100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

EDEXCEL GCSE COMPUTER SCIENCE EXAM WITH VERIFIED QUESTIONS AND ANSWERS|| GUARANTEED PASS|| ALREADY GRADED A+|| LATEST VERSION 2025

Beoordeling
-
Verkocht
-
Pagina's
34
Cijfer
A+
Geüpload op
04-12-2025
Geschreven in
2025/2026

EDEXCEL GCSE COMPUTER SCIENCE EXAM WITH VERIFIED QUESTIONS AND ANSWERS|| GUARANTEED PASS|| ALREADY GRADED A+|| LATEST VERSION 2025 Explain the topology of a bus network - ANSWER-A bus network has all nodes connected to a main cable called the bus In a bus network if a node is turned off data can still travel through the network In a bus network devises transmitting at the same time can result in data collisions Explain why network security is important - ANSWER-Network security is important to protect the data of the organisation Network security is important to protect private and personal information Network security is important as stolen data could result in prosecution and a large fine Explain what authentication and validation are - ANSWER-Authentication is the process of determining whether someone logging in is who they claim to be Authentication is accomplished with the use of a login name and a password Validation ensures that each password conforms to the password policy of the organisation A strong password will include at least 8 characters, symbols, numbers and be changed regularly Explain what access control is - ANSWER-Access control determines the user's rights to the files stored on a network Access control can prevent users from seeing certain files or only being allowed read access to some data Access control can also determine who is able delete and create files and folders Explain what physical security is - ANSWER-Physical security is the first line of defence to preventing unauthorised people from accessing a network Physical security can include locks, swipe cards, biometrics and CCTV cameras Explain what firewalls are - ANSWER-Firewalls can be both hardware and software based Firewalls protect a network connected to a WAN by monitoring incoming and outgoing data Firewalls can be configured to allow data from approved addresses Firewalls can prevent certain programs from accessing the internet or data being sent to certain addresses Explain the security issues associated with cloud storage - ANSWER-Data privacy is a concern as because data is stored elsewhere, it might be impossible to know who has access ...you will not know how many people have access to the remote server it is stored on Lack of control is a concern as you are not directly in control of the cloud service ...you will not know if the system is being backed up or suffering from virus or malware infestations Explain what cyberattacks are - ANSWER-Cyberattacks are an attempt by hackers to damage or destroy a computer network or system Cyberattacks are used to access, copy, modify or delete data on the network Cyberattacks are used to alter a system to be unusable Explain why both antivirus and anti-malware need to be regularly updated - ANSWER-Explain why both antivirus and anti-malware need to be regularly updated Both Antivirus and Anti-Malware need to be constantly updated ...to ensure they have the most up to date list of possible viruses and malware programs Give examples of application software and what each one is used for - ANSWER-One example of application software is a spreadsheet ...this could be used by a biologist to model the behaviour of colonies Image Editing - Cropping images for insertion into a presentation Live Chat - For getting technical support help from a vendor support site Web Browser - For looking up the address of a colleague at a different university Presentation -- Showing results of his research to colleagues at a conference Video Editing -- Creating a video to put on YouTube of his lectures for his students

Meer zien Lees minder
Instelling
EDEXCEL GCSE COMPUTER SCIENCE
Vak
EDEXCEL GCSE COMPUTER SCIENCE











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
EDEXCEL GCSE COMPUTER SCIENCE
Vak
EDEXCEL GCSE COMPUTER SCIENCE

Documentinformatie

Geüpload op
4 december 2025
Aantal pagina's
34
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

EDEXCEL GCSE COMPUTER SCIENCE EXAM
WITH VERIFIED QUESTIONS AND ANSWERS||
GUARANTEED PASS|| ALREADY GRADED A+||
LATEST VERSION 2025




Explain the topology of a bus network - ANSWER-A bus network has all nodes
connected to a main cable called the bus
In a bus network if a node is turned off data can still travel through the network
In a bus network devises transmitting at the same time can result in data
collisions


Explain why network security is important - ANSWER-Network security is
important to protect the data of the organisation
Network security is important to protect private and personal information
Network security is important as stolen data could result in prosecution and a
large fine


Explain what authentication and validation are - ANSWER-Authentication is
the process of determining whether someone logging in is who they claim to be
Authentication is accomplished with the use of a login name and a password
Validation ensures that each password conforms to the password policy of the
organisation
A strong password will include at least 8 characters, symbols, numbers and be
changed regularly

,Explain what access control is - ANSWER-Access control determines the user's
rights to the files stored on a network
Access control can prevent users from seeing certain files or only being allowed
read access to some data
Access control can also determine who is able delete and create files and folders


Explain what physical security is - ANSWER-Physical security is the first line
of defence to preventing unauthorised people from accessing a network
Physical security can include locks, swipe cards, biometrics and CCTV cameras


Explain what firewalls are - ANSWER-Firewalls can be both hardware and
software based
Firewalls protect a network connected to a WAN by monitoring incoming and
outgoing data
Firewalls can be configured to allow data from approved addresses
Firewalls can prevent certain programs from accessing the internet or data being
sent to certain addresses


Explain the security issues associated with cloud storage - ANSWER-Data
privacy is a concern as because data is stored elsewhere, it might be impossible
to know who has access
...you will not know how many people have access to the remote server it is
stored on
Lack of control is a concern as you are not directly in control of the cloud
service
...you will not know if the system is being backed up or suffering from virus or
malware infestations


Explain what cyberattacks are - ANSWER-Cyberattacks are an attempt by
hackers to damage or destroy a computer network or system
Cyberattacks are used to access, copy, modify or delete data on the network

,Cyberattacks are used to alter a system to be unusable


Explain why both antivirus and anti-malware need to be regularly updated -
ANSWER-Explain why both antivirus and anti-malware need to be regularly
updated
Both Antivirus and Anti-Malware need to be constantly updated
...to ensure they have the most up to date list of possible viruses and malware
programs


Give examples of application software and what each one is used for -
ANSWER-One example of application software is a spreadsheet
...this could be used by a biologist to model the behaviour of colonies
Image Editing - Cropping images for insertion into a presentation
Live Chat - For getting technical support help from a vendor support site
Web Browser - For looking up the address of a colleague at a different
university
Presentation -- Showing results of his research to colleagues at a conference
Video Editing -- Creating a video to put on YouTube of his lectures for his
students


Give examples of application software and what each one is used for
Explain what computer modelling is - ANSWER-Computer modelling attempts
to abstract the rules and mechanisms that control real life systems
Computer modelling allows those systems to be simulated
...these can be under different conditions and used to answer 'what if' questions
Computer modelling examples include flight simulators, traffic flow and
financial modelling


Explain what the internet is - ANSWER-The Internet is a series of
interconnected networks of networks/machines /hardware

, ...these are geographically distributed networks/machines/hardware
...they use protocols for communication
Access to The Internet is provided by an Internet Service Provider (ISP)


Explain how the internet uses routers - ANSWER-Routers are used to send
packets through the Internet
Packet switching involves routers sending packets to their destination via the
fastest route
Packet switching involves packets being numbered and taking different routes
to the destination


Explain what the World Wide Web (WWW) is - ANSWER-The World Wide
Web (WWW) is the information stored on the hardware
...pages of information stored on servers (pages written in HTML)
...uses HTTP / HTTPS to send/receive pages between servers and clients


Explain the protocols used for the World Wide Web (WWW) - ANSWER-
Protocols for the WWW include HTTP and HTTPS


Explain how domain names are structured - ANSWER-Domain names are the
names of the website visited (e.g. pearson.co.uk, google.com, youtube.com)


Explain why HTTPS is used - ANSWER-When a client/your browser connects
to a website via HTTPS the data is encrypted before transmission
If the data is intercepted by a hacker it will not have any meaning
It can only be read/decrypted using the unique decryption key provided


Explain the environmental impacts of technology - ANSWER-Pollution (water,
air, noise) resulting from the manufacturing process
High energy and water volumes needed for the manufacturing process
€19,00
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
martinmwambingu54
4,0
(1)

Maak kennis met de verkoper

Seller avatar
martinmwambingu54 Johns Hopkins University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
7
Lid sinds
4 maanden
Aantal volgers
1
Documenten
755
Laatst verkocht
6 dagen geleden
A+ EXAM ARCHIVES YOUR BLUEPRINT FOR ACADEMIC SUCCESS!

Welcome to A+ EXAM ARCHIVES – Your New Frontier for Academic Success on Stuvia! We\'re pioneering a fresh approach to study resources. We\'re dedicated to bringing you meticulously engineered, verified study solutions designed to unlock your full potential and drive remarkable academic success. Our commitment is clear: to provide cutting-edge content that is not only exceptionally clear and accurate but also strategically optimized to streamline your learning process. Whether you\'re aiming to master complex concepts, prepare for upcoming challenges, or simply seeking intelligent, reliable study tools, our curated collection of next-gen notes, agile summaries, and comprehensive learning frameworks is built to give you a distinct advantage. We understand that today\'s students need more than just information – they need effective, innovative solutions. That\'s why every document we create is thoughtfully developed to meet your specific learning requirements, ensuring you have the powerful tools to navigate your academic journey with absolute confidence. Join us at the forefront of smarter studying. Explore our store today and be among the first to experience a new level of academic support. Activate your A+ potential now!

Lees meer Lees minder
4,0

1 beoordelingen

5
0
4
1
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen