100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

OCR COMPUTER SCIENCE PAPER 1 EXAM QUESTIONS AND ANSWERS ALREADY GRADED A+

Rating
-
Sold
-
Pages
7
Uploaded on
28-12-2023
Written in
2023/2024

What is the purpose of systems software? Software designed to run or maintain a computer Describe the functionality of systems software. It controls the operations of computer hardware Brainpower Read More Previous Play Next Rewind 10 seconds Move forward 10 seconds Unmute 0:01 / 0:15 Full screen What is an operating system? A piece of software responsible for running the computer, managing hardware, applications, users and resources What are the 5 things that operating systems are used for? providing a UI, memory management/multitasking, peripheral management and drivers, user management, file management What is utility software? Software designed to help maintain a computer system What is encryption software? Software used for encrypting data What is defragmentation software? Reorganising data on a hard drive to put broken up files back together and collect up the free space What is data compression? The process of making the size of a file smaller Give the 2 types of backup. full and incremental What is Hacking? Illegal access or attack on a computer network or device What is malware? Malicious software created to damage or gain illegal access to computer systems What is Phishing? When criminals send emails or text to someone claiming to be a well-known business. Describe social engineering. A way of gaining illegal access to data or networks by influencing people. What is a Brute Force Attack? A network attack which uses software to crack security passwords through trial and error. What is a Denial of Service attack? A network attack which stops users from accessing a part of a network or website. What is data interception and theft? When data is intercepted when travelling across a network. This can be done through packet sniffing or having a wireless connection. What is SQL injection? A piece of SQL code which can be typed into an input box to try and attack the SQL database Give an example of a poor network policy. unencrypted data, no user access levels, no passwords, no anti-malware or firewall software What is penetration testing? The process of simulating attacks on a network to identify its weaknesses What does network forensics involve? monitoring the traffic on a network What is a network policy? A set of rules and procedures an organisation will follow to ensure their network is protected against attacks What is anti-malware software? Software designed to stop malware from damaging a computer or network What is a firewall? Software that limits access to and from a computer system Describe user access levels. Controls what files or areas of the network different groups of users can access How can a password be made secure? more varied range of characters What is encryption? Coding data so that it can only be decoded with the correct key. Give examples of network topologies. star, mesh, bus, tree What is a star network? A network topology where all devices are connected to a central switch or server which controls the network What is a mesh network? A network topology where every device is directly or indirectly connected to every other without a central switch or server What is Wi-Fi? The standard used for wireless connections between devices What is ethernet? Network protocol used on LANs What is an IP address? A unique identifier given to a device when it accesses an IP network What is a MAC address? A unique identifier assigned to a device that cannot be changed. Give the 7 most common protocols TCP/IP, HTTP, HTTPS, FTP, POP, IMAP, SMTP Describe the layering system. groups of protocols that have similar functions What is the Application layer? Turning data into websites and other applications and vice versa. What is the Transport layer? Controlling data flow- e.g. splitting data into packets and checking packets are correctly sent and delivered. What is the Internet layer? Making connections between networks, directing data packets and handling traffic. Used by routers. What is the Network layer? Passing data over the physical network. Responsible for how bits are sent as electrical signals over cables, wireless and other hardware. What is a packet? Small, equal-sized units of data used to transfer files over networks What is packet switching? The process of directing data packets on a network using routers and the IP protocol. Name 2 types of network. LAN WAN What is LAN? (Local area network) A network which only covers a single site What is WAN? (wide area network) A network which connects networks in different geographical locations Give some factors that might affect the performance of a network. Bandwidth, number of users, wired connection, hardware, network topology

Show more Read less
Institution
OCR GCSE COMPUTER SCIENCE
Course
OCR GCSE COMPUTER SCIENCE









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
OCR GCSE COMPUTER SCIENCE
Course
OCR GCSE COMPUTER SCIENCE

Document information

Uploaded on
December 28, 2023
Number of pages
7
Written in
2023/2024
Type
Exam (elaborations)
Contains
Unknown

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BRAINBOOSTERS Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
648
Member since
2 year
Number of followers
250
Documents
22594
Last sold
7 hours ago

In this page you will find all documents , flashcards and package deals offered by seller BRAINBOOSTERS

4.5

340 reviews

5
264
4
30
3
21
2
5
1
20

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions