AS CS Long Answer Questions (Revision) #1 Flashcards

(91 cards)

1
Q

Compare vector graphics and bitmap images — describe all key differences.

A

• Bitmap is made up of pixels — colours are stored for each individual pixel; Vector graphic stores a set of mathematical equations / instructions about how to draw the shapes.
• When a bitmap is enlarged the pixels get bigger and it pixelates; when a vector is enlarged it is recalculated and does not pixelate.
• Bitmap files are usually bigger because of the need to store data about each pixel; Vector graphics have a smaller file size as they only store instructions/commands.
• Bitmap images can be compressed with significant reduction in file size; Vector graphic images do not compress well because of little redundant data.
• Vector graphics are less realistic (made of geometric shapes); bitmap images are realistic (pixel-level detail).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how lossy compression works and the specific methods used on images.

A

General principle: Data is permanently deleted; the file cannot be restored to its exact original state. The algorithm removes unnecessary data that would not drastically affect perceived quality.

Specific lossy methods for images:
1. Reduce bit depth — reduces the number of bits per colour/pixel, so each pixel has fewer bits.
2. Reduce colour palette (reduce number of colours) — fewer colours mean fewer bits needed to store each colour.
3. Reduce image resolution — fewer pixels per unit measurement means less binary data to store.

Audio lossy: Removes sounds outside the human hearing range and softer sounds masked by louder overlapping sounds (e.g. MP3).
File types: JPEG (images), MP3 (audio), MP4 (video).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Character Set? How are strings converted using the character set?

A

Define character set: A list of all of the characters that can be used/represented by the computer hardware and software. Each character has a unique binary number.
How a string is converted using a character set: The characters are replaced by their binary values when used and is stored in sequence as its binary value using the character set. (answer includes definition + this)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between Image Resolution and Screen Resolution?

A

Image Resolution is the total number of pixels that make up an image (e.g., 4096 × 3192).
Screen Resolution refers to the horizontal and vertical pixels on a screen display, influencing how an image is shown (images may need resizing or cropping to fit screen resolutions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Quantization Error in the context of sound file compression.

A

Quantization Error is the error that occurs when we use a low sample resolution when sampling a sound (decreasing the number of bits used to represent amplitude) OR the sampling rate (decreasing the samples take per second). The higher the sound resolution/sample rate the lower the Quantization Error. It may also occur when compressing a sound file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give the benefits and drawbacks of storing data using cloud computing.

A

Benefits:
• Cloud storage can be free (for small quantities).
• No need for separate (high capacity) storage devices — saves storage on existing devices.
• Can access data from any computer with internet access.
• Most cloud data services will have in-built backup/disaster recovery.
• Security could be better (managed by specialists).
• Can easily increase capacity.
• Data can be easily shared online.

Drawbacks:
• Can only access the cloud with internet access.
• Security may not be strong — no control over security.
• There may not be any backups — no control over backups.
• It can take a long time to upload/download the data.
• It can be more expensive in the long term.
• There could be a limit to the amount of storage unless paid for.
• There could be compatibility/access issues.
• There could be issues with the company offering cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the functions of a Wireless Network Interface Card (WNIC). (Exam)

A

• Provides interface to wireless network — acts as an antenna.
• Receives analogue radio waves and converts them to digital/binary.
• Checks incoming transmissions for the correct MAC/IP address; ignores transmissions not intended for it.
• Encrypts/encodes the outgoing data.
• Decrypts/decodes the incoming data.
• Takes digital/binary input and converts to analogue waves; sends the radio waves via the antenna.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify functions of the router in a network. (Exam)

A

• To receive packets from devices or the Internet.
• To forward/route packets to the destination.
• To find the destination of the packet.
• To assign/allocate private IP addresses to devices on LAN.
• To store/update/maintain a routing table.
• To find the most efficient path to the destination.
• To maintain a table of MAC and IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the role of routers and gateways in a network.

A

Router: Connects two (or more) networks, can connect a network to a WAN, receives packets from the internet and forwards them towards the destination using the IP address of the destination. Assigns private IP addresses to devices on the network. Operates between similar networks (networks using the same protocol)
Gateway: Connects two (or more) networks, can connect a network to a WAN, receives packets from the internet and forwards them towards the destination using the IP address of the destination. Assigns private IP addresses to devices on the network. Assigns private IP addresses. Connects two dissimilar networks (networks that use different protocols)

[Past Exam Q&A adds:]
Additional router functions from exam Q&A:
• To store / update / maintain a routing table
• To find the most efficient path to the destination
• To maintain a table of MAC and IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the drawbacks of the usage of peer-to-peer networks.

A
  1. Reduced security, so the network is only as secure as the weakest computer on the network, and each computer is at risk from viruses from other computers
  2. No central management of backup, if the data from one computer is not backed up it is lost to all of them
  3. No central management of files/software so consistency may be difficult to maintain as each computer may have different software from the others
  4. Individual computers may respond slower because they are being accessed by other computers
  5. To share files all the computers involved need to be switched on so the files may not be always available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Outline the process of setting up and using a peer-to-peer network.

A
  1. Torrent file is made avalible for download.
  2. File to be shared is split into pieces.
  3. BitTorrent client software is made avalible for other peers, allowing them to work as seeds or leeches
  4. A peer can act as a seed when uploading parts of a file.
  5. When a peer is downloading a file it can get parts of the file from different seeds simultaneously.
  6. That peer then becomes a seed for the downloaded parts.
  7. Tracker keeps records of all the peers and the parts of the file they have.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the 6 key terms in the BitTorrent (P2P) process.

A
  1. Peer: Any computer connected to the network.
  2. Swarm: All peers sharing or downloading parts of the same file.
  3. Seed: A peer with 100% of the file.
  4. Leech: A peer with an incomplete file currently downloading from others.
  5. Tracker: Central server storing details and IP addresses of the swarm allowing them to connect.
  6. Torrent File: Created by original peer, cotains metadata (acts as a map to the clients with a specific file).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain why devices connected to a router have only a Private IP address, while the router has a public IP address and a Private IP address.

A
  1. The router needs a public IP address so it can be identified on the Internet
  2. The router needs a private IP address so it can be identified on the home network
  3. The router has a public and a private IP address so that it can route data between the two networks (home and Internet)
  4. The laptop needs a private IP address so it can be identified on the home network
  5. The laptop does not have a public IP address because it does not connect directly to the Internet, this is more secure because it hides the laptop from the outside world, all data from the Internet must be transmitted via the router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A website can be accessed using either the Uniform Resource Locator (URL) or the IP address. Describe how a URL is converted into its matching IP address.

A

Uniform resource locator (URL) is sent to the nearest Domain Name Server. The URL is parsed to obtain the Domain name. DNS has a database that holds a list of Domain names and matching IP addresses. DNS name resolver searches its database for the Domain name. If DNS does not find the Domain name, the request is forwarded to a higher-level DNS. If the Domain name is found, the IP address is returned. If the Domain name is not found, the request is passed to a higher-level server. If the Domain name is finally not found, an error message is generated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Outline the processes and hardware used in cellular networks.

A
  1. Cell towers that are as possible apart, so that land is divided into cells that provide maximum line of sight (maximum connection coverage).
  2. Each tower can recive and transmit data to and from phones through its antenna.
  3. Data transmission is wireless using low power radio frequencies.
  4. Multiple devices can communicate simultaneously to the tower.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List features of Twisted Pair, Coaxial, and Fibre Optic cables.

A

Twisted Pair: Made out of copper wires. Cheapest but lowest data rate and most suceptabile to electromagetic interference.
Coaxial: Copper core with mesh insulation. Better data transfer rates and less susceptible to electromagnetic interference.
Fibre Optic: Glass fibres using light pulses. Highest data transfer rates, lowest attenuation, and are highly resitant to electromagnetic interference. Used to send data over long distances. Disadvantages: High cost and less flexible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe what is meant by a mesh topology.

A
  1. All computers are connected to at least one other device.
  2. There are multiple routes between devices.
  3. The computers can act as relays, passing data packets on towards the final destination.

Key feature: If one route/link goes down, data can be re-routed via alternative paths — the network remains operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the advantages of using a mesh topology instead of a bus topology.

A
  1. If one line (route) goes down there are more routes available.
  2. Improved security as not using one main line.
  3. New nodes can be added without interruption or interfering with other nodes.
  4. Fewer collisions.
  5. More secure as data is sent over a dedicated connection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain the CSMA/CD process steps.

A
  1. Check: Device listens to see if the channel is idle.
  2. Transmit: Sends data if clear.
  3. Detect: If a collision is detected, transmission stops and a jamming signal is sent.
  4. Wait: Both devices wait a random amount of time.
  5. Retry: Transmit again.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the PSTN and what is it based on?

A

Public Switched Telephone Networks consist of many different types of communication lines that allow data to be sent in both directions at the same time.
The communication passes through multiple diferent switching centers before reaching their destination. Modern PTSNs use fiber-optic cabels for faster data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe the principal operations of a magnetic hard disk. (Exam)

A

The hard disk has one or more platters/plates.
• Each surface of the platter/disk is (ferrous oxide which is) capable of being magnetised.
• The platters/disks are mounted on a (central) spindle.
• The entire mechanism is contained inside a sealed (aluminium) box.
• The disks are rotated (at high-speed).
• Each surface of the disk has a read/write head mounted on an arm positioned just above the surface.
• Electronic circuits control the movement of the arm (and hence the heads).
• The surface of the platter/disk is divided into concentric tracks/circles.
• The surface of the platter/disk is divided into sectors.
• One track in one sector is the basic unit of storage called a block.
• The data is encoded as a magnetic pattern for each block.
• When writing to disk: a variation in the current in the head produces a variation in magnetic field on the disk.
• When reading from disk: a variation in magnetic field produces a variation in current through the head.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Explain the three programmable variants of ROM: PROM, EPROM, and EEPROM.

A

• PROM (Programmable ROM): Can be written once only by burning internal fuses with an electric current. Cannot be changed afterwards.
• EPROM (Erasable Programmable ROM): Can be reset and rewritten multiple times using ultraviolet (UV) light. Must be removed from the device to be erased. Must be entirely erased before any rewriting.
• EEPROM (Electrically Erasable Programmable ROM): Can be erased and rewritten using pulsed voltages / electrically. Can be erased in situ (while still in the device). Does not have to be entirely erased before rewriting — individual sections can be updated.

Flash memory is a type of EEPROM specifically engineered for high-density storage (SSDs, memory cards, USB sticks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe the principal operation of a microphone.

A

• The microphone has a diaphragm / ribbon.
• The incoming sound waves cause vibrations of the diaphragm.
• This causes a coil to move past a magnet (dynamic microphone) // changes the capacitance (condenser microphone) // deforms the crystal (crystal microphone).
• An electrical signal (analogue) is produced.
• The analogue signal is then sampled and digitised by an Analogue-to-Digital Converter (ADC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe the physical structure, operation, and performance characteristics of a Hard Disk Drive (HDD).

A
  1. The HDD is a magnetic storage device that uses spinning platters divided into tracks and sectors, rotating at very high speeds.
  2. To access data, the operating system spins the platter and the read-write head moves to the correct track, detecting changes in magnetic fields to represent data.
  3. Performance is affected by latency—the time taken for the correct sector to rotate under the head—and data access is sequential within a given sector.
  4. Over time, files can become fragmented if sectors are not adjacent, which degrades performance unless addressed by defragmentation software.
  5. HDDs are non-volatile secondary storage with larger capacities than RAM, and they can be internal or external/portable via USB for backups.

[Past Exam Q&A adds:]
Read/write mechanism (from exam Q&A):
• When writing to disk: a variation in the current in the read/write head produces a variation in the magnetic field on the disk.
• When reading from disk: a variation in the magnetic field produces a variation in current through the read/write head.
• The hard disk has one or more platters; each surface is ferrous oxide capable of being magnetised.
• The entire mechanism is contained inside a sealed (aluminium) box.
• The surface of the platter is divided into concentric tracks and then into sectors; one track in one sector is the basic unit of storage, called a block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Describe how a single page is printed on a laser printer (7 steps).
1. A laser beam and a rotating mirror are used to draw an image of the page on the photosensitive drum. 2. The image is converted on the drum into an electrostatic charge. 3. Electrostatic charge attracts toner. 4. The charged paper is rolled against the drum. 5. The oppositely charged paper picks up the toner particles from the drum. After picking up the toner, the paper is discharged to stop it clinging to the drum. 6. The paper passes through a fuser, which heats up the paper. The toner melts and forms a permanent image on the paper. 7. The electrical charge is removed from the drum, and the excess toner is collected.
26
Detail the differences between Dynamic RAM (DRAM) and Static RAM (SRAM) regarding construction and performance.
1. DRAM is constructed from transistors and capacitors that require a constant power to retain data, whereas SRAM uses flip-flops to hold each bit of memory. 2. SRAM is significantly faster than DRAM, making SRAM ideal for the memory cache while DRAM is used for main RAM modules. 3. DRAM is volatile, while SRAM is non-volatile 4. DRAM is less expensive to manufacture per unit storage, consumes less power, and has a higher memory capacity, storing more bits per chip than SRAM (higher memory density).
27
Describe the internal operation of a speaker (7 steps).
1. An electric current is sent to the speaker. 2. The electric current passes through the coil. 3. The current in the coil creates an electromagnetic field. 4. Changes in the audio signal cause the direction of the electrical current to change. This determines the polarity of the electromagnet. 5. The electromagnet is repelled by or attracted to the permanent magnet. 6. The movement of the coil causes the diaphragm to vibrate. 7. The vibration creates sound waves.
28
Describe the basic internal operation of a 3D printer works (9 steps).
1. The object is designed in Computer Aided Design (CAD) software. 2. The software splits the object into slices. 3. The data about the slices is sent to the printer. 4. The solid plastic is melted and transferred to the nozzle. 5. A stepper motor moves the nozzle into position. 6. The nozzle extrudes the molten plastic. 7. The steps 5 to 6 repeat until the layer is complete. 8. A fan cools the layer. 9. The steps 4 to 8 are repeated for each subsequent layer.
29
Compare resistive and capacitive touchscreen mechanics.
1. Resistive screens use two layers, seperated by a thin space, that close a circuit when a user presses the top layer and causes the layers to touch. The horizontal and vertical position is transmted to the processor. 2. Capacitive screens use a glass layer that stores charge. A change (decrease) in the electric field is detected when a conductive finger touches the surface. The coordinates where the decrease in charge occurs is calculated and sent to the processor.
30
State the advantages of SSD and HDD.
Hard disk drive (HDD): 1. less expensive per unit storage.. 2. Larger storage capacity than the flash drive. 3. Has more longevity. Solid state drive (SSD): 1. No moving parts, more reliable. 2. Lower power consumption than HDDs, runs cooler. 3. Robust. 4. Low latency.
31
Describe solid state memory.
Solid state memory has no moving parts and is non-volatile. It makes use of arrays of NAND and NOR gates to store data. SSD controller manages these components. Solid state memory uses a grid of columns and rows that has two transistors at each intersection. One transistor is called the floating gate (stores the charge) and the other is called the control gate (controls the flow of charge). Memory cells store voltages which can represent either a 0 or a 1.
32
What is the primary functional difference between RAM and ROM?
RAM (Random Access Memory) is volatile memory, stores data that is currently being used in applications or services; its contents are lost when power is cut. ROM (Read-Only Memory) is non-volatile and stores permanent startup instructions, such as the start up instructions, OS kernel, or BIOS.
33
Detail the operation of a scanner.
1. Light is emitted and bounces back off the document. 2. Reflected light falls on to mirrors. 3. Mirrors reflect refflected light back to CCD sensors. 4. Light is turnned into voltage based on light intensity. 5. The brighter the reflected light the higher voltage detected for the image document.
34
Describe the stages of the Fetch-Decode-Execute cycle, the role of each register, and RTN for the fetch stage.
Register roles: • PC (Program Counter): Holds the address of the next instruction to be fetched; incremented after each fetch. • MAR (Memory Address Register): Holds the address to fetch data from (copied from PC). • MDR (Memory Data Register): Holds the data at the address in MAR. • CIR (Current Instruction Register): Stores the instruction currently being decoded/executed. Register Transfer Notation (RTN) — Fetch Stage: 1. MAR ← [PC] (contents of PC copied into MAR) 2. PC ← [PC] + 1 (PC incremented to point to next instruction) 3. MDR ← [[MAR]] (data at the address in MAR copied into MDR) 4. CIR ← [MDR] (contents of MDR copied into CIR for decode & execute) Full cycle stages: 1. Address in PC is the address of the next instruction to be fetched. 2. Address copied into MAR via the address bus. 3. Instruction copied from main memory to MDR via the data bus. 4. Instruction transferred from MDR to CIR. 5. Instruction decoded in CIR into opcode and operand. 6. Processor executes the instruction. 7. PC incremented ready for the next loop.
35
Describe when interrupts are detected in the F-E cycle and how they are handled.
Detected: At the start/end of each F-E cycle (the processor checks the interrupt register). Handled: 1. The interrupt is given a priority and placed in the interrupt queue. 2. Processor finishes the current Fetch-Decode-Execute cycle and checks the interrupt register. 3. If lower priority than current process: continue with F-E cycle. 4. If higher priority than current process: — Current process state and registers are saved on the stack in memory. — Location/type of interrupt identified. — Appropriate Interrupt Service Routine (ISR) is called. 5. ISR handles the interrupt. 6. When ISR is finished: check for further high-priority interrupts / return to step 1. 7. Otherwise: load data from stack and continue with the original process.
36
Identify the factors that can affect the performance of the computer system and state how each impacts it.
• Clock speed — higher clock speed means more F-E cycles per second, so more instructions are executed per second. • Number of cores — more cores mean more instructions can be carried out simultaneously, reducing time to complete tasks. • Bus width — a wider bus allows the transfer of more data each clock cycle // allows more memory locations to be directly addressed. • Cache size — higher capacity cache means more frequently used instructions can be stored for fast access, reducing the need to fetch from slower RAM. Note: Cache is faster than RAM; RAM is faster than secondary storage.
37
Identify two differences between special purpose registers and general purpose registers.
1. Special purpose registers hold the status of the program whereas general purpose registers hold the temporary data used while preforming operations. 2. Special purpose registers are specialised for a specific use, whereas general purpose registers are used for any purpose. 3. General purpose registers can be used by most instrcutions, whereas special purpose registers can only be used by certain instructions.
38
What happens in Pass 2?
1. The computer reads the assembly language program one line at a time. 2. Generate the object code, including the opcode and operand, from the symbol table generated in Pass 1. 3. Forward references are resolved. This is required as some labels may be refered to before their address is known. 4. Symbolic adresses are replaced by absolute references. 5. Save or execute the program.
39
List and describe all 6 addressing modes used in assembly language (9618 syllabus).
1. Immediate Addressing: The value of the operand IS the data; used directly. e.g. LDM #200 loads the number 200 into ACC. 2. Direct / Absolute Addressing: The operand is the address of the data. e.g. LDD 200 loads the value stored at memory address 200. 3. Indirect Addressing: The operand gives the address of a memory location that contains the actual address of the data. e.g. LDI 200 — if address 200 contains 50, and address 50 contains 10, loads 10 into ACC. 4. Indexed Addressing: Effective Address = Operand + Index Register (IX). e.g. LDX 200 with IX=4 → accesses address 204. 5. Relative Addressing: Effective Address = Current address + Operand (used with JMR). e.g. JMR #5 transfers control to the instruction 5 locations ahead. 6. Symbolic Addressing: Only used in assembly; a label is used instead of a memory address. e.g. LDD MyStore — if MyStore is at address 300, loads value at 300. Labels make programs easier to modify (no need to manually update absolute addresses).
40
Describe the complete two-pass assembler process.
Pass 1: 1. Checks syntax of each line and removes all comments. 2. Builds a Symbol Table: when a symbolic address is first encountered, it is added with its current address, or marked 'unknown' if not yet defined (a forward reference). 3. Creates a Literal Table if the programmer has used constants in the program. 4. Performs Macro Expansion: replaces each macro call with its defined group of instructions. 5. Acts upon Directives (e.g. reserving memory, setting origin points); directives do NOT generate machine code. Pass 2: 1. Reads the assembly program one line at a time. 2. Generates the object code (opcode + operand) using the symbol table from Pass 1. 3. Resolves all forward references — replaces 'unknown' symbolic addresses with now-known absolute addresses. 4. Saves or executes the completed object program. After Pass 2: A Loader is required to load the object code into memory before it can be executed.
42
How does a Cyclic Shift work, and how does it differ from Logical and Arithmetic shifts?
Cyclic Shift (Circular Shift / Rotation): • No bits are lost — bits shifted out of one end are re-introduced at the opposite end of the register. • Cyclic Left Shift: The leftmost (MSB) bit is removed and placed at the rightmost (LSB) position; all other bits shift left by one. • Cyclic Right Shift: The rightmost (LSB) bit is removed and placed at the leftmost (MSB) position; all other bits shift right by one. • Does NOT have the ×2 / ÷2 mathematical effect of logical/arithmetic shifts (because bits are rotated, not lost). Comparison of all three shift types: ┌─────────────┬─────────────────────────────────────────┬────────────┐ │ Shift Type │ What happens to shifted-out bit? │ Sign kept? │ ├─────────────┼─────────────────────────────────────────┼────────────┤ │ Logical │ Lost; vacated end filled with 0 │ No │ │ Arithmetic │ Lost; MSB preserved on right shift │ Yes │ │ Cyclic │ Re-introduced at the opposite end │ N/A │ └─────────────┴─────────────────────────────────────────┴────────────┘ Use cases: Pattern detection, bit-level encryption, rotating bit flags in monitoring/control applications.
43
Describe the functions of the following utility software: disk formatter, defragmentation, back-up, disk repair. (Exam)
• Disk formatter: Sets up a disk so it is ready to store files. • Defragmentation: Moves parts of files so that each file is contiguous in memory. • Back-up: Creates a copy of data in case the original is lost. • Disk repair: Scans for errors in a disk and corrects them.
44
Describe the file management tasks that an Operating System performs.
• Storage space is divided into file allocation units. • Space is allocated to particular files. • Maintains/creates directory structures. • Specifies the logical method of file storage (e.g. FAT or NTFS). • Provides file naming conventions. • Controls access // implements access rights // implements password protection // makes file sharing possible. • Specifies tasks that can be performed on a file (e.g. open, close, delete, copy, create, move).
45
Identify utility programs that can be used to improve the performance of a computer and state how they improve performance.
• Defragmentation — less time taken to access files because each file is stored contiguously on disk, so there is less read/write head movement. • Virus checker — makes more RAM available for programs to run, because it removes malicious software that might be taking up memory / replicating. • Disk repair / Disk contents analysis — prevents bad sectors from being used (identifies and marks them); reduces access times by optimising storage. • Disk/system clean up — releases storage by removing unwanted/temporary files. Note: Defragmentation improves HDD performance but is NOT needed for SSDs (no moving parts; file location doesn't affect speed).
46
Explain the benefits to the programmer of using program libraries. (Exam)
• Saves (programming/testing) time — code does not have to be written/re-written from scratch // code does not have to be tested. • Code is already tested so it is more robust/likely to work. • If there is an improvement in the library routine the program updates automatically. • Can perform complex calculations that the programmer may be unable to do themselves.
47
List and explain the 7 methods that Security Management Implements.
1. Operating system updates: Keeps the system secure by implementing updates as they become available. 2. Antivirus and security software updates: Ensures that antivirus and other security software is up to date. 3. Firewall communication: Monitors all incoming and outgoing traffic, and checks for suspecious files. 4. User privalges: Restricts access to private areas on multi-user systems, by using user accounts, passwords and UserIDs to protect data 5. Access rights: Manages access permissions for all users. 6. Data recovery and system restore: Allows data and system recovery in case of corruption or loss. 7. Prevention of illegal intrusion: Prevents unauthorised access to ensure privacy and data integrity.
48
What are the different types of memory organisation?
1. Single (contiguous) allocation: Allocates all memory to a single application. 2. Partitioned allocation: Divides memory into contiguous blocks assigned to applications with variable partition size. 3. Paged memory: Similar to partitioned allocation, but each partition is a fixed size. 4. Segmented memory: Memory blocks are not contiguous, each segment is a logical grouping of data, such as an array.
49
Define Memory Management.
The part of the operating system that controls and manages the main memory. It preforms the following subtasks: 1. Memory protection. 2. Use of virtual memory. 3. Allocates and deallocates memory to processes. 4. Manages location of processes within the memory.
50
What is Hardware Management?
The part of the OS that controls all input/output devices connected to the computer through sub-management systems. Some of which are: 1. Installation of appropriate driver software. 2. Controls access to data being sent to/from hardware and peripheral devices. 2. Manages communication between devices.
51
Describe Backup Software.
1. Creates a copy of the contents of a disk /partition. 2. Can be set up to automatically backup. 3. Allows the user to decide what is backed up, e.g. all data /all files that have changed since the last backup. 4. Allows the user to set up an off-site backup. 5. Restores the data if necessary.
52
Define Antivirus Software and describe its operation.
It is software that protects systems by running in the background, detecting and removing viruses. It works by: 1. Scans files before they are opened. 2. Checks against a virus database. 3. Conducts heuristic checks on files. 4. Quarantines files.
53
What is Virtual Memory and how does it work? What role does it play in Memory Management?
Virtual Memory: A technique used by the OS to simulate more RAM than is physically available, by using part of secondary storage (HDD/SSD) as an extension of RAM. How it works: 1. The OS divides programs and data into fixed-size pages. 2. Only the pages currently needed are loaded into RAM (physical memory). 3. Pages not currently needed are stored in a page file (swap space) on secondary storage. 4. When a required page is NOT in RAM, a page fault occurs: — The OS identifies a page in RAM that is not currently needed. — That page is written to secondary storage. — The required page is loaded into the freed RAM space. Benefits: Allows programs larger than available RAM to run; enables multitasking. Drawbacks: Accessing secondary storage is much slower than RAM — if used excessively, performance degrades severely (known as "thrashing"). Memory Management subtasks: memory protection, use of virtual memory, allocating/deallocating memory to processes, managing process locations within memory.
54
Describe the ways in which a compiler and interpreter are each used during program development. (Exam)
Interpreter: • Use an interpreter while writing/developing the program. • To test/debug the partially completed program. • Because errors can be corrected and processing continues from where the execution stopped // errors can be corrected in real time // errors are identified one at a time. Compiler: • Use the compiler after the program is complete. • To create an executable file. • Use the compiler to repeatedly test the same (completed) section without having to re-interpret every time // compiler not needed at runtime.
55
Identify IDE debugging tools and IDE writing support tools. (Exam)
Debugging tools: • Breakpoints — stops the code executing at a set line. • Single stepping — executes one line of the program and then stops. • Report windows — outputs the contents of variables and data structures. Writing/support tools: • Colour coding // pretty printing. • Auto-complete. • Auto-correct. • Context-sensitive prompts — displays predictions of the code being entered. • Dynamic syntax check — underlines or highlights statements that do not meet the rules of the language. • Expand and collapse code blocks.
56
Explain why software is often developed using library files.
1. The code is already written so the programmer is not starting over again which saves time. 2. The code will have been used by many people so it should be already thoroughly tested and relatively error-free / won’t need re-testing. 3. The programmer can use e.g. mathematical / graphics functions that he may not know how to code. 3. Use of named library functions can simplify the program and make it easier to read. 4. The library routine code should conform to industry standards and therefore contribute towards a more robust program.
57
Describe some differences between a compiler and an interperter.
1. Compiler creates an executable//an interpreter does not create an executable. 2. The compiled program can be independently distributed. 3. Compiler reports all errors at the end of compilation//an interpreter stops when it reaches an error. 4. Interpreter executes each statement immediately after decoding/checking it. 5. The compiled program does not require compiler/source code to be present.
58
Describe the benefits of using an interperter to translate high-level code.
1. Easier de-bugging. 2. The interpreter stops when error encountered, so errors can be corrected in real time. 3. The interpreter translates a statement then executes it immediately. 4. Parts of the program can be tested, without all the program code being available.
59
Give two similarities and one difference between spyware and a virus.
Similarities: 1. Both are pieces of malicious software. 2. Both are downloaded/installed/run without the user's knowledge. 3. Both can pretend to be / are embedded in other legitimate software when downloaded // both try to avoid the firewall. 4. Both run in the background. Differences: 1. A virus can damage/delete computer data; spyware only records/accesses data. 2. A virus does NOT send data out of the computer; spyware sends recorded data to a third party (often via keylogging). 3. A virus replicates itself; spyware does NOT replicate itself.
60
Describe how access rights are used to protect data from unauthorised access.
• Access rights assign different levels of permission to different user accounts/logins (e.g. read-only // no access // read/write). • Specific views can be assigned to different users so they can only see the data relevant to them (e.g. managers can only see data for their own shop(s)). • Prevents unauthorised users from accessing sensitive data (e.g. a hospital cleaner cannot access patient records, but a consultant can). • User accounts with unique UserIDs and passwords are used to authenticate users before applying access rights.
61
Explain how an ARQ operates using a positive acknowledgement method.
1. A timer is started when sending decice transmists a data packet to receiver. 2. Receiving device checks the data packet for errors (using any error checking method). 3. Once the receving device knows that the packet is error free it sends an acknowledgement back to sending device. 4. The next packet is sent. 5. If the sending device does not receive an acknowledgement before the timer ends. 6. A time out occurs. 7. The data packet is resent. 8. Until acknowledgment is recieved or maximum number of attempts reached.
62
Describe how a digital signature is used to authenticate a document.
1. The sender hashes the document. 2. To produce a digest. 3. The sender encrypts the digest with a private key to create the digital signature. 4. The document and the signature are sent to the user. 5. The user uses the public key to decrypt the digital signature to reproduce the digest. 6. The digital signature can only be decrypted with matching sender's public key. 7. The receiver uses the same hashing algorithm on the document received to produce a second digest. 8. If both of the receiver's digests are the same, the document has not been changed.
63
Describe the process of using a Hash Total.
1. Total of several fields of data is calculated using a hashing algorithm. 2. Including fields not usually used in calculations. 3. The result is transmitted with the data. 4. Calculation repeated at receiving end using the same algorithm. 5. Results are compared. 6. If the values are different an error has occurred.
64
What is a Digital Cirtificate and when is it used?
If an incoming transmission is an email, there can be a concern about the authenticity of the email's sender. The solution is to insist on the sender attaching a digital ciertificate to the email. The digital cirtificate can also be an electronic document confirming the identity and security-ability of a web page on the internet. It is defined as an electronic document used to prove the ownership of a public key (used for encryption).
65
List the tasks carried out by a Firewall.
1. Examining incoming and outgoing traffic between the user's computer and the internet. 2. Checking if incoming or outgoing data meets a given set of criteria. 3. If the data fails the criteria, the firewall will block the traffic and gives the user a warning that there may be a security issue. 3. Logging all incoming and outgoing traffic for later interrogation by the user.
66
Describe the Handshake process when a browser connects to a secure website.
1. The browser sends a request. 2. The web server responds with an SSL/TLS certificate 3. If the browser authenticates the certificate, it sends a message to the web server. 4. Once this message is received by the web server, the server acknowledges the web browser and a SSL-encrypted two-way data transfer begins.
67
Explain how a Checksum works during data transfer.
1. A calculation is done, using an algorithm, on a block of data to produce a value. 2. The result is transmitted with the data. 3. Calculation repeated at receiving end using the same algorithm. 4. Results are compared. 5. If the values are different an error has occurred.
68
An odd parity is used to detect errors in data transmission. Explain how the odd parity check detects errors.
1. The number of 1 bits are counted. 2. A parity bit is added to each byte (7 bits BEFORE transmission). 3. The bit is added to make the sum of the 1 bits in each byte odd. 4. After transmission, if the number of 1 bits is odd, no error is detected. 5. After transmission, if the number of 1 bits is even, an error is detected.
69
List and describe all 7 validation methods. What is the key limitation of validation?
1. Range Check: Ensures data falls within a specified minimum and maximum range. e.g. age between 0 and 120. 2. Type Check: Ensures data is of the correct data type. e.g. numbers only, or text only. 3. Length Check: Ensures data is a specific number of characters. e.g. a 10-digit phone number. 4. Presence Check: Ensures mandatory fields are not left blank. 5. Format Check: Ensures data matches a specific pattern. e.g. date in DD/MM/YYYY format. 6. Lookup Check: Ensures data matches a value from a pre-defined set/list. e.g. country codes. 7. Check Digit: An extra digit appended to a code; computed from the other digits. Used to detect: incorrect digit entry, transposition errors (swapped digits), and phonetic errors. KEY LIMITATION: Validation checks that data is REASONABLE / SENSIBLE, but CANNOT check whether the data is actually correct or accurate. (e.g. a valid age of 25 might still be the wrong person's age.)
70
Explain the reasons why it is important to act ethically in relation to team members. (Exam)
These questions need five types of answer: 1. A form of being fair. 2. A form of building trust within a team. 3. A form of working as a team. 4. A form of feeling valued, getting help, giving help. 5. A form of producing the best product for the client and employer.
71
Describe the benefits to a professional of joining a professional ethical body (e.g. BCS, IEEE).
• Has clear, laid-out ethical guidelines to follow — so clients/other staff know the standards being applied and he does not have to decide what is ethical; it is written down. • Clients/staff know he is reputable — recognition of skills/knowledge; there may be a test/requirements for entry. • Access to legal advice if action is taken against them. • They provide help and support (e.g. if legal advice is needed). • Networking opportunities — no missing out on contacts/jobs. • They run training courses to keep skills up-to-date; access to professional development.
72
Describe the ways in which a professional can act ethically when required to use an unfamiliar IDE. (Exam)
• Tell the manager they have not used it and explain how they will get up-to-date. • Perform their own research on how to use it. • Explain to the manager that additional training is needed. • Ask the manager to book a training course. • Ask for a mentor / to shadow someone more experienced. • Practise at home before starting.
73
What are the five main anti-piracy measures used by software companies?
1. Product Key — unique reference number entered during installation 2. Licence Agreement — user must agree to terms before installation 3. Genuine Packaging — hologram sticker/label warning copying is illegal 4. Hardware Restrictions — software only works when original media (CD/DVD/USB) is present 5. Dongle — hardware device plugged into USB port required for software to function
74
Explain how AI is used in an application (e.g. a game-playing AI). Give 5 steps.
1. The rules/past moves/decision-making algorithms are stored 2. The AI program is trained by repeating the process many times 3. The AI looks ahead at possible scenarios and/or analyses patterns of past choices 4. The AI chooses the move most likely to be successful 5. The computer learns to improve by storing positive/negative results of choices and changing future choices accordingly
75
List FIVE illegal actions related to purchased commercial software.
1. Making and distributing copies for sale or to give away 2. Using software on a network/multiple computers without a multi-use licence 3. Using code from copyrighted software to create and distribute new software without the copyright holder's permission 4. Renting out a software package without the copyright holder's permission 5. Using the name of copyrighted software on other software without permission
76
What was the original purpose of DRM, and how has it expanded?
Original purpose: DRM was initially developed to control what devices a CD could play on, reducing illegal copying (e.g. preventing CDs from being copied onto computers). Expansion: DRM now applies to music tracks, video files, ebooks, and more. Example of DRM Licensing: Apple Music uses DRM to prevent downloading all music during the trial month and then cancelling the subscription.
77
What is Shareware?
Software available free initially (as a trial). The full version becomes accessible only after paying the full fee. Key points: • Trial version may be feature-limited • Users cannot access/modify source code • After payment, users receive updates and support • Users must not repurpose the source code without permission
78
State Isaac Asimov's Three Laws of Robotics.
1st Law: A robot may not harm a human being or, through inaction, allow a human being to come to harm. 2nd Law: A robot must obey orders given by humans, except where this would conflict with the First Law. 3rd Law: A robot must protect its own existence, as long as this does not conflict with the First or Second Law.
79
What is a Commercial (Proprietary) software licence and what are its key features?
• Paid software; protected by copyright law. • Users CANNOT modify the source code. • Users CANNOT redistribute copies of the software. • Available as a single-use or multi-use (network/site) licence. • Protected by anti-piracy measures: product keys, licence agreements, DRM, hardware restrictions, dongles. • Users typically receive updates and support while their licence is valid. • Illegal actions: making/distributing copies, using on multiple machines without a multi-user licence, renting out software without permission.
80
What is a Free/Open Source software licence (FSF/OSI) and what are the Four Freedoms?
Definition: Software that is free to use, study, modify, and redistribute. Source code must be provided/accessible. The Four Freedoms (FSF): • Freedom 0: Run the software for any legal purpose. • Freedom 1: Study and modify the source code. • Freedom 2: Redistribute copies of the software. • Freedom 3: Share modified code with others. (Access to source code is a prerequisite for Freedoms 1 and 3.) Restrictions on users: • Cannot integrate code from copyrighted (proprietary) software. • Cannot create software that mimics copyrighted software. • Cannot adapt source code in ways that infringe on other copyrighted software. Key distinction: • FSF (Free Software Foundation): Focuses on user RIGHTS and moral/ethical stance. • OSI (Open Source Initiative): Emphasises PRACTICAL BENEFITS — collaborative development and business value.
81
What is Freeware and how does it differ from Free/Open Source software?
Freeware: • Software available for free download at no cost. • Still covered by copyright laws (the developer retains full copyright). • Users CANNOT modify the source code. • Users CANNOT repurpose the code in other software. • Users CANNOT resell the software. • Source code is NOT provided. Key difference from Free/Open Source: • Freeware = free to use, but no access to or rights over the source code. • Free/Open Source = free to use AND free to modify/redistribute with source code access. Examples: Free antivirus tools (basic tier), PDF readers.
82
Compare the four main types of software licence: Commercial, Free/Open Source, Freeware, and Shareware.
COMMERCIAL (Proprietary): • Cost: Paid. Copyright-protected. Cannot modify or redistribute. • Single/multi-use licence. Anti-piracy measures enforced. FREE/OPEN SOURCE (FSF/OSI): • Cost: Free. Can run, modify, redistribute, and share modified code. • Source code must be included. Cannot integrate proprietary code. FREEWARE: • Cost: Free. Cannot modify, repurpose, or access source code. • Still copyright-protected. No redistribution rights. SHAREWARE: • Cost: Free trial initially (may be feature-limited). Must pay after trial. • No source code access. Paying users receive full version, updates, and support. • Users must not repurpose source code without permission.
83
Explain the problems with file-based systems and the advantages of a relational database.
Problems with file-based / flat-file systems: 1. Data redundancy — same data is stored many times across multiple files. 2. Program-data dependence — any changes to the data structure means all programs that access that data have to be re-written. 3. Data inconsistency / poor data integrity — duplicated data might be stored differently; updating data in one file does not update it everywhere. 4. Not easy to perform complex searches/queries — a new program has to be written each time. 5. Lack of privacy — user views cannot easily be implemented. Advantages of relational database: 1. Reduced data redundancy — each data item stored only once. 2. Data consistency / improved integrity — changes in one table automatically reflected in linked tables. 3. Program-data independence — structural changes do not require programs to be re-written. 4. Complex queries are easier to run (using SQL). 5. Can provide different views — users only see the specific data they are authorised to see.
84
Describe the purpose and contents of a Data Dictionary in a DBMS.
Purpose: Stores metadata — data about the data within the database. Contents: • Field / attribute names • Table name(s) • Data types for each field • Primary keys // foreign keys • Validation rules • Relationships between tables • Indexing details How it enhances integrity: By defining validation rules, data types, and key constraints within the dictionary, the DBMS ensures accuracy, completeness, and consistency of all data. Key distinction from Logical Schema: • Data Dictionary = metadata about attributes and validation rules (tabular). • Logical Schema = conceptual model of entity relationships (often an E-R diagram).
85
Define and contrast all database key types: Candidate, Primary, Composite, Secondary, and Foreign Key.
• Candidate Key: The smallest set of attributes that can uniquely identify a record without duplication. A table may have multiple candidate keys. • Primary Key: The specific candidate key chosen by the designer as the unique identifier for the table. Must be unique and NOT NULL. • Composite Key: A primary key made up of two or more attributes that together uniquely identify a record (used when no single attribute is sufficient alone). • Secondary Key: An alternative identifier used to provide additional search/access paths without replacing the primary key. • Foreign Key: An attribute (or set) in one table that references the primary key of another table. Creates a link between tables and enforces referential integrity. Referential Integrity: Every foreign key value must match an existing primary key value in the referenced table. A primary key cannot be deleted while dependent foreign key records exist (unless cascading is used).
86
Describe E-R diagrams, relationship types, and cardinality in database design.
Purpose of an E-R Diagram: Visual representation of database entities and the relationships between them. Design steps: 1. Identify entities — typically the "nouns" in the requirements (objects, people, events about which data is stored). 2. Identify relationships between entities. 3. Define cardinality for each relationship. Relationship types: • One-to-One (1:1): Each record in Table A corresponds to exactly one record in Table B. • One-to-Many (1:M): One record in Table A links to multiple records in Table B. • Many-to-Many (M:M): Multiple records in A relate to multiple records in B. → Resolved by creating a link/junction table, converting the M:M into two 1:M relationships. Cardinality: Defines the nature and numerical obligation of a relationship: • Mandatory: Each entity instance MUST relate to at least one instance of the other entity. • Optional: An entity instance does NOT need a corresponding instance in the related entity. Reading relationships (bidirectional): e.g. "One Band is booked for many Bookings" (forward) / "One Booking is for one Band" (backward).
87
What is First Normal Form (1NF)? How do you convert a table to 1NF?
Definition: A table is in 1NF when: 1. It contains NO repeating groups of attributes. 2. Every attribute value is ATOMIC — each cell contains only a single, indivisible value. Repeating group: When a single attribute contains multiple data values for one entity instance (e.g. a "Subjects" column containing "Maths, Physics, English"). How to convert to 1NF: • Identify and remove all repeating groups. • Ensure each cell holds only one value (make atomic). • Each row must be uniquely identifiable — a primary key must exist (may need to be composite). • Duplicate rows may need to be broken into separate rows. Output: A flat table with a primary key and no repeating attributes.
88
What is Second Normal Form (2NF)? How do you convert a 1NF table to 2NF?
Definition: A table is in 2NF when: 1. It is already in 1NF. 2. There are NO partial dependencies — every non-key attribute depends on the WHOLE primary key, not just part of it. Note: Partial dependencies only occur when the primary key is COMPOSITE (two or more attributes). If the primary key is a single attribute, 1NF ⟹ 2NF automatically. Partial dependency: A non-key attribute that is determined by only one part of a composite primary key. e.g. In (StudentID, CourseID) → CourseName: CourseName only depends on CourseID, not StudentID. How to convert to 2NF: 1. Identify all partial dependencies. 2. Move partially dependent attributes into a new table, with the relevant part of the key as the new primary key. 3. Leave a foreign key in the original table to link to the new table. Output: All non-key attributes depend on the full composite key.
89
What is Third Normal Form (3NF)? How do you convert a 2NF table to 3NF?
Definition: A table is in 3NF when: 1. It is already in 2NF. 2. There are NO transitive (non-key) dependencies — every non-key attribute depends ONLY on the primary key. The Normalization Litany: Every non-key attribute must depend on "the key, the whole key, and nothing but the key." Transitive dependency: A non-key attribute depends on another non-key attribute (rather than directly on the primary key). e.g. StudentID → PostCode → Town: Town depends on PostCode (non-key), not directly on StudentID. How to convert to 3NF: 1. Identify all transitive dependencies (non-key → non-key). 2. Move the transitively dependent attribute(s) into a new table, with the determining non-key attribute as the new primary key. 3. Leave a foreign key in the original table to link back. Output: All non-key attributes depend directly and only on the primary key. Summary of three stages: • 1NF: No repeating groups; all values atomic. • 2NF: 1NF + no partial dependencies (full dependency on whole key). • 3NF: 2NF + no transitive dependencies (depends on nothing but the key).
90
List and describe the key features and security measures of a DBMS.
Key DBMS components: • Data Dictionary: Stores metadata (field names, data types, validation rules, keys, relationships, indexing). • Logical Schema: Conceptual model of data structure; independent of the DBMS software. • Query Processor: Processes and executes SQL queries. • DDL Interpreter: Interprets Data Definition Language statements; records them in the data dictionary. • DML Compiler: Compiles Data Manipulation Language statements; optimises them for efficient execution. • Developer Interface: Allows developers to write complex SQL, create/modify objects, design reports and data-entry forms. DBMS Security Measures: 1. Usernames and passwords — authenticate users. 2. Access rights — control what each user can read/write/delete. 3. Automated back-ups — scheduled copies to prevent data loss. 4. Data encryption — protects data in storage and in transit. 5. Audit trails — logs all user actions for monitoring access and detecting unauthorised activity. How DBMS addresses file-based problems: • Redundancy: Most data stored once; foreign keys are the exception. • Inconsistency: Single-store updates are universally visible. • Data dependency: Structural changes minimally impact unrelated applications.
91
Summarise the key SQL DDL (structure) and DML (data) commands for the 9618 syllabus.
DDL — Data Definition Language (creates/modifies structure): • CREATE DATABASE db_name • CREATE TABLE table_name (col datatype PRIMARY KEY, ...) • ALTER TABLE — modify existing table (add/drop columns) • PRIMARY KEY — sets column(s) as unique identifier • FOREIGN KEY col REFERENCES other_table(col) — enforces referential integrity SQL Data Types: CHARACTER (fixed), VARCHAR(n) (variable up to n), INTEGER, REAL, BOOLEAN, DATE (YYYY-MM-DD), TIME (HH:MM:SS) DML — Data Manipulation Language (query and modify data): Querying: • SELECT col1, col2 FROM table — retrieve data • WHERE condition — filter rows • ORDER BY col ASC/DESC — sort results • GROUP BY col — group rows with same values • INNER JOIN table2 ON t1.col = t2.col — combine matching rows from two tables Aggregate functions: SUM(), COUNT(), AVG() Modifying: • INSERT INTO table VALUES (...) • UPDATE table SET col = value WHERE condition • DELETE FROM table WHERE condition SQL Script: A saved file of SQL commands that can be reused.