What is the difference between a logical file and a physical file?
Describe the principles of operation of laser printers and describe how they are applied in real-life scenarios
Steps
Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.
Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques.
Blagging
Phishing
Shouldering
Factors to consider when choosing DTP software. (4 marks)
Describe how the CPU and main memory work together.
Data and instructions are fetched from main memory, from addresses requested by the CPU on the address bus. (Data and instructions are sent) using the data bus. (Data and instructions are then) decoded and executed in the CPU.
Results of operations are sent back to the memory on the data bus
Explain one drawback to a user if the program is distributed as freeware
The user is not allowed to access the source code so, they cannot tailor the software to their needs and they cannot fix any bugs in it
The software is still covered by copyright
The user must get the owner’s permission to do anything beyond using it
Identify four events that take place during the fetch-execute cycle
State three advantages of biometric authentication
A computer operates as a binary digital device. Explain why binary is used to represent computer data.
A company has a website that is stored on a web server.
(a) The website data is broken down into packets to be transmitted to a user.
Describe the structure of a data packet.
Explain the function of the protect sheet feature in the spreadsheet program
Describe what is meant by a MAC address.
Joe plays online games using the world wide web. A sequence of processes is required to open a web page. Describe this sequence of processes
State any four applications of electronic spreadsheets
Name three of the stages in the system life cycle
– fact finding
– feasibility study
– analysis
– design
– testing
– documentation
– implementation/changeover/installation
– evaluation
– maintenance
Describe one way developers ensure that their software addresses inclusivity issues.
Incorporate language support features in their software, which allows users to select their preferred language. This can be achieved through multi-language user interfaces and providing translation capabilities. By doing so, developers address language barriers and make the software accessible to a broader audience, demonstrating a commitment to cultural inclusivity.
Gender inclusivity – use gender-neutral language in examples
Cultural/Racial inclusivity – use a variety of ethnicities in photos
Ability inclusivity – represent awareness of disability in some examples
Sexual preference inclusivity – use language that is supportive of LGBTQI+ people