Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1.Transport Layer Security (TLS) protocol is used to secure the transmission of data over the Internet. (a) Identify the two layers in the TLS protocol

1.Transport Layer Security (TLS) protocol is used to secure the transmission of data over the Internet. (a) Identify the two layers in the TLS protocol

(b) The following paragraph explains how data is sent securely using the TLS protocol. Use the terms to complete the paragraph. Not all terms may need to be used. authentic binary browser certificate internet service provider signal web page web server website The browser requests the .................................................................... to identify itself by providing its .................................................................... . This is sent and a check is performed to see if it is .................................................................... . If it is, the ................................................................... sends a ................................................................... back to the web server and data transmission begins. [5] (c) Identify one other protocol that can be used to secure data transmission over the Internet.

2.Luke is creating a website for his t-shirt design business. (a) He is using HTML to create the website. HTML can be separated into structure and presentation. (i) Give two examples of HTML structure. Example 1 ......................................................................................................................... Example 2 ......................................................................................................................... [2] (ii) Give two examples of HTML presentation. Example 1 ......................................................................................................................... Example 2 .

(b) Luke is concerned that his web server may be hacked or subjected to a denial of service (DoS) attack. State two security methods that Luke could use to help protect the web server from hacking or a DoS attack.

3.A Von Neumann model for a computer system contains several integrated circuits (IC). (a) Parallel data transmission is used in an IC. (i) Describe how data is transmitted using parallel data transmission.

(ii) Give one benefit of using parallel, rather than serial, data transmission. ........................................................................................................................................... ..................................................................................................................................... [1] (b) The computer has a central processing unit (CPU). (i) Identify the bus that carries signals around the CPU to control the components. ..................................................................................................................................... [1] (ii) Identify the register built into the arithmetic logic unit (ALU). ............................................................................................................

(iii) Four statements about a Von Neumann model for a computer system are shown. Tick (3) to show if each statement is True or False. Statement True (3) False (3) Data and instructions are stored in the same memory unit The control unit manages operations within the CPU Data and instructions can be fetched into the CPU at the same time The control unit is responsible for decoding an instruction

4.Nina is recording some music tracks that she has written. She is researching whether she should record them in MIDI or MP3 format. Explain what is meant by MIDI and MP3 format.

5.Matthew is buying a new television with a display that uses LED technology. (a) Explain what is meant by LED technology.

(b) State three benefits of LED technology.

(c) Identify one other technology that could have been used for the display

6.Victoria is entering data into a computer system. The data will be transmitted to cloud storage. (a) An even parity check is used to check for errors in the binary values after transmission. For each of the 7-bit binary values, write the Parity bit that makes sure even parity is met. 7-bit binary value Parity bit 1100010 ...................... 1001011 ...................... 0100010 ...................... 0010111

(b) Identify two other error checking methods that could be used to check the binary values are correct after transmission. Method 1 ................................................................................................................................... Method 2 ................................................................................................................................... [2] (c) A check digit is used to check whether data is correct when entered into the system. Describe how a check digit can be used to make sure the data entered is correct.

7.Tina is creating a website for charity events. She uses HTML to create the website. (a) State what is meant by HTML. ................................................................................................................................................... ............................................................................................................................................. [1] (b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website. (i) State whether background colour is an example of structure or presentation, in the website. ..................................................................................................................................... [1] (ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers. Give the 8-bit binary values for each part of the hexadecimal code. 43 B7 F0 [6] (c) Tina uses a microphone to record a welcome message for her website. (i) State whether the microphone is an input or output device.

(ii) She wants to compress the recording to make sure that the file is as small as possible for the website. Identify which type of compression she should use and describe how this would compress the file for the website. Type of compression ......................................................................................................... Description

(iii) Give two benefits of compressing the file for the website.

(d) Tina will use the TLS protocol in her website when selling tickets to people for different charity events. This makes sure that their personal data is transmitted securely. (i) Identify the two layers that are present in the TLS protocol. Layer 1 .............................................................................................................................. Layer 2 .............................................................................................................................. [2] (ii) Explain how data is sent securely using the TLS protocol.

(e) Tina is concerned about security threats to her web server. (i) Identify three security threats to her web server that Tina might be concerned about. [3] (ii) Tina installs a proxy server to help protect her website from security threats. Describe how the proxy server will help protect the website.

8.Alessandro has some important data stored on his computer. He is concerned about accidental damage to his data. (a) (i) Identify three ways that the data could be accidentally damaged. 1 ........................................................................................................................................ [3] (ii) State what Alessandro could do to make sure that he can retrieve his data if it is accidentally damaged.

(b) Alessandro uses an SSD to store his data. Describe what is meant by an SSD and how it operates to store data.

(c) Alessandro also uses off-line storage to store his data. Three examples of off-line storage are Blu-ray, CD and DVD. Six statements are given about off-line storage. Tick () to show if each statement applies to Blu-ray, CD, or DVD. Some statements apply to more than one example of off-line storage. Statement Blu-ray () CD () DVD () A type of optical storage Has the largest storage capacity Can be dual layer Read using a red laser Has the smallest storage capacity Stores data in a spiral track

9.Paige has a computer that has a central processing unit (CPU) based on the Von Neumann model for a computer system. (a) Identify the component within the CPU that controls the flow of data. ............................................................................................................................................. [1] (b) Identify the component within the CPU where calculations are carried out. ............................................................................................................................................. [1] (c) Identify the component within the CPU that stores the address of the next instruction to be processed. ............................................................................................................................................. [1] (d) Identify the register within the CPU that holds an instruction that has been fetched from memory. ............................................................................................................................................. [1] (e) Identify the register within the CPU that holds data that has been fetched from memory

10.Eugene has a web server that stores his online shopping website. Customers access the website using a browser. (a) Describe how the webpages are requested and displayed on the customer's computer.

b) State three online security threats to Eugene's web server

11.Elsa writes a paragraph in an examination about encryption. There are several terms missing from the paragraph. Complete the paragraph using the list of given terms. Not all terms may need to be used. Some terms may be used more than once. algorithm alphanumeric cookie cypher key padlock plain word processed The data is encrypted using a ....................................................................... . This is an ....................................................................... that is used to scramble the data. The data before encryption is known as ....................................................................... text. When the data has been encrypted it is known as ....................................................................... text. To read the encrypted data it needs to be decrypted using a ....................................................................... .

11.Four 7-bit binary values are transmitted from one computer to another. A parity bit was added to each binary value creating 8-bit binary values. All the binary values have been transmitted correctly. (a) Tick (3) to show whether an Even or an Odd parity check has been used for each binary value. 8-bit binary value Even (3) Odd (3) 10000001 10000010 00101001 00101000 [4] (b) A parity check may not always detect errors that have occurred in data transmission. State why a parity check may not detect data transmission errors. ............................................................................................................................................. [1] (c) Give one other error checking method that could be used to check for errors in data transmission.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles Of Information Security

Authors: Michael E. Whitman, Herbert J. Mattord

7th Edition

035750643X, 978-0357506431

More Books

Students also viewed these Programming questions

Question

=+b) Form the F-statistic by dividing the two mean squares.

Answered: 1 week ago