100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

OCR Computer Science Paper 1 Question Fully Answered.

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
15-03-2024
Written in
2023/2024

What is the purpose of systems software? - correct answer Software designed to run or maintain a computer Describe the functionality of systems software. - correct answer It controls the operations of computer hardware What is an operating system? - correct answer A piece of software responsible for running the computer, managing hardware, applications, users and resources What are the 5 things that operating systems are used for? - correct answer providing a UI, memory management/multitasking, peripheral management and drivers, user management, file management What is utility software? - correct answer Software designed to help maintain a computer system What is encryption software? - correct answer Software used for encrypting data What is defragmentation software? - correct answer Reorganising data on a hard drive to put broken up files back together and collect up the free space What is data compression? - correct answer The process of making the size of a file smaller Give the 2 types of backup. - correct answer full and incremental What is Hacking? - correct answer Illegal access or attack on a computer network or device What is malware? - correct answer Malicious software created to damage or gain illegal access to computer systems What is Phishing? - correct answer When criminals send emails or text to someone claiming to be a well-known business. Describe social engineering. - correct answer A way of gaining illegal access to data or networks by influencing people. What is a Brute Force Attack? - correct answer A network attack which uses software to crack security passwords through trial and error. What is a Denial of Service attack? - correct answer A network attack which stops users from accessing a part of a network or website. What is data interception and theft? - correct answer When data is intercepted when travelling across a network. This can be done through packet sniffing or having a wireless connection. What is SQL injection? - correct answer A piece of SQL code which can be typed into an input box to try and attack the SQL database Give an example of a poor network policy. - correct answer unencrypted data, no user access levels, no passwords, no anti-malware or firewall software What is penetration testing? - correct answer The process of simulating attacks on a network to identify its weaknesses What does network forensics involve? - correct answer monitoring the traffic on a network What is a network policy? - correct answer A set of rules and procedures an organisation will follow to ensure their network is protected against attacks What is anti-malware software? - correct answer Software designed to stop malware from damaging a computer or network What is a firewall? - correct answer Software that limits access to and from a computer system Describe user access levels. - correct answer Controls what files or areas of the network different groups of users can access

Show more Read less
Institution
OCR.
Course
OCR.









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
OCR.
Course
OCR.

Document information

Uploaded on
March 15, 2024
Number of pages
7
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

OCR Computer Science Paper 1
What is the purpose of systems software? - correct answer Software designed to run or maintain a computer
Describe the functionality of systems software. - correct answer It controls the operations of computer hardware
What is an operating system? - correct answer A piece of software responsible for running the computer, managing hardware, applications, users and resources
What are the 5 things that operating systems are used for? - correct answer providing a UI, memory management/multitasking, peripheral management and drivers, user management, file management
What is utility software? - correct answer Software designed to help maintain a computer system
What is encryption software? - correct answer Software used for encrypting data
What is defragmentation software? - correct answer Reorganising data on a hard drive to put broken up files back together and collect up the free space
What is data compression? - correct answer The process of making the size of a file smaller
Give the 2 types of backup. - correct answer full and incremental
What is Hacking? - correct answer Illegal access or attack on a computer network or device
What is malware? - correct answer Malicious software created to damage or gain illegal access to computer systems What is Phishing? - correct answer When criminals send emails or text to someone claiming to be a well-
known business.
Describe social engineering. - correct answer A way of gaining illegal access to data or networks by influencing people.
What is a Brute Force Attack? - correct answer A network attack which uses software to crack security passwords through trial and error.
What is a Denial of Service attack? - correct answer A network attack which stops users from accessing a part of a network or website.
What is data interception and theft? - correct answer When data is intercepted when travelling across a network. This can be done through packet sniffing or having a wireless connection.
What is SQL injection? - correct answer A piece of SQL code which can be typed into an input box to try and attack the SQL database
Give an example of a poor network policy. - correct answer unencrypted data, no user access levels, no passwords, no anti-malware or firewall software
What is penetration testing? - correct answer The process of simulating attacks on a network to identify its weaknesses
What does network forensics involve? - correct answer monitoring the traffic on a network
What is a network policy? - correct answer A set of rules and procedures an organisation will follow to ensure their network is protected against attacks
What is anti-malware software? - correct answer Software designed to stop malware from damaging a computer or network

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
RealGrades Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
168
Member since
2 year
Number of followers
52
Documents
11546
Last sold
6 days ago

4.0

26 reviews

5
12
4
5
3
7
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions