OCR Computer Science Paper 1
ALREADY PASSED
What is the purpose of systems software? - =Software designed to run or maintain a computer
Describe the functionality of systems software. - =It controls the operations of computer
hardware
What is an operating system? - =A piece of software responsible for running the computer,
managing hardware, applications, users and resources
What are the 5 things that operating systems are used for? - =providing a UI, memory
management/multitasking, peripheral management and drivers, user management, file
management
What is utility software? - =Software designed to help maintain a computer system
What is encryption software? - =Software used for encrypting data
What is defragmentation software? - =Reorganising data on a hard drive to put broken up files
back together and collect up the free space
What is data compression? - =The process of making the size of a file smaller
Give the 2 types of backup. - =full and incremental
What is Hacking? - =Illegal access or attack on a computer network or device
What is malware? - =Malicious software created to damage or gain illegal access to computer
systems
, What is Phishing? - =When criminals send emails or text to someone claiming to be a well-
known business.
Describe social engineering. - =A way of gaining illegal access to data or networks by
influencing people.
What is a Brute Force Attack? - =A network attack which uses software to crack security
passwords through trial and error.
What is a Denial of Service attack? - =A network attack which stops users from accessing a part
of a network or website.
What is data interception and theft? - =When data is intercepted when travelling across a
network. This can be done through packet sniffing or having a wireless connection.
What is SQL injection? - =A piece of SQL code which can be typed into an input box to try and
attack the SQL database
Give an example of a poor network policy. - =unencrypted data, no user access levels, no
passwords, no anti-malware or firewall software
What is penetration testing? - =The process of simulating attacks on a network to identify its
weaknesses
What does network forensics involve? - =monitoring the traffic on a network
What is a network policy? - =A set of rules and procedures an organisation will follow to ensure
their network is protected against attacks
What is anti-malware software? - =Software designed to stop malware from damaging a
computer or network
ALREADY PASSED
What is the purpose of systems software? - =Software designed to run or maintain a computer
Describe the functionality of systems software. - =It controls the operations of computer
hardware
What is an operating system? - =A piece of software responsible for running the computer,
managing hardware, applications, users and resources
What are the 5 things that operating systems are used for? - =providing a UI, memory
management/multitasking, peripheral management and drivers, user management, file
management
What is utility software? - =Software designed to help maintain a computer system
What is encryption software? - =Software used for encrypting data
What is defragmentation software? - =Reorganising data on a hard drive to put broken up files
back together and collect up the free space
What is data compression? - =The process of making the size of a file smaller
Give the 2 types of backup. - =full and incremental
What is Hacking? - =Illegal access or attack on a computer network or device
What is malware? - =Malicious software created to damage or gain illegal access to computer
systems
, What is Phishing? - =When criminals send emails or text to someone claiming to be a well-
known business.
Describe social engineering. - =A way of gaining illegal access to data or networks by
influencing people.
What is a Brute Force Attack? - =A network attack which uses software to crack security
passwords through trial and error.
What is a Denial of Service attack? - =A network attack which stops users from accessing a part
of a network or website.
What is data interception and theft? - =When data is intercepted when travelling across a
network. This can be done through packet sniffing or having a wireless connection.
What is SQL injection? - =A piece of SQL code which can be typed into an input box to try and
attack the SQL database
Give an example of a poor network policy. - =unencrypted data, no user access levels, no
passwords, no anti-malware or firewall software
What is penetration testing? - =The process of simulating attacks on a network to identify its
weaknesses
What does network forensics involve? - =monitoring the traffic on a network
What is a network policy? - =A set of rules and procedures an organisation will follow to ensure
their network is protected against attacks
What is anti-malware software? - =Software designed to stop malware from damaging a
computer or network