0% found this document useful (0 votes)
157 views

Paper 1 Diagrams

The document contains a series of tasks requiring diagrams and annotations related to computer networking and cybersecurity concepts. Topics include the process of entering a URL, the fetch-decode-execute cycle, DDoS attacks, digital currency transactions, and packet switching. Each task emphasizes the importance of visual representation in understanding complex processes in computing.

Uploaded by

Malaika Rani
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
157 views

Paper 1 Diagrams

The document contains a series of tasks requiring diagrams and annotations related to computer networking and cybersecurity concepts. Topics include the process of entering a URL, the fetch-decode-execute cycle, DDoS attacks, digital currency transactions, and packet switching. Each task emphasizes the importance of visual representation in understanding complex processes in computing.

Uploaded by

Malaika Rani
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

1 A student enters a uniform resource locator (URL) into their web browser.

Draw and annotate a diagram to show the process from the user entering the URL to the web
browser displaying the web page.

1. URL
DNS
Student's
computer 3. IP URLs IP
…..co.uk 250.256..
…..co.uk 058.51..

4. request to IP 2. Find IP for URL


6. HTML
web page

Web server

5. Process request

[5]

AFSHAN SHAHID
03345497149
3 The computer processes instructions using the fetch–decode–execute (FDE) cycle.

Draw and annotate a diagram to show the process of the fetch stage of the FDE cycle.

PC sends address to
MAR then increments

The address is sent


RAM
Control PC from the MAR using
unit the address bus
MAR
CIR
MDR
The instruction is
sent to the MDR
The instruction is using the data bus
sent to the CIR to be
decoded

[4]

AFSHAN SHAHID
03345497149
5 A company has a website that is suffering a distributed denial of service (DDoS) attack.

(a) Draw and annotate a diagram to show the process of the DDoS.

Botnet
bot

bot
third web
party Requests server

bot
Third party
sends
Web server
malware.
bot cannot handle
all the requests
and crashes.

Malware turns
computers
into bots.

[5]

AFSHAN SHAHID
03345497149
7 Draw and annotate a diagram to show how a payment transaction is made using digital
currency and blockchain.

Transaction is
stored in a block Block hash
Digital ledger Block

Payment When block is full,


data sent it is added to the
blockchain
Customer’s
device
Device encrypts Blockchain
payment data

AFSHAN SHAHID
03345497149
9 Draw and annotate a diagram to show how the web page is located and retrieved to be
displayed on the student’s tablet computer.

Searches for
matching IP
address

URL sent to DNS


Web browser DNS

IP address returned
Sent to next
Request Web pages DNS if URL
sent sent not found

DNS
Web server

AFSHAN SHAHID
03345497149
Complete and annotate the diagram to show how the data is decoded once it has been
10
fetched into the MDR.

Decodes
Control unit instruction using
instruction set
MDR CIR
Instruction
sent using
data bus

11 Draw and annotate a diagram to represent the process of pharming.

User types in
web address
User
Real
computer
website
malware

Fake
Request website
gets
User clicks link that redirected
downloads malware
to computer

AFSHAN SHAHID
03345497149
12 A distributed denial of service attack (DDoS) is a cyber security threat.

(a) Draw and annotate a diagram to represent the process of a DDoS.

Initiates attack Third party

BOT

Botnet Web
Requests
server
BOT BOT

web server fails due


to too many requests
X
Malware downloaded
Cannot connect
to computers turning
to web server
them into bots

Computer

[6]

13

AFSHAN SHAHID
03345497149
14 Complete and annotate the diagram to demonstrate how packet switching is used to transmit data
across a network, including the use of routers, from Device A to Device B.

Device A Device B

5 The diagram demonstrates (one mark for each):

 Packets sent through several routers


 … taking different routes from device A to device B
 Packets arrive out of order
 Packets being reordered when all arrived at device B [4]

AFSHAN SHAHID
03345497149
15 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception.

16

AFSHAN SHAHID
03345497149
17

18 Draw and annotate a diagram to represent the role of a router.

[4]
A URL is typed into a browser address bar using the following format:
19

AFSHAN SHAHID
03345497149

You might also like