A company has a website that is stored on a web server.
(a) The website data is broken down into packets to be transmitted to a user.
Describe the structure of a data packet.
Describe the input, processing and output from a computerised traffic-control system.
input
processing
output
Explain the differences between parallel running and direct changeover as ways of implementing the new system.
Direct changeover – new system replaces existing system immediately/overnight
Parallel running – new system runs alongside/together with existing system
Parallel running – there is always the old system to fall back on in the event of the new system failing/information is not lost/always a second copy
Direct changeover – if things go wrong lose all data/old system is not available
Direct changeover – training is more difficult to organise
Parallel running – training can be gradual Parallel running is more expensive to implement than direct changeover....
Direct changeover is a quicker method of implementation than parallel running
Direct Changeover: The old system is stopped completely, and the new system is started. All of the data that used to be input into the old system, now goes into the new one.
Parallel Running: The new system is started, but the old system is kept running in parallel (side-by-side) for a while. All of the data that is input into the old system, is also input into the new one. Eventually, the old system will be stopped, but only when the new system has been proven to work.
Explain the following terms
(a) Disk mirroring
(b) Encryption
(c) Backup
(a) Disk mirroring- Data is written on two or more disks simultaneously.
(b) Encryption - Contents are scrambled so they cannot be understood without a decryption key
(c) Backup - A copy of the data is taken and stored in another location
Give an example of where a PAN could be used
Sarah uses a range of computing devices to complete her studies, including a desktop computer at home, a laptop at school and her mobile phone. Outline two advantages of cloud computing for Sarah.
Cloud computing refers to the delivery of on-demand computing resources over the internet. Instead of relying on a local server or personal computer, cloud computing allows users to access and utilize a wide range of computing services and resources hosted on remote servers.
State two ways in which data validation is implemented on an input form of a database application
Explain, with examples where appropriate, the following five computer terms.
(a) Buffer
(b)batch processing
(c) e-commerce
(d) simulation
(a) Buffer
(b)batch processing
(c) e-commerce
(d) simulation
(e) Email
Explain three ways a computer can store negative numbers (3 marks)
Prefixing an extra sign bit- A negative number is representes by prefixing a digit 1 to the number
Ones complement- This is flipping the binary equivalent of the number
Twos complement- this involves getting the ones complement and then adding a 1
Differentiate between object code and source code
Give one reason why a phased implementation would be the best approach to follow in this case.
A car park uses a number plate recognition system. Identify the reason why unsigned integers should be used to record the number of cars entering and leaving the car park, rather than signed integers
802.3 is the standard for ethernet wired networks and 802.11x is the standard for ethernet
wireless networks.
Outline why standards such as these are important in the development of network devices and
software.
Explain why it is not always true that a computer which has a quad-core processor runs twice as fast as a computer with a dual-core processor
Describe two possible causes of computer failure. In each case state how it could have been prevented
Describe the main characteristics that distinguish high-level programming languages from low-level languages.
Journalists are issued with laptops when they start working at a magazine publishing company. The company only uses free open-source software (FOSS).
The laptops are equipped with either an HDD or an SSD.
The journalists can access their data remotely using virtualisation or Software
as a Service (SaaS).
2.3.1 Define the term virtualisation. (1)
2.3.2 Office365 is an example of SaaS.
(a) Except for remote data access, state TWO benefits of using
SaaS. (2)
(b) Describe how the license model of SaaS works. (2)
2.1.1 Explain the concept of open source in the context of FOSS. (2)
Give ONE example of a free operating system the company could install on a laptop. (1)
2.1.3 State TWO disadvantages of using free open-source software.
Give two other uses of hexadecimal in computer science.
Explain why solid state storage is the best choice for a fitness tracker.
OR
OR
Students are using their wireless notebooks to complete their work in a classroom. They will need to connect wirelessly to a printer to print their answers at the end of the lesson.
Describe how CSMA/CA (Carrier-sense multiple access with collision avoidance) operates in the above scenario.