0% found this document useful (0 votes)
31 views38 pages

OL P1 Quick Revision

Uploaded by

mohamed.wn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views38 pages

OL P1 Quick Revision

Uploaded by

mohamed.wn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

1|Page

CompSci Paper 1
Paper 1 advice
Check the command word that is used, for example describe requires more than a
statement. Explain requires more detail as to why something happens, or why you
have selected the answer you have.

Check whether tick box questions require one, or possibly more ticks per row. If it is
one tick per row then make sure you don't put two. If there could be more check each
possibility, it is very likely that at least one of the rows requires two or more ticks.

If a question gives a context, and the wording of the command refers back to this
context, then make sure you use it in your answer. Don't just give a generic answer,
use the context in each point you make.

If a question asks for differences between two or more items, then make sure you
give all sides. For example just stating that parallel transmission has multiple wires is
not enough without also stating that serial has just one wire.

When converting numbers between different types (e.g. binary, denary, hexadecimal),
always check your answers by working it the reverse. For example, if converting
binary to denary, convert your denary answer back to binary and make sure that they
both match.
2|Page
Chapter 1 Data Representation Q 5) Write down
Q1) What is meant by binary system? uses/ applications of hexadecimal.
 It has a base of 2. 1. Memory dump
 It only uses two values, that are 1 and 0. 2. Colour code in HTML
3. URL Encoding
Q2) Why binary numbers are used in computer? 4. Error Message
In computers data is processed using logic gates 5. MAC Address
and stored in registers, logic gates work on 6. IPV6 Address
current signals ON and OFF represented by 1 and 7. Location in memory
0. 8. Debugging
9. ASCII//Unicode
Q) Write down different numbers and their bases: 10. Assembly Language
Denary Base 10 system
Binary Base 2 system Q 6) Describe what is meant by a MAC address.
Hexadecimal Base 16 system [4]
• Unique identification of a network device.
Q) How computer uses binary? • it is a unique (address).
Any form of data is converted to binary to be • 48 bit long, available for more than 281 billion
processed by a computer, like numbers, text, computer.
images, and sound files. • it is represented in 12 hexadecimal digits.
• it is a static address // it does not change
Q 3) Write down the application of binary • it is set by the manufacturer
numbers. • the first part is the manufacturer ID / number /
Everything stored in computer is in the form of 0 identifies the manufacturer
and 1 like text, images, audio and video. • the second part is the serial number / ID.

Q 4) Give reasons why a programmer may use Q 5) Memory Size Measurement


hexadecimal to represent binary numbers. It should be pointed out here that there is some
1. Less prone to error confusion in the naming of memory sizes.
2. Easy to read and understand There are two different methods:
3. Easier to convert long binary into 1. Denary Prefix System used in SI Units. It is
hexadecimal than into denary. base 10 system. In this system 103 = 1000 i.e. Kilo
4. Less screen space is required. 2. Binary Prefix System used in IEC Units
(International Elcrtro-Technical Commission). It is
3|Page
a base 2 system. In this system 1. 74 =

210=1024 i.e. kibi 0100 1010

0 or 1 = 1 bit 2. Flip all bit 1011 0101


3. Add 1 +1
4 bits = 1 nibble
-74 1011 0110
8 bits = 2 niblles = 1 byte
Positive integer in twos complement:
SI Units IEC units
Normal denary to binary conversion is used in two’s
Denary prefix Binary prefix
1 kilobyte = 103= 1000 1 kibibyte (1 KiB) = complement method too. Just convert the positive
Byte 210= 1024 Byte integer into binary. No more processing is required
1 megabyte = 1 mebibyte (1 MiB) +27 : 00011011
106=1000000 Byte = 220 Byte Q) How binary addition is performed?
1 gigabyte = 1 gibibyte (1 GiB) Binary addition is performed using sum and carry
109=1000000000 Byte =230 Byte method just as we use in daily life for addition in
1 terabyte = 1012 Byte 1 tebibyte (1 TiB) denary numbers.

=240= Byte
1 peta byte= 1015 Byte 1 pebibyte (1 PiB)
=250 Byte
1 exa byte= 1018= Byte 1 xbibyte (1 XiB)
=260= Byte

Binary addition: no mark if carry bit is not shown.

(a) One of the images has a resolution of 2048 x 4096


and a colour depth of 4 bits. Calculate the file size of
the image. Give your answer in Mib bytes.
Total Pixel= 2048 * 4096 pixels
Total bits= 2048 * 4096 * 4 bits
Q) Explain why overflow occurs when two binary
Total Bytes= 2048 * 4096 * 4 byte
8 numbers are added by a computer. [2]
File size in kibi byte= 2048 * 4096 * 4 Kib byte
• Overflow is an error in which number of bits are
1024*8
greater than the value can be stored in given register
File Size in mebi byte= 2048 * 4096 * 4 Mib byte
• An overflow error will occur if the value is greater
1024*1024*8
File Size = 4 MiB Byte than 255 in an 8-bit register.

Q) What are the most significant and least


Two’s complement: is used to represent negative significant bits?
numbers in computer. The left most bit in the given register is known
as most significant bit while the right most bit is
1. Convert the number into binary known as Least Significant bit.
128 64 32 16 8 4 2 1
2. Flip the binary value 1 0 0 1 0 0 1 1
3. Add 1.
Most Significant bit Least Significant bit
Convert -74 into binary using two’s complement: Q) State the effect of logical shift on data.
4|Page
One Place Logical Shift Right will each character in
divide the data by 1 and One Place Logical the word is replaced by its code.
shift left will multiply the data by 1. But if the
The codes are written in the order in the word. Firstly
most significant bit is 1 then it will be
dropped on left shift and data will become P is replaced with its code, then A, then T, then E and
incorrect. If the least significant bit is 1 then it at last L.
will be dropped on right shift and data will
Images
become incorrect.
Q) How is an image represented in computer?
Character Set An image is a series of pixels that are converted to
binary, which is processed by a computer.
Q1) Describe what is meant by a character set. Give
different types of character sets. Q) What is meant by pixel, Colour depth and bit
depth.
The character set is collection of all characters and
Pixel is the smallest picture element that contains only
symbols can be represented by a computer system. one colour.
Each character is assigned a unique value. The bit depth is the number of bits used to represent
each colour.
ASCII Code: 7 bit used to represent The colour depth is the number of available colours in
t 128 characters. Available for English characters only. pixel.
Image Resolution is the total number of pixels in the
Extended ASCII Code: 8 bit used to represent 256 image. It is the product of number pixels in width and
characters. number pixels in height.
Image Resolution = Pixels in width * Pixels in height
Unicode: 8 to 32 bit used to represent up to 4 billion
Pixel Density is the total number of pixels in a square
characters. Available for all languages of world. centi-meter area in an image.
Note: ASCII code for ‘A’ is 65, ‘a’ is 97 (65+32=97) Q) Describe effects of changing resolution and colour
depth.
In capital letters bit 32 is always off. The file size and quality of the image increases as the
resolution and colour depth increase.
Q2) Give one advantage and one disadvantage of
Unicode. State reason too.
Advantage: ASCII code represents 128 or 256
characters while Unicode can represents 4 billion
characters.
Disadvantage: text stored in Unicode character set,
takes up more storage. Bit Colour Available
Depth Depth Colours
Reason. In Unicode, each character is encoded using
Monochrome
more bits, so more combinations are available as well 1-bit 21 = 2
( Black & White)
it takes more space.
2-bit 22 = 4 Grey Scale
3-bit 23 = 8 RGB 8 Colours
Q3) Describe how text is represented in binary, for
7-bit 27 = 128 128 Colours
example a word ‘PATEL’ is represented by the ASCII
8-bit= 256 Colour
28 = 256
character set. [2] 1 byte
Each character has its own unique code. 24-bit= 224 = True colours
5|Page
The accuracy of
Bit Colour Available
Depth Depth Colours the recording and the file size increases as the sample
rate and resolution increase.
3 byte 16 Million 16,777,216 Colours
Sound
Sound is a vibration that propagates as an acoustic
wave, through a transmission medium such as a gas,
liquid or solid.
A sound waves are longitudinal as they consist of
alternating compressions and rarefactions, or regions
of high pressure and low pressure, moving at a certain
speed. The longitudinal sound waves are converted
into transverse waves. File Compression
Q 5) What is data or file compression?
The method of reducing file size is known as file
compression.

Q 11) Why file is compressed?


File is compressed to
 To transmit quickly
 To transmit using lesser internet data
 To store it in computer using lesser disc space
 To open it using lesser memory space
 To make file small enough to email.
How sound is stored in computer?
Q) How sound is represented in computer?
Q 12) What are types of file compression?
A sound wave is broken down into samples at a
Lossless Compression reduces the file size without
regular interval of time then amplitude of each
permanent loss of data, e.g. run length encoding
sample is found, at last the amplitude is converted to
(RLE). It is used when all data needs to be recovered
binary, which is processed by a computer.
on decompression.
Q) Define Sampling Rate and Sampling Resolution.
Lossy compression reduces the file size by
Sampling Rate is the number of samples taken in a
permanently removing data, e.g. reducing resolution
second.
or colour depth, reducing sample rate or resolution.
Sampling Resolution is the number of bits per sample.
It is used when file size needs to be reduced as much
Q) Describe the effects of changing sampling rate and
as possible.
sampling resolution on the file size and accuracy of
sound.
Q 13) Benefits and drawbacks of file compression.
The accuracy of the recording and the file size
Lossy File Compression: Unnecessary data is removed
increases as the sample rate and resolution increase.
permanently; file is compressed to smallest possible
Q) Describe the effects of changing sampling rate and
sampling resolution on the file size and accuracy of file size.
sound.
6|Page
Lossless File Compression: Nothing of Q) Describe steps
the data is lost. Compressed file is not as small as in of lossless compression of image file.
lossy file compression. To perform lossless compression of image RLE is
Q) How text file is compressed? used following steps are taken:
Text file is compressed lossless, using Dictionary
1. A lossless file compression algorithm RLE is
encoding or Run-length encoding methods
used
Dictionary Encoding: Each word in text is replaced
2. Consecutive pattern on images are identified.
with a symbol, that is not part of the text and a
3. Consecutive identical pattern values
dictionary is prepared containing all words and their
converted into a code consisting of the image
replacement characters. To decompress replacement
characters are replaced with original words, none of pattern and the number marking the length of

the data is lost. the run.


Run-length Encoding: Repeated characters are 4. The more similar values there are, the more
identified and stored once along with number of values can be compressed.
repetitions. To decompress characters are repeated as 5. The sequence of data is stored as a single
per number of repetition, none of the data is lost. value and count.
For example, to compress a text string
“aaaabbbbcccccccddddd” as “a4b4c7d5”

Q) Describe steps of lossy compression of Image File.


For example, in row 2, 4 white pixels, 10 black
Lossy File Compression for Images
pixels, and then 2 white pixels:
For lossy file compression of image file following steps
are taken: 1111 0000 0000 0011 or WWWW BBBB BBBB

1. A lossy file compression algorithm is used BBWW


2. Bit Depth (bits per pixel) is reduced resulting in This would be represented after Run Length
reduction in colour depth. Encoding as follows: 1 4 0 10 1 2 or W4 B10 W2
3. Pixel density (pixel per inch) is decreased Audio File Compression
resulting decrease in image resolution. Lossy File Compression of Audio using MP3:
4. Reducing bit depth and pixel density reduces Following steps are taken:
the file size. 1. Lossy file compression algorithm is used
2. It removes the background noise.
3. It removes sounds that human ear cannot
hear.
4. Sampling rate is reduced.
5. Samling resolution is reduced.

Lossless File Compression of Images


7|Page
Lossless File Compression of Audio
File
For lossless file compression of audio file
following steps are taken:
1. A lossless file compression algorithm RLE is
used
2. Consecutive sound patterns are identified.
3. Consecutive identical sound pattern values
are converted into a code consisting of the
sound pattern and the number marking the
length of the run.
4. The more similar values there are, the more
values can be compressed.
5. The sequence of data is stored as a single
value and count.
Video File Compression

1. A compression algorithm is used


2. Redundant data is removed
3. Reduce colour depth
4. Reduce image resolution
5. Reduce sample rate
6. Reduce sample resolution
7. Reduce frame rate
8. Use perceptual music shaping
9. Some data is permanently removed
8|Page
Chapter 2: Communication ‘A’ along the
Q ) Describe the structure of a packet. same line, both at the same time). Example:
A packet of data contains a a phone line, reading and writing data on
– packet header
HDD.
– payload
– trailer Q 2) Describe methods of transmission with
The packet header includes the: benefits and drawbacks.
– destination address
Serial transmission of data
– packet number
– originator’s address Bit by bit transmission of data using single
wire is known as Serial Transmission.
Q) Describe the process of packet switching. Example: It is best for external transmission
• Data is broken down into packets and longer distance (like from CPU to printer,
• Each packet could take a different route
• A router controls the route a packet takes keyboard to CPU).
• Packets may arrive out of order. Benefits: More reliable
• Once the last packet has arrived, packets
are reordered Data arrived in sequence (bit by bit)
Lesser expensive (only one wire is needed)
Drawback: It is slow (using only one wire)
Q 1) Describe different types of data Parallel transmission of data
transmission with applications. Multiple bits are transmitted using several
Types of Communication wires.

1) Simplex data transmission is sending Example: It is best for internal transmission

data in one direction only (i.e. from sender to and shorter distance (like among ICs on

receiver). motherboard).

Example: Radio, TV. Data being sent from a Benefits:

computer to a printer, from keyboard to CPU Faster,

etc. more reliable for shorter distance

2) Half-duplex data transmission is Drawback: It is less reliable (may be

sending data in both directions but only one skewed)

at a time (i.e. data can be sent from ‘A’ to ‘B’ More expensive (multiple wires needed).

or from ‘B’ to ‘A’ along the same line, but not


at the same time).
Example: a walkie-talkie, fax machine,
reading or burning data on CDs or DVDs,
both but not at the same time.
3) Full-duplex data transmission is sending
data in both directions simultaneously (i.e.
data can be sent from ‘A’ to ‘B’ and from ‘B’ to
9|Page
Q 3) Describe USB and its 5. If it doesn’t
benefits match with the decided parity there is an
USB (Universal Serial Bus) error in transmission.
is a plug-and-play interface that allows a Q 5) When parity check cannot detect
computer to communicate with peripheral and error?
other devices. Parity check cannot identify error if there are
NOTE: USB is errors in more than one bit and parity remain
a method of connection not a storage same.
device. Transposition Errors can also not be detected
Benefits by parity check.
1. It is a BUS as it has wires to transmit data.
Q 6) how checksum is used to identify errors?
2. It is UNIVERSAL as it connects devices cover a Steps of Check Sum
broad range. This is a verification method
3. It is more reliable as it is SERIAL A value is calculated on the block of data
4. It can be used to charge portable devices. using an algorithm
5. Devices are automatically detected. appended on the block of data
Q 4) Describe how parity check detects errors. Data is transmitted with checksum
Receiver recalculates the check sum using
Q) describe the errors occur during data same algorithm

transmission. Both the checksum are compared

Errors can occur during data transmission due to If both the checksum are not same, there

interference, e.g. data loss, data gain and data will be an error in data transmission.
Q 6) How ARQ works?
change.
Automatic Repeat Request (ARQ) is an

Parity Check is an error detection method. error-control method for data transmission

Additional bit is added for error detection. that uses negative, positive

1. Even or Odd parity is decided among acknowledgements and timeout.


sender and receiver. Step of ARQ

2. The number of 1s are counted in each 1. Sending computer transmits a block of


byte and 0 or 1 is added to make it Even data.
or Odd whatever is decided. 2. The sending computer waits for a period
3. Data is sent. of time to see if receiving computer

4. Receiver counts number of 1s in each acknowledges receipt of the data.


byte to check is it matching with the 3. After a set period of time, a timeout occurs
decided parity. which triggers the data to be automatically
resent by the sending computer.
10 | P a g e
4. This will continue until the one to encrypt
receiving computer acknowledges the data and other to decrypt. One key is kept
data has been received. hidden called Private key, other key is
Q 6) Describe Echo Check published called public key.
Echo Check: In this method the receiver Example 1: When Bob wants to send a
sends data back to sender. The sender secure message to Alice, he uses Alice’s
compares with the copy of the data sent. If public key to encrypt the message. Alice
the data sent back are the same as the data then uses her private key to decrypt it.(To
make not-understandable for others)
sent in the first place, then the original data
must have reached the destination unaltered.
If not, the data must be sent again.

Q 7) Describe Check Digit.


Check Digit is a digit added to a string of
numbers for error detection purposes.
This is a validation method
A digit is calculated on the item code using an
algorithm at point of manufacturing Example 2: When Alice wants to ensure that
appended on the item code the message is sent by her (to verify the
At point of sale the check digit is recalculated sender and message is not altered, not to
using same algorithm make message secure (not-understandable
by others)),
If both the check digits are not same three will
she encrypts her message using her own
be an error in scanning reading item code.
private key.
Then the message is transmitted to Bob.
2.3 Encryption Bob decrypts the message using Alice’s
Q) What is meant by encryption? public key.
The decryption of message by Alice’s public
Encryption is the conversion of plain text into
key confirms that this is Alice’s message, and
cipher text, which cannot be easily
is without any alteration.
understood by anyone except authorized
parties.
Q) Describe the difference between
symmetric and asymmetric key
encryption.
Symmetric key encryption uses single key to
encrypt and decrypt the data. While
asymmetric key encryption uses two keys,
11 | P a g e
12 | P a g e
3 Hardware Ans) Role of
3.1 von Neumann Architecture Memory Unit
Q 1) Describe von Neumann Architecture/ Memory unit consists of RAM and ROM, it is
Ans) Stored Program Concept. [6] primary memory. Its contents are directly
The Von Neumann model accessible by processor. All data and
uses the stored program instructions are first loaded in memory unit
concept. Immediate Access Storage. Then they are
The program is a series of fetched in registers inside CPU. The results
instructions that are saved in of processing are first store in memory unit
memory. then in secondary storage.
The processor fetches each
instruction, decodes it and Q 5) Differentiate IAS and Register.
then executes it. Ans) Immediate Access Store is part of
The processor uses several main memory, holds data and instructions
registers to store the data when they are waiting to be processed.
and instructions from the While Registers are storage inside CPU
program because they can be accessed stores data and instruction while being
faster than main memory. processed.

Q 2) Identify the components of CPU. Q 6) Describe role of Control Unit.


Ans) Components of von Neumann Model Ans) Control Unit functions are given below:
Von Neumann Model has following four  It controls and monitors all activities of
components: computer
1. Input/Output Devices  It controls speed of processing using
2. Memory Unit system clock
3. Control Unit  It fetches instructions from memory into
4. Arithmetic Logic Unit CPU
 It decodes the instructions.
Q 3) Describe role of I/O devices in von
Neuman Model.
Q 7) Describe role of ALU.
Ans) Input/output (I/O) Devices of a
Ans) Arithmetic & Logic Unit (ALU) perform
computer are hardware devices that are
arithmetical operations like +, -, *, and / while
responsible for getting data from the
logical unit are to compare two quantities.
computer to the user or from the user to the
Q 8) Describe the role of Register.
computer.
Q 4) Describe role of memory unit in von
Neumann Architecture.
13 | P a g e
Register are located inside CPU, 3. Execute the
and used temporarily for storing data during instruction (e.g., add, divide, load, store...)
processing. 4.Store the result (for instructions like ADD,
Q 9) Describe the role of buses. place the 'answer' in the specified register.)
Ans) Buses: Bus is a group of parallel wires
that is used as a communication path. Q 12) Describe the role of registers in fetch
1. Data Bus: ''The bi-direction buses which execute cycle.
transmits data between CPU, memory Ans) The program instructions are stored in
and peripherals.'' a continuous block of main memory.
2. Address Bus: ''The uni-direction buses The Program Counter stores the address of
which carries memory address to read or the next instruction to be fetched.
write data.'' The contents of the PC are copied to the
3. Control Bus: The bi-direction wires which Memory Address Register.
transmits the control signals (instructions). The contents of the PC are then incremented.
The value in the MAR is loaded to the
address bus.
The data value found at this address is
loaded on to the data bus and fetched to the
Memory Data Register.
The contents of the MDR are copied to the
Current Instruction Register.
The instruction can now be decoded.
A. Control Bus: Bi-Direction, Synchronised
The data of MDR is copied to Accumulator.
with System Clock
Now the instruction is executed. The results
B. Address Bus: Uni-direction, between
of processing, is then Stored in memory unit.
register and main memory
C. Data Bus: Bi-Direction

Q 11) describe Fetch Execute Cycle.


Ans) Fetch-Execute Cycle: The basic steps
involved in executing an instruction. They are
also called the instruction cycle.
1. Fetch the instruction (transfer the
instruction from main memory to the decoder)
2. Decode the instruction (from machine
language)
14 | P a g e
Q) What is instruction set? Instead of having
Ans) An instruction set is a list of all the to access the data from the slower-access RAM.
commands that can be processed by a CPU and Cache is memory that is faster to access than
the commands are machine code. RAM.
Q) State one purpose of a core in a CPU. Q) State what is meant by clock speed.
Ans) Core is used to process an instruction, to Ans) The maximum number of FDE
carry out a fetch-execute cycle. cycles/instructions a CPU can
perform/process/execute in a second.
Clock is the CPU component that regulates the
Q) The computer is upgraded to a dual core
number of fetch–decode–execute cycles the
CPU. Explain how the upgrade can affect the CPU can perform in a second.
performance of the computer. Q) Explain the effect this change will have on the
Ans) 1 core can run 1 FE cycle/instruction each performance of the CPU.
second, 2 (or other example) cores can run 2 (or Ans) Increase in clock speed of CPU will
other example FE cycles/instructions Increases/improves the performance. Tasks can
simultaneously. be performed quicker/faster, because more FDE
Twice as many instructions are executed each cycles/instructions can be processed in a second.
second.
It will increase the performance.
Q) What is meant by 3.5 GHz processor?
Ans) It can run 3.5 billion FE cycles each second .

Q) The CPU has cache. Explain the purpose of


the cache.
Ans) Cache is a fastest access memory that
stores frequently used data and instructions. It
is used to speed up access. It has different
levels e.g. L1 – L3. L1 is low capacity but
extremely fast, L3 is the slowest of the three
but also usually has the biggest storage
capacity.

Q) Explain how the amount of cache affects the


performance of a computer.
Ans) Cache stores frequently used instructions.
The more cache means the processor can access
more data faster.
15 | P a g e
Q) What is an embedded system? 3.2 Storage
Devices
Ans) Embedded System means something that is
attached to another thing. Q 1) Describe how a magnetic storage device
stores data.
An embedded system is a special purpose
computer system built within a mechanical Storage Devices
have platters,
device. It performs one dedicated function or Read/Write Heads
limited specific functions. and motors to move
head and rotate
The vast household appliances are embedded
platters.
systems.
Platters are divided into tracks and sectors.
Features of Embedded System:
 Special purpose computer Each sector is
divided into tiny
 Dedicated to a single or limited task. magnetic field.
 Built (integrated) into a machine or larger Each field stores
a single bit.
system.
Motor rotates the disc platter and moves
 An embedded system must contain a
head arm.
processor, memory and an I/O capability
Magnetic fields are generated to store data.
and dedicated hardware.
Magnetic sensors are used read data.

Q 2) How optical devices work?

In optical storage media data is stored on


disc using pits and lands
– (Red) laser is used
– (Laser beams) shines onto surface of the
disk
– Motors are used to rotate disc.
– Surface is covered in a track (that spirals
Q) Explain why washing machine is from the centre)
considered as Embedded system. – Pits and lands represent binary values
– Optical device can determine the binary
Ans) Microprocessor is installed in the
value from the light reflection
machine, it performs only one task, i.e.
special purpose computer, and it is not easily
updated.
16 | P a g e

Q 3) Explain how Solid State Drives store


data.

Solid State discs uses NAND or NOR


technology, transistors or controls gates or
floating gates.
Data is stored by flashing it onto the
chips/device
Transistors or control gates controls the flow
of electrons.
The electric current reaches the control gate
and flows through to the floating gate to be
stored.
When data is stored the transistor is
converted from 1 to 0 / 0 to 1.
17 | P a g e
3.4 Network Hardware For example

Q 1) What is meant by Internet Service 3FFE:1900:4545:3:200:F8FF:FE21:67CF


Provider?
Ans) An Internet service provider (ISP) is Q 4) Describe Internet Server (Web Server)
an organization that provides services for
Ans) Internet Server
accessing, using, or participating in Internet server (web server) is a special
the Internet. computer, on which websites are stored.
Q) What is meant by MAC Address? Q 5) What is meant by http?
Q 7) What is meant by DNS?
Ans) MAC Address is a unique identity of
Ans) Domain Name Server (DNS):
network interface controller card.
Domain Name Servers (DNS) computers that
stores webserver names and their associated

Q 2) What is meant by web browser? IP address. They maintain a directory of


domain names and translate them to Internet
Ans) Web browser is a software program
that allows a user to locate, access, and Protocol (IP) addresses.
display web pages.
Browsers translate web pages and websites
delivered using Hypertext Transfer Protocol
(HTTP) into human-readable content.

Q 3) Describe IP Address and its types.


Ans) An Internet Protocol (IP) address is a
unique reference number given to each
device over network to identify their location.
IPV4 and IPV6 are two types of IP Address.
IPV4 is 32-bit long displayed as a series of 4
decimal numbers, separated by ‘.’.
32-bit binary version:
110010011010000001011011011111111
Decimal version: 201.64.182.255
IPv4 is the most widely deployed Internet
protocol used to connect devices to the
Internet. IPv4 uses a 32-bitaddress scheme
allowing for a total of 2^32 addresses (just
over 4 billion addresses).
IPv6 is 128-bit IP address, written in
hexadecimal and separated by colons.
18 | P a g e
4 Software Q) How
4.1 Types of software and interrupts hardware, firmware and an operating system are
Q) Describe the difference between system required to run applications software?
software and application software and provide • Ans) Applications are run on the operating system
examples of each. • The operating system is run on the firmware
Ans) • The bootloader (firmware) is run on the hardware
• System software provides the services that
the computer requires, including operating Q) What is an interrupt?
system and utility software. Ans) An interrupt is a request generated by a

• Application software provides the services hardware, software or user to seek attention of

that the user requires. operating system.


Software interrupts include division by zero and

Q) Describe the role and basic functions of an two processes trying to access the same memory

operating system location.

Ans) • Hardware interrupts include pressing a key on

• managing files the keyboard and moving the mouse.

• handling interrupts
Q) The mobile telephone has an operating
• providing an interface
system. Describe the purpose of the operating
managing peripherals and drivers: allocates data
system.
to buffers, transmits data to hardware, receives
Ans) It performs the basic functions of a
data from hardware
computer
• managing memory: allocates memory to
It manages the hardware
processes, prevents two processes accessing
It provides a platform to run software
the same memory
It provides a user interface
• managing multitasking
It performs tasks such as (any example of function
• providing a platform for running applications:
of an operating system)
allows application software to run on the
computer
Q) In a computer system the operating system is
• providing system security run directly on the firmware. Identify which type
• managing user accounts of software runs directly on the operating system.
Ans) Application programs
Q) System Software software provides the
services that the computer requires; an example
19 | P a g e
is utility software. Application.
software is run on the operating system. The
Operating system is run on the firmware, which is
run on
the ......................................................... .[4]
20 | P a g e
4.2 Types of programming language, Q) Describe how
translators and integrated development interpreter works?
environments (IDEs) Ans) An interpreter translates and executes the
Q) Explain what is meant by a high-level code line-by-line.
language? • An interpreter stops execution when an error is
Ans) High level language consists of English found.
similar words. •

Advantages of High Level Language • Q) Explain the advantages and disadvantages of a


ease of reading and writing code, compiler and an interpreter.
e.g. low-level is hard to read • Ans) An interpreter is mostly used when
ease of debugging code developing a program and a compiler is used to
machine independence translate the final program.
direct manipulation of hardware
Q) Explain the role of an IDE in writing program
Q) What is meant by Assembly Language? code and the common functions IDEs provide.
Ans) Assembly language is a form of low-level – code editors
language that uses mnemonics, and that an – run-time environment
assembler is needed to translate an assembly – translators
language program into machine code. – error diagnostics
Q) Describe the operation of a compiler.
– auto-completion
Ans) A compiler translates the whole code at
– auto-correction
once before executing it, producing an executable
– pretty print
file
A compiler provides an error report for the whole
code if errors are detected.
21 | P a g e
5 The internet and its uses Q) Explain the
purpose and functions of a web browser
5.1 The internet and world wide web
Ans) The main purpose of a web browser is to
Q) Describe the difference between the internet render hypertext markup language (HTML) and
and the world wide web. display web pages
• Functions include:
Ans ) The internet is the infrastructure. The world
– storing bookmarks and favourites
wide web is the collection of websites and web – recording user history
pages accessed using the internet. – allowing use of multiple tabs
– storing cookies
– providing navigation tools
Q) Describe the purpose of HTTML and HTTPS.
– providing an address bar
Ans) HTTP (Hyper Text Transfer Protocol), defines Q 8) Describe the steps to visit a website?
the rules for websites to format and transmit web Ans) Steps of visiting a website.
pages. 1. User types URL of a website in browser
HTTPS (Hyper Text Transfer Protocol Secure), address bar like inqilabpatel.com.
means communication is secure, data is 2. The web browser sends the request of URL
transferred defines the rules for websites to to DNS of ISP.
format and transmit web pages. 3. DNS searches the IP address of the URL.
4. URL is translated into machine friendly IP
Q 6) Describe the features of URL. address by DNS.
Ans) Uniform Resource Locator (URL): 5. The translated IP address is sent to browser.
URL means Uniform Resource Locator. It is the 6. Browser sends http get command to the
unique address of a web site. server of the IP address where website is
Components of URL: hosted.
An example of a URL is: 7. The web server sends HTML data to the
http://inqilabpatel.com/comsci.html. client web browser.
In this example 8. Web page is displayed on client’s browser.
a. “http” refers to protocols that enables
browser to know what protocol is being used
to access information in the domain
b. “inqilabpatel.com” is called the domain name
or web server name.
c. "compsci.html" refers to the specific page.
22 | P a g e
Q) Explain what is meant by cookies 5.2 Digital
and how they are used. Currency
Ans) Cookie is a text file that contains information Q) What is a digital currency?
stored by website about a user Ans) A digital currency is one that only exists
on the user’s hard disk; this Electronically.
enables the website to Hash Key
of Block
remember details about the Q) Explain what
Previous
user’s interest when they next visit the website. is Block in Block Block
(Amount, Sender, Hash
Cookies are stored with the permission of user. digital Receiver)
Legitimate Web sites will encrypt this personal currency?
information stored in the cookie to prevent Ans) Blocks are data structures within the
unauthorized usage by another party with access blockchain database, where transaction data in a
to your cookie folder. crypto currency are permanently recorded.
Types of Cookies: A block is created when a new transaction takes
1. Session cookies: These are temporary place. It contains following data items:
cookies that are stored in the user's 1. Data (Amount of transaction, sender
browser memory until they close their and receiver)
browser. They are used to maintain user 2. Hash value of the block
session information, such as: 3. Hash value of previous block
1. login credentials
2. items in a shopping cart. Q) What is a block chain?
2. Persistent cookies: These cookies are Ans) Blockchain, in its basic form, is a digital
stored on the user's device even after they ledger, that is a time-stamped series of records
close their browser. They are used to save: that
1. Personal details cannot be altered.
2. Track user prefrecences
3. Storing login details
23 | P a g e
1. Brute-force
attack: A brute-force attack is a trial and error
5.3 Cyber Security method used by cybercriminals to crack
Important terminology in Cyber Security: passwords or encryption codes by trying every
Perpetrator (per·pet·ra·tor): a person that carries possible combination until the correct one is
out an illegal, harmful, or immoral action. found. This method is time-consuming, but it can
Bot: a computer that has had malware be effective if the password or key is weak.
downloaded onto it that will cause it to be used in
a DDoS attack. 2. Data interception: Data interception refers to
Botnet: a network of bots that are created to the unauthorized access or monitoring of data
carry out a DDoS attack. that is being transmitted between two parties.
Zombie: a dormant or sleeping bot, currently not This can occur through various means such as
used in DDoS attacks. eavesdropping on a network, intercepting
Port: an entry point into a computer or network. wireless transmissions or through hacking into a
Malware: a software, developed with intention to system. Pack Sniffer is a piece of software that is
harm other computers. used to examine the contents in a data packet.
Data Integrity and security
Data integrity refers to maintaining and assuring 3. Distributed denial of service (DDoS) attack: A
the accuracy and consistency of data over its DDoS attack is a cyber-attack that targets a server
entire life-cycle, and is a critical aspect to the or website by flooding it with traffic from multiple
design, implementation and usage of any system sources, overwhelming the server and causing it
which stores, processes, or retrieves data. to crash or become unavailable.
Data security is about keeping data safe. Many 4. Hacking: Hacking is the unauthorized access of
individuals, small businesses and major computer systems or networks with the intent of
companies rely heavily on their computer stealing, altering or destroying data. This can be
systems. done by exploiting vulnerabilities in software or
Cyber Security Threats by tricking users into providing sensitive
Cyber security is the application of technologies, information.
processes, and controls to protect systems, 5. Malware (virus, worm, Trojan horse, spyware,
networks, programs, devices and data from adware, ransomware): Malware is software
cyber-attacks. designed to cause harm to computer systems or
It aims to reduce the risk of cyber-attacks and networks. This includes viruses, which replicate
protect against the unauthorised exploitation of themselves and infect other systems, worms,
systems, networks, and technologies. which spread rapidly through networks, Trojan
24 | P a g e
horses, which appear to be harmless targeted
but contain malicious code, spyware, which company). The bait has an authentic look to
collects personal information from a user's it, such as a label presenting it as the
computer and adware, which displays unwanted company’s payroll list. Victims pick up the bait
advertisements. Ransomware is a type of out of curiosity and insert it into a work or
malware that encrypts a user's files and demands home computer, resulting in automatic
payment in exchange for the decryption key. malware installation on the system.
6. Social engineering: Social engineering is a Solutions to keep data secure
technique used by cybercriminals to manipulate There are various solutions available to keep data
people into divulging sensitive information or safe from security threats, which include:
performing actions that are against their best 1. Access Levels: Access levels help restrict
interests. This can include tactics such as access to data by assigning different levels of
phishing, pretexting, and baiting. permissions to users. This ensures that only
a. Pharming: Pharming is a type of cyber-attack authorized personnel can access sensitive
that redirects users to fake websites in order information, reducing the risk of data
to steal their personal information or install breaches.
malware on their computer. 2. Anti-malware: Anti-malware software, such
as anti-virus and anti-spyware, are used to
b. Phishing: Phishing is a type of social detect and remove malicious software that
engineering attack where cybercriminals trick can damage or steal data.
users into revealing their personal information 3. Authentication: Authentication methods,
by posing as a trustworthy entity, such as a such as usernames and passwords,
bank or email provider. biometrics, and two-step verification, help
c. Baiting: As its name implies, baiting attacks verify the identity of users accessing the
use a false promise to pique a victim’s greed system, preventing unauthorized access.
or curiosity. They lure users into a trap that 4. Automating Software Updates: Automating
steals their personal information or inflicts software updates ensures that the system is
their systems with malware. The most reviled up to date with the latest security patches
form of baiting uses physical media to and fixes, reducing the risk of vulnerabilities
disperse malware. For example, attackers being exploited by attackers.
leave the bait—typically malware-infected
flash drives—in conspicuous areas where
potential victims are certain to see them (e.g.,
bathrooms, elevators, the parking lot of a
25 | P a g e
5. Checking Spelling and Tone: Biometric:
Checking the spelling and tone of Biometric authentication is a type of
communications, such as emails, can help authentication that uses the user's unique
identify phishing scams and other fraudulent biological characteristics such as fingerprints or
activities. facial features to authenticate the user's details.
6. Checking URL Attached to a Link: Checking Magnetic stripe: Magnetic stripe cards are a form
the URL attached to a link before clicking on it of card that stores the user's data on a magnetic
helps prevent users from being directed to strip usually on the reverse side. The user scans
malicious websites. the card through a reader where the details
7. Firewalls: Firewalls are used to monitor and stored on the card are compared to the details
control network traffic, blocking unauthorized stored within the system. If the data from the
access to the system. card matches the data that is stored on the
8. Privacy Settings: Privacy settings can be used system, the user is authenticated and granted
to restrict access to personal information, access .
reducing the risk of identity theft and other Smart card: Smart cards are cards that contain a
privacy breaches. chip and can be used as contactless cards. They
9. Proxy-Servers: Proxy servers can be used to are used for authentication purposes and can
mask the IP address of the user, preventing store a variety of information such as personal
attackers from tracking their online activity. identification, medical records, and financial
10. Secure Socket Layer (SSL) Security Protocol: information.
SSL is a security protocol that encrypts data Physical token: A physical token is a device that
transmitted over the internet, ensuring that generates a unique code that is used for
sensitive information cannot be intercepted authentication purposes. The user enters the
by unauthorized parties. code into the system to authenticate their
identity.
Authentication
Electronic token: An electronic token is a device
Here are some methods of authentication:
that generates a unique code that is used for
Zero login: This is a type of authentication that
authentication purposes. The user enters the
aims to remove or reduce the need for the user
code into the system to authenticate their
to manually input their details and instead rely on
identity. Electronic tokens can be used for a
the system to verify the user's credentials
variety of purposes such as online banking,
automatically. Newer methods of zero login types
accessing secure networks, and making online
of authentication include the use of networks,
purchases.
location, device data, and human behavioral
patterns to recognize users automatically.
26 | P a g e
6 Automated and emerging The signals
technologies generated by sensors are generally in
6.1 Automated systems analogue form and needed to be converted

Q) What is an automated system? into digital form so as processor can

Ans) An automated system is a combination of understand it. ADC (Analogue-to-Digital


Converter) is used to convert these analogue
hardware and software that performs actions
signals into digital signals.
without the need for human interaction. For
Actuators is a hardware device that receives
example, in traffic lights, air conditioning systems
a signal from a computer and adjusts the
and washing machines.
setting of a controlling device.
Sensors, microprocessors, and actuators work
The processor sends digital signals, which
together to create these automated systems.
are converted into analogue signals using
An automated system is an embedded control
DAC (Digital-to-Analogue Converter) so as
system. actuator can act upon it.
Q 11) What are monitoring and control Actuator is responsible for powering and
systems?
moving a motor in machinery, such as a robot
Ans) Monitoring System arm in a factory
In monitoring systems microprocessor just
examine sensors’ reading and report their
results.
A monitoring system consists of Sensors,
ADC, Processor, DAC and Actuator.
Control System
A control system is a type of computer
system that manages, commands and directs
other devices or systems. Q) Describe advantages and disadvantages
They usually take an input, process it and get of automated system.
an output. Ans) Advantages of automated systems
A control system consists of Sensors, ADC,  Much faster than a human operator to
Processor, DAC and Actuator. take an action.
 Much safer (it keeps humans away from a
Q 10) Describe role of each component in dangerous environment).
monitoring and control system.
 The process more likely to run under
Ans) Sensors is an input device which
optimum conditions since any small
measures a specific physical quantity (input)
changes needed can be identified very
and send the data to processor.
quickly and action taken.
27 | P a g e
 It is cost effective, in long run Sound/acoustic Burglar alarm, Leak
as it replaces workforce. detection system
 Higher productivity Moisture/ Clothes drier,
 More consistent humidity Environmental control
Disadvantages of an automated system: Pressure sensor Burglar alarms,
automatic washing
 Expensive to set up
machines, robotics
 Subject to cyberattacks
carbon dioxide/ pollution monitoring in a
 Maintenance may be expensive oxygen/gas river, soil, greenhouse
 A condition may occur that was not Light sensor Street lights etc.
consider during development stage.

infra-red/motion automatic doors,


burglar alarm systems
Temperature Automatic washing
sensor machines, automatic
cookers, central heating
controllers, green
house
28 | P a g e
6.2 Robotics Ans) Robot
Ethics: Where Values And Engineering Meet
Q) What is a robot and robotics?
1st Law: A robot may not injure a human being or,
And) A robot is a machine that is designed to
through inaction, allow a human being to come to
replicate human actions or movements.
harm.
A robot is a machine that can repeatedly carry
2nd Law: A robot must obey the orders given it by
out a task under the control of a computer and
human beings except where such orders would
whose task can be changed by reprogramming its
conflict with the First Law.
computer. Robots can perform a wide range of
3rd Law: A robot must protect its own existence as
repetitive production tasks.
long as such protection does not conflict with the
First or Second Law.
Q) What is meant by robotics
--Isaac Asimov’s Three Laws of Robotics
Ans) Robotics is a branch of computer science
that incorporates the design, construction, and
Advantages:
operation of robots. • Robots are cheaper, no need to pay wages, so
Examples include factory equipment, domestic it is cost effective, in long run as it replaces
robots, and drones. workforce.
• Do not take breaks, holidays and do not get
Q) State characteristics of robots. tired, work 24 hours a day.
Ans) Characteristics of robots • Reduce accidents at traffic lights improve
Robots have following characteristics: traffic flow.
- they have a mechanical structure or • Can work in dangerous conditions, (it keeps
framework like motors, hydraulic pipes etc. humans away from a dangerous environment).
- they have electrical components, such as • Much faster than a human operator to take an
sensors, microprocessors, and actuators. action.
- they are programmable. • The process more likely to run under optimum
Q) How to program a robot? conditions since any small changes needed can
1. Robots are programmed with a sequence of be identified very quickly and action taken.
instructions and robots carry out the tasks. • Higher productivity
2. In other way a worker straps with a series of • More consistent
sensors, performs the task. Each movement Disadvantages of robot:
of the worker is stored as a set of  Expensive to set up.
instructions, and then robots start  Subject to cyberattacks.
performing these set of instructions.  Maintenance may be expensive.

Q) explain robot ethics


29 | P a g e
 A condition may occur that was o robot
not consider during development stage. s are used in surgical procedure,
 Robots cannot perform a non-standard tasks. o monitoring patient
 Robots can increase unemployment. o disinfection of room and operation
 De-skilling is the process by which skilled
theatre
labour within an industry or economy is
eliminated by the introduction of robots. o taking blood samples
 Retraining. o microbots are used in target therapy.
- Domestic
Q) state application of robots
o Autonomous vacuum cleaner
Ans) Applications of robots:
o Autonomous grasscutters
Robots can be used in areas including:
o Personal assistant
- industry
- entertainment
o robots are used through embedded
system or directly connected to a
computer system.
o Used for heavy lifting.
o Used in delicate procedures.
o Like paint spray of car bodies, welding car
body parts
o Manufacturing microchips
o Controlling electronic equipment and
warehouses.
- transport (autonomous cars and buses)
o changing gears
o applying the brakes
o turning the steering wheel
o driverless cars
- agriculture
o harvesting, picking vegetables and fruit
o weed control
o phenotyping (plant growth and health)
o seed-planting and fertiliser distribution
o autonomous labour-saving devices
- medicine
30 | P a g e
6.3 Artificial intelligence Q) What is
Q) What is meant by Artificial Intelligence?
Ans) AI is a branch of computer science dealing
with the simulation of intelligent behaviour by
computers.
It is ability to perceive or infer information, and to
retain it as a knowledge to be applied towards
adaptive behaviours within environment or
context without supervision to achieve a desired
outcome.
meant by expert system?
Ans) Expert systems
Q) State characteristics of AI.
An expert system is designed to support problem-
Ans) Characteristics of AI
solving by using the knowledge and rules of
1) Collection of data and rules for using data and
inference gathered from one or more human
rules for using that data.
experts.
2) Ability to reason,
3) Ability to learn new things and adapt it to
Q) State essential components of expert system.
new situation.
response.
Reasoning is the logical process of drawing
1) User interface
conclusions, making predictions, or constructing
2) Inference Engine
approaches towards a particular thought with the
3) Knowledge base
help of existing knowledge.
4) Rule base
5) Explanation system
Q) Explain how Robot’s program will use AI.
Q) Describe Knowledge Base
Ans) Robot’s program uses machine learning
Ans) A Knowledge Base, that stores facts, this
algorithms to adapt its behaviour/rules/data.
It also collects data about where it has been to includes both factual information and heuristic
make sure it does not repeat the same route. knowledge, which is knowledge that is based on
It collects data about common obstacles experience and judgment.
/problems so, it knows how to react next time.
It stores successful actions, so, it knows what is
most likely to work next time Q) describe rule base:
Ans) A Rule Base, that stores rules for decision-
making. It is made up of a series of if … then
statements called inference rules. Sometime rule
base is considered a part of the knowledge base.
31 | P a g e
Q) How an
Q) State what is meant Inference Engine? expert system is developed?
Ans) An Inference Engine, that is responsible for Ans) An expert system is created by:
making logical deductions and drawing 1. Collecting information from one or more
conclusions from the information in the experts.
knowledge base. It uses various reasoning 2. Organising and storing factual information to
techniques, such as forward and backward the knowledge base.
chaining, to arrive at a solution or 3. Inputting decision-making rules to the rule
recommendation. base.
• A User Interface, that is the component of the 4. Creating an inference engine that will process
expert system that interacts with the user. It facts, rules and data about the problem to be
presents the problem or question to the user, solved from the user. The inference engine
receives input from the user, and displays the poses questions to the user and then analyses
system's output or recommendation. The user the answers by running a set of rules that have
interface can take many forms, such as a been programmed into engine. Like in medical
command-line interface or a graphical user diagnosis expert system may pose these
interface (GUI). questions to the user:
• Explanation i. Do you have a runny nose? Yes/No
System has the ii. Do you have a sore throat? Yes/No
role to explain The rule base may allow inference
the problem- engine to come up with an answer
solving strategy or conclusion to a problem like:
to the user. The iii. IF the patient has a runny nose and a
solutions must sore throat THEN the diagnosis is a
be reproducible by the user and engineer but can cold.
only be verified by the human expert: which facts 5. Creating a user interface for:
were asked for? why? which facts were vital? and a. Input that will ask the user questions about
can go as far as, how would the conclusion their problem.
change if some facts would change? b. Output that will deliver proposed solutions
Complete the diagram by given labeling it. with explanations.
6. Testing the system with a variety of inputs for
which certain outputs are expected.
7. Producing a user manual and training users of
the system.
32 | P a g e
Creating Exert System for Medical –
Diagnosis can be
Creating an expert system for medical diagnosis used in
involves collecting data from experienced medical countries
practitioners. Information about diagnoses (such where the
as a list of symptoms) are fed into a knowledge necessary
base and inference rules (such as a hypothesis to skills are rare
test if the patient has headaches, fever and spots) – can have access 24/7
are fed into a rule base. The developer then – less likely to miss a question
needs to create a user interface that collects Disadvantages of Expert System
information about the patient and gives advice – expensive system to set up/purchase
back to the user. An inference engine is also – necessary to do training on the new system
needed to apply the knowledge base and rule – must be kept up-to-date
base to the input data.
Q ) what is machine Learning?
Machine learning is a subset of AI.
Limitation of Expert System
Machine learning is when a program has the
Lack human common sense.
ability to automatically adapt its own processes
Can’t make creative responses in unusual or new and/or data.
Machine learning is a data analytics technique
circumstances.
that teaches computers to do what comes
Can’t always explain clearly their logic and
naturally to humans and animals: learn from
reasoning.
experience.
Lack a degree of flexibility.
Here are some examples:
Not able to recognize when no answer is actually
 Email spam detection. Machine learning could
available.
look at patterns where email has words like
Do not learn unless the knowledge base/expert
"free" or "guarantee". Email address domain
system is updated.
is on a blocked-list. A link displayed in text
Only give percentage probability that answer
doesn't match the URL behind it.
could be correct.
 Credit card fraud detection. Machine learning
could look at patterns like the spending in a
Advantages of Expert System
zip code the owner doesn't usually visit;
– reduces the time taken to solve a problem
buying a big-ticket item; or a sudden shopping
– can predict future faults
spree.
– can lower wage bills (less skilled work force
needed)
33 | P a g e
34 | P a g e
Block Diagrams
2a s23 qp11-Q 10) Cyber Security
10 A student uses the internet for their schoolwork to research what is meant by pharming.
(b) Draw and annotate a diagram to represent the process of pharming. [4]
One mark for each correct part of the diagram. Diagram shows:
• User clicks/opens attachment/link that triggers download
• Malicious software downloaded onto user's computer
• User enters website address
• User is redirected to fake website

e.g.
User types in
User web address
Real
computer website
malware

Fake
Request website
gets
User clicks link that redirected
downloads malware
to computer

0a Specimen 1a Q8) Hardware – Storage


8 (a) Draw a diagram to represent how virtual memory is created and used. [4]

One mark for each part of the diagram: The diagram shows:
• a hard drive
• the hard drive portioned in some way to create virtual memory
• RAM
• an indication of pages transferred between the RAM and the virtual memory.
35 | P a g e
2b s23 qp12 Q7) Cyber Security
7 A distributed denial of service attack (DDoS) is a cyber security threat.
(a) Draw and annotate a diagram to represent the process of a DDoS. [6]

One mark for each part of the diagram (MAX six).


The diagram demonstrates:
 Malware downloaded to several computers
 … turning it into a bot/zombie
 … creating a network of bots/zombies
 Third party/hacker initiating the attack
 Bots send requests to a web server at the same time
 The web server fails due to the requests
 Legitimate requests cannot reach the web server
36 | P a g e
3b w23 p12 -Q8 Security
8 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.[4]

The diagram demonstrates (One mark for each part of the diagram):
Data is being sent from one device to another
The data is being examined during transmission
Packet sniffer is used
Intercepted data is reported to a third-party during transmission …
… and analysed for anything useful
Connection hacked to spoof destination address
37 | P a g e
3c w23 P13 Q8-Internet
8 Draw and annotate a diagram to represent the role of a router. [4]

The diagram demonstrates (one mark for each part):


− The router examining the packet …
− … looks for the packet header
− … looking for the IP address of destination
− The packet being sent toward its correct destination
− … by the fastest route // decides which route it takes
− Router is shown connecting devices/networks
− Router is shown assigning an IP address to a device
38 | P a g e
4b FM24 P12- Q4) Internet, Steps of visiting a website
4 A student enters a uniform resource locator (URL) into their web browser.
Draw and annotate a diagram to show the process from the user entering the URL to the web browser
displaying the web page. [5]

You might also like