Edexcel GCSE Computer Science
Do functions return a value? - ANS- Yes
Do procedures return a value? - ANS- No
How are 24-bits used to represent colour in an image that used 24 bit colour depth? -
ANS- All colours are combinations of RGB and each R,G and B are 8 bits so 3 colours * 8
bits = 24 bits
How can operating systems be made secure to prevent vulnerabilities ? - ANS- Limiting
user accounts
Directory permission
Installing patches
How does the operating system use scheduling to allocate processor time? - ANS- All
processes are held in a queue and processes are prioritised
How is data written to and read from flash memory? - ANS- A strong electric current is
used to force electrons through a barrier and trap them on the other side
Name 3 examples of embedded systems? - ANS- GPS
MP3 Players
Cameras
Name 4 security threats - ANS- Unpatched software
Eavesdropping
Social engineering (tricking people)
Malicious code
Process of communication in client-sever network model - ANS- Client uses address of
server to connect to it. Client requests data from the server.Using the clients address the
server sends the data
Types of utility software - ANS- Disk fragmentation
back up programmes
encryption
anti-virus
, compression software
What are device drivers? - ANS- Small programs stored on the hard drive that tell the
computer how to communicate with peripheral devices
What are examples of High-level programming languages? - ANS- Java
Python
What are examples of low level programming languages? - ANS- Assembly
Machine code
What are examples of open source software? - ANS- Firefox
Linux
Python
What are examples of proprietary software? - ANS- Windows
Microsoft Office
Logic music
What are examples of unethical behaviour online? - ANS- Cyberbullying
Plagiarising
Exchanging compromising photos
What are examples of volatile memory? - ANS- RAM, cache
What are good programming practices to prevent vulnerabilities? - ANS- Regular code
reviews
Modular testing(testing sections of code individually to ensure the work correctly)
Error handling
What are libraries? - ANS- Collections of pre-written subprograms for specific purposes
What are records? - ANS- Groups of fields(rows)
What are registers? - ANS- Memory inside CPU used to store data needed during
processing
What are the advantages of a client-server network ? - ANS- Server can backup and
store data centrally
What are the advantages of a Mesh topology? - ANS- New nodes can be added without
interfering other nodes
Do functions return a value? - ANS- Yes
Do procedures return a value? - ANS- No
How are 24-bits used to represent colour in an image that used 24 bit colour depth? -
ANS- All colours are combinations of RGB and each R,G and B are 8 bits so 3 colours * 8
bits = 24 bits
How can operating systems be made secure to prevent vulnerabilities ? - ANS- Limiting
user accounts
Directory permission
Installing patches
How does the operating system use scheduling to allocate processor time? - ANS- All
processes are held in a queue and processes are prioritised
How is data written to and read from flash memory? - ANS- A strong electric current is
used to force electrons through a barrier and trap them on the other side
Name 3 examples of embedded systems? - ANS- GPS
MP3 Players
Cameras
Name 4 security threats - ANS- Unpatched software
Eavesdropping
Social engineering (tricking people)
Malicious code
Process of communication in client-sever network model - ANS- Client uses address of
server to connect to it. Client requests data from the server.Using the clients address the
server sends the data
Types of utility software - ANS- Disk fragmentation
back up programmes
encryption
anti-virus
, compression software
What are device drivers? - ANS- Small programs stored on the hard drive that tell the
computer how to communicate with peripheral devices
What are examples of High-level programming languages? - ANS- Java
Python
What are examples of low level programming languages? - ANS- Assembly
Machine code
What are examples of open source software? - ANS- Firefox
Linux
Python
What are examples of proprietary software? - ANS- Windows
Microsoft Office
Logic music
What are examples of unethical behaviour online? - ANS- Cyberbullying
Plagiarising
Exchanging compromising photos
What are examples of volatile memory? - ANS- RAM, cache
What are good programming practices to prevent vulnerabilities? - ANS- Regular code
reviews
Modular testing(testing sections of code individually to ensure the work correctly)
Error handling
What are libraries? - ANS- Collections of pre-written subprograms for specific purposes
What are records? - ANS- Groups of fields(rows)
What are registers? - ANS- Memory inside CPU used to store data needed during
processing
What are the advantages of a client-server network ? - ANS- Server can backup and
store data centrally
What are the advantages of a Mesh topology? - ANS- New nodes can be added without
interfering other nodes