(b) The computer needs an operating system and utility software.
(i) The operating system controls the scheduling of processes.
Describe how the operating system uses scheduling to allocate processor time.
Describe four features of the operating system when providing a graphical user interface on a personal computer. Give a suitable example of each feature.
Windows for example a word processing application and a spreadsheet
Menus, for example, allow the user to perform operations or run applications such as right-click to create a new folder
Icons for example a picture of linked computers for networking
Pointers(mouse or touchscreen) for example to select items/trigger events
Shortcuts for example to frequently used applications for example having a shortcut to your mail client on your desktop
File navigation for example when searching the hard disc for a file/folder using a browser
copying / deleting / moving/sorting/naming/searching of files or folders for example copying of a file from the hard drive to a USB pen drive (File handling)
Desktop customisation for example changing the colours and background image
Copy and paste for example between applications e.g. copying a graph from a spreadsheet to a word processor
Error messages for example provide users with error/warning/help messages for example ‘printer out of paper’
State ways of identifying illegal copies of an operating system
Describe how the database can be recovered from a system failure
Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.
Blagging
Phishing
Shouldering
List two types of disaster recovery tools.
What is data encryption?
Briefly describe the information Security principles or CIA triads
Confidential information about the students is to be stored on the computer system. Explain the measures that can be taken to ensure that such information remains confidential.
- Passwords
- Hierarchy
- Only allow some staff to access student files
- Only some machines able to access
- Physical location of these machines
- Physical lock on machines
- Encrypted data in files
- Firewall if connected to the Internet
State two effects of a computer virus
State two ways of protecting computers against viruses.
Define Data Security
State two data protection rules that should be obeyed by all staff in a hospital.
Describe how the database can be recovered from a system failure
What is a computer virus?
A computer virus is a program designed to damage other programs or causes irregular behaviour in a computer system.
State the symptoms of a computer virus
A virus is a specific category of malware. Describe three other different categories of malware.
Trojan (horse); a program which misleads the user into thinking it is another
piece of software which, when run, executes another program;
Spyware; a program which records data such as usernames and passwords on
a host system and forwards the information to a third party;
Adware; code embedded or attached to program files which will persistently
show adverts (that attempt to generate revenue);
Worm; code which will run autonomously and replicates itself on a host system;
Ransomware; a program that encrypts a user’s data to make it unreadable until
they pay for the key;
Remote Access Tool (RAT); allows access to control and monitor a computer
from a remote network location;
Rootkit; malware that has managed to gain ‘root’ admin privileges;
Bots/Zombies; a program installed on a computer that performs a job for the
remote owner of the bot/zombie such as sending spam or sending web requests
to perform a DOS or attack a computer system;
Scareware; malware that tells you something is wrong with your system in an
attempt to get you to make a purchase;
Keylogger; a program that monitors/records a user’s keystrokes in order to steal
passwords/confidential details
Give three features of a data protection act.
Explain why a firewall improves network security.
State three advantages of biometric authentication