Paper 1 Diagrams
Paper 1 Diagrams
Draw and annotate a diagram to show the process from the user entering the URL to the web
browser displaying the web page.
1. URL
DNS
Student's
computer 3. IP URLs IP
…..co.uk 250.256..
…..co.uk 058.51..
Web server
5. Process request
[5]
AFSHAN SHAHID
03345497149
3 The computer processes instructions using the fetch–decode–execute (FDE) cycle.
Draw and annotate a diagram to show the process of the fetch stage of the FDE cycle.
PC sends address to
MAR then increments
[4]
AFSHAN SHAHID
03345497149
5 A company has a website that is suffering a distributed denial of service (DDoS) attack.
(a) Draw and annotate a diagram to show the process of the DDoS.
Botnet
bot
bot
third web
party Requests server
bot
Third party
sends
Web server
malware.
bot cannot handle
all the requests
and crashes.
Malware turns
computers
into bots.
[5]
AFSHAN SHAHID
03345497149
7 Draw and annotate a diagram to show how a payment transaction is made using digital
currency and blockchain.
Transaction is
stored in a block Block hash
Digital ledger Block
AFSHAN SHAHID
03345497149
9 Draw and annotate a diagram to show how the web page is located and retrieved to be
displayed on the student’s tablet computer.
Searches for
matching IP
address
IP address returned
Sent to next
Request Web pages DNS if URL
sent sent not found
DNS
Web server
AFSHAN SHAHID
03345497149
Complete and annotate the diagram to show how the data is decoded once it has been
10
fetched into the MDR.
Decodes
Control unit instruction using
instruction set
MDR CIR
Instruction
sent using
data bus
User types in
web address
User
Real
computer
website
malware
Fake
Request website
gets
User clicks link that redirected
downloads malware
to computer
AFSHAN SHAHID
03345497149
12 A distributed denial of service attack (DDoS) is a cyber security threat.
BOT
Botnet Web
Requests
server
BOT BOT
Computer
[6]
13
AFSHAN SHAHID
03345497149
14 Complete and annotate the diagram to demonstrate how packet switching is used to transmit data
across a network, including the use of routers, from Device A to Device B.
Device A Device B
AFSHAN SHAHID
03345497149
15 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.
16
AFSHAN SHAHID
03345497149
17
[4]
A URL is typed into a browser address bar using the following format:
19
AFSHAN SHAHID
03345497149