unicode allows for a greater range of characters and symbols than ASCII, including
different languages and emojis
• Unicode requires more bits per character than ASCII
• A sound wave is sampled for sound to be converted to binary, which is processed by a
computer
• The sample rate is the number of samples taken in a second
• The sample resolution is the number of bits per sample
• The accuracy of the recording and the file size increases as the sample rate and resolution
increase
• An image is a series of pixels that are converted to binary, which is processed by a
computer
• The resolution is the number of pixels in the image
• The colour depth is the number of bits used to represent each colour
• The file size and quality of the image increases as the resolution and colour depth increase

• A packet of data contains a – packet header – payload – trailer


• The packet header includes the: – destination address – packet number – originator’s
address
• Data is broken down into packets
• Each packet could take a different route
• A router controls the route a packet takes
• Packets may arrive out of order
• Once the last packet has arrived, packets are reordered

You might also like