100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

EDEXCEL GCSE COMPUTER SCIENCE EXAM WITH VERIFIED QUESTIONS AND ANSWERS|| GUARANTEED PASS|| ALREADY GRADED A+|| LATEST VERSION 2025

Rating
-
Sold
-
Pages
34
Grade
A+
Uploaded on
04-12-2025
Written in
2025/2026

EDEXCEL GCSE COMPUTER SCIENCE EXAM WITH VERIFIED QUESTIONS AND ANSWERS|| GUARANTEED PASS|| ALREADY GRADED A+|| LATEST VERSION 2025 Explain the topology of a bus network - ANSWER-A bus network has all nodes connected to a main cable called the bus In a bus network if a node is turned off data can still travel through the network In a bus network devises transmitting at the same time can result in data collisions Explain why network security is important - ANSWER-Network security is important to protect the data of the organisation Network security is important to protect private and personal information Network security is important as stolen data could result in prosecution and a large fine Explain what authentication and validation are - ANSWER-Authentication is the process of determining whether someone logging in is who they claim to be Authentication is accomplished with the use of a login name and a password Validation ensures that each password conforms to the password policy of the organisation A strong password will include at least 8 characters, symbols, numbers and be changed regularly Explain what access control is - ANSWER-Access control determines the user's rights to the files stored on a network Access control can prevent users from seeing certain files or only being allowed read access to some data Access control can also determine who is able delete and create files and folders Explain what physical security is - ANSWER-Physical security is the first line of defence to preventing unauthorised people from accessing a network Physical security can include locks, swipe cards, biometrics and CCTV cameras Explain what firewalls are - ANSWER-Firewalls can be both hardware and software based Firewalls protect a network connected to a WAN by monitoring incoming and outgoing data Firewalls can be configured to allow data from approved addresses Firewalls can prevent certain programs from accessing the internet or data being sent to certain addresses Explain the security issues associated with cloud storage - ANSWER-Data privacy is a concern as because data is stored elsewhere, it might be impossible to know who has access ...you will not know how many people have access to the remote server it is stored on Lack of control is a concern as you are not directly in control of the cloud service ...you will not know if the system is being backed up or suffering from virus or malware infestations Explain what cyberattacks are - ANSWER-Cyberattacks are an attempt by hackers to damage or destroy a computer network or system Cyberattacks are used to access, copy, modify or delete data on the network Cyberattacks are used to alter a system to be unusable Explain why both antivirus and anti-malware need to be regularly updated - ANSWER-Explain why both antivirus and anti-malware need to be regularly updated Both Antivirus and Anti-Malware need to be constantly updated ...to ensure they have the most up to date list of possible viruses and malware programs Give examples of application software and what each one is used for - ANSWER-One example of application software is a spreadsheet ...this could be used by a biologist to model the behaviour of colonies Image Editing - Cropping images for insertion into a presentation Live Chat - For getting technical support help from a vendor support site Web Browser - For looking up the address of a colleague at a different university Presentation -- Showing results of his research to colleagues at a conference Video Editing -- Creating a video to put on YouTube of his lectures for his students

Show more Read less
Institution
EDEXCEL GCSE COMPUTER SCIENCE
Course
EDEXCEL GCSE COMPUTER SCIENCE











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
EDEXCEL GCSE COMPUTER SCIENCE
Course
EDEXCEL GCSE COMPUTER SCIENCE

Document information

Uploaded on
December 4, 2025
Number of pages
34
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • edexce

Content preview

EDEXCEL GCSE COMPUTER SCIENCE EXAM
WITH VERIFIED QUESTIONS AND ANSWERS||
GUARANTEED PASS|| ALREADY GRADED A+||
LATEST VERSION 2025




Explain the topology of a bus network - ANSWER-A bus network has all nodes
connected to a main cable called the bus
In a bus network if a node is turned off data can still travel through the network
In a bus network devises transmitting at the same time can result in data
collisions


Explain why network security is important - ANSWER-Network security is
important to protect the data of the organisation
Network security is important to protect private and personal information
Network security is important as stolen data could result in prosecution and a
large fine


Explain what authentication and validation are - ANSWER-Authentication is
the process of determining whether someone logging in is who they claim to be
Authentication is accomplished with the use of a login name and a password
Validation ensures that each password conforms to the password policy of the
organisation
A strong password will include at least 8 characters, symbols, numbers and be
changed regularly

,Explain what access control is - ANSWER-Access control determines the user's
rights to the files stored on a network
Access control can prevent users from seeing certain files or only being allowed
read access to some data
Access control can also determine who is able delete and create files and folders


Explain what physical security is - ANSWER-Physical security is the first line
of defence to preventing unauthorised people from accessing a network
Physical security can include locks, swipe cards, biometrics and CCTV cameras


Explain what firewalls are - ANSWER-Firewalls can be both hardware and
software based
Firewalls protect a network connected to a WAN by monitoring incoming and
outgoing data
Firewalls can be configured to allow data from approved addresses
Firewalls can prevent certain programs from accessing the internet or data being
sent to certain addresses


Explain the security issues associated with cloud storage - ANSWER-Data
privacy is a concern as because data is stored elsewhere, it might be impossible
to know who has access
...you will not know how many people have access to the remote server it is
stored on
Lack of control is a concern as you are not directly in control of the cloud
service
...you will not know if the system is being backed up or suffering from virus or
malware infestations


Explain what cyberattacks are - ANSWER-Cyberattacks are an attempt by
hackers to damage or destroy a computer network or system
Cyberattacks are used to access, copy, modify or delete data on the network

,Cyberattacks are used to alter a system to be unusable


Explain why both antivirus and anti-malware need to be regularly updated -
ANSWER-Explain why both antivirus and anti-malware need to be regularly
updated
Both Antivirus and Anti-Malware need to be constantly updated
...to ensure they have the most up to date list of possible viruses and malware
programs


Give examples of application software and what each one is used for -
ANSWER-One example of application software is a spreadsheet
...this could be used by a biologist to model the behaviour of colonies
Image Editing - Cropping images for insertion into a presentation
Live Chat - For getting technical support help from a vendor support site
Web Browser - For looking up the address of a colleague at a different
university
Presentation -- Showing results of his research to colleagues at a conference
Video Editing -- Creating a video to put on YouTube of his lectures for his
students


Give examples of application software and what each one is used for
Explain what computer modelling is - ANSWER-Computer modelling attempts
to abstract the rules and mechanisms that control real life systems
Computer modelling allows those systems to be simulated
...these can be under different conditions and used to answer 'what if' questions
Computer modelling examples include flight simulators, traffic flow and
financial modelling


Explain what the internet is - ANSWER-The Internet is a series of
interconnected networks of networks/machines /hardware

, ...these are geographically distributed networks/machines/hardware
...they use protocols for communication
Access to The Internet is provided by an Internet Service Provider (ISP)


Explain how the internet uses routers - ANSWER-Routers are used to send
packets through the Internet
Packet switching involves routers sending packets to their destination via the
fastest route
Packet switching involves packets being numbered and taking different routes
to the destination


Explain what the World Wide Web (WWW) is - ANSWER-The World Wide
Web (WWW) is the information stored on the hardware
...pages of information stored on servers (pages written in HTML)
...uses HTTP / HTTPS to send/receive pages between servers and clients


Explain the protocols used for the World Wide Web (WWW) - ANSWER-
Protocols for the WWW include HTTP and HTTPS


Explain how domain names are structured - ANSWER-Domain names are the
names of the website visited (e.g. pearson.co.uk, google.com, youtube.com)


Explain why HTTPS is used - ANSWER-When a client/your browser connects
to a website via HTTPS the data is encrypted before transmission
If the data is intercepted by a hacker it will not have any meaning
It can only be read/decrypted using the unique decryption key provided


Explain the environmental impacts of technology - ANSWER-Pollution (water,
air, noise) resulting from the manufacturing process
High energy and water volumes needed for the manufacturing process
$21.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
martinmwambingu54
4.0
(1)

Get to know the seller

Seller avatar
martinmwambingu54 Johns Hopkins University
View profile
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
4 months
Number of followers
1
Documents
755
Last sold
6 days ago
A+ EXAM ARCHIVES YOUR BLUEPRINT FOR ACADEMIC SUCCESS!

Welcome to A+ EXAM ARCHIVES – Your New Frontier for Academic Success on Stuvia! We\'re pioneering a fresh approach to study resources. We\'re dedicated to bringing you meticulously engineered, verified study solutions designed to unlock your full potential and drive remarkable academic success. Our commitment is clear: to provide cutting-edge content that is not only exceptionally clear and accurate but also strategically optimized to streamline your learning process. Whether you\'re aiming to master complex concepts, prepare for upcoming challenges, or simply seeking intelligent, reliable study tools, our curated collection of next-gen notes, agile summaries, and comprehensive learning frameworks is built to give you a distinct advantage. We understand that today\'s students need more than just information – they need effective, innovative solutions. That\'s why every document we create is thoughtfully developed to meet your specific learning requirements, ensuring you have the powerful tools to navigate your academic journey with absolute confidence. Join us at the forefront of smarter studying. Explore our store today and be among the first to experience a new level of academic support. Activate your A+ potential now!

Read more Read less
4.0

1 reviews

5
0
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions