Question
Question 1: 1. Transport Layer Security (TLS) protocol is used to secure the transmission of data over the Internet. (a) Identify the two layers in
Question 1:
1. Transport Layer Security (TLS) protocol is used to secure the transmission of data over the Internet. (a) Identify the two layers in the TLS protocol
(b) The following paragraph explains how data is sent securely using the TLS protocol. Use the terms to complete the paragraph. Not all terms may need to be used. authentic binary browser certificate internet service provider signal web page web server website The browser requests the .................................................................... to identify itself by providing its .................................................................... . This is sent and a check is performed to see if it is .................................................................... . If it is, the ................................................................... sends a ................................................................... back to the web server and data transmission begins. [5] (c) Identify one other protocol that can be used to secure data transmission over the Internet
Question 2:
Luke is creating a website for his t-shirt design business. (a) He is using HTML to create the website. HTML can be separated into structure and presentation. (i) Give two examples of HTML structure. Example 1 ......................................................................................................................... Example 2 ......................................................................................................................... [2] (ii) Give two examples of HTML presentati
(b) Luke is concerned that his web server may be hacked or subjected to a denial of service (DoS) attack. State two security methods that Luke could use to help protect the web server from hacking or a DoS attack
(ii) Give one benefit of using parallel, rather than serial, data transmission.
(b) The computer has a central processing unit (CPU). (i) Identify the bus that carries signals around the CPU to control the components. ..................................................................................................................................... [1] (ii) Identify the register built into the arithmetic logic unit (ALU)
(iii) Four statements about a Von Neumann model for a computer system are shown. Tick (3) to show if each statement is True or False. Statement True (3) False (3) Data and instructions are stored in the same memory unit The control unit manages operations within the CPU Data and instructions can be fetched into the CPU at the same time The control unit is responsible for decoding an instruction
Question 3:
Nina is recording some music tracks that she has written. She is researching whether she should record them in MIDI or MP3 format. Explain what is meant by MIDI and MP3 format.
8 Matthew is buying a new television with a display that uses LED technology. (a) Explain what is meant by LED technology
(b) State three benefits of LED technology
(c) Identify one other technology that could have been used for the display.
Question 4:
Victoria is entering data into a computer system. The data will be transmitted to cloud storage. (a) An even parity check is used to check for errors in the binary values after transmission. For each of the 7-bit binary values, write the Parity bit that makes sure even parity is met. 7-bit binary value Parity bit 1100010 ...................... 1001011 ...................... 0100010 ...................... 0010111
(b) Identify two other error checking methods that could be used to check the binary values are correct after transmission. Method 1 ................................................................................................................................... Method 2 ................................................................................................................................... [2] (c) A check digit is used to check whether data is correct when entered into the system. Describe how a check digit can be used to make sure the data entered is correct.
Question 5:
Tina is creating a website for charity events. She uses HTML to create the website. (a) State what is meant by HTML. ................................................................................................................................................... ............................................................................................................................................. [1] (b) She uses the hexadecimal colour code #43B7F0 as the background colour for her website. (i) State whether background colour is an example of structure or presentation, in the website. ..................................................................................................................................... [1] (ii) The hexadecimal colour code #43B7F0 is stored in three 8-bit registers. Give the 8-bit binary values for each part of the hexadecimal code. 43 B7 F0 [6] (c) Tina uses a microphone to record a welcome message for her website. (i) State whether the microphone is an input or output device
(ii) She wants to compress the recording to make sure that the file is as small as possible for the website. Identify which type of compression she should use and describe how this would compress the file for the website. Type of compression ......................................................................................................... Description
(iii) Give two benefits of compressing the file for the website.
(d) Tina will use the TLS protocol in her website when selling tickets to people for different charity events. This makes sure that their personal data is transmitted securely. (i) Identify the two layers that are present in the TLS protocol. Layer 1 .............................................................................................................................. Layer 2 .............................................................................................................................. [2] (ii) Explain how data is sent securely using the TLS protocol.
(e) Tina is concerned about security threats to her web server. (i) Identify three security threats to her web server that Tina might be concerned about.
] (ii) Tina installs a proxy server to help protect her website from security threats. Describe how the proxy server will help protect the website.
Question 6:
Four 7-bit binary values are transmitted from one computer to another. A parity bit was added to each binary value creating 8-bit binary values. All the binary values have been transmitted correctly. (a) Tick () to show whether an Even or an Odd parity check has been used for each binary value. 8-bit binary value Even () Odd () 11111111 01100110 01111011 10000000
(b) The data will also be checked using a checksum. Describe how a checksum can be used to check that the data has been transmitted correctly.
Question 7:
Alessandro has some important data stored on his computer. He is concerned about accidental damage to his data. (a) (i) Identify three ways that the data could be accidentally damaged. 1 ........................................................................................................................................ [3] (ii) State what Alessandro could do to make sure that he can retrieve his data if it is accidentally damaged
(b) Alessandro uses an SSD to store his data. Describe what is meant by an SSD and how it operates to store data.
(c) Alessandro also uses off-line storage to store his data. Three examples of off-line storage are Blu-ray, CD and DVD. Six statements are given about off-line storage. Tick () to show if each statement applies to Blu-ray, CD, or DVD. Some statements apply to more than one example of off-line storage. Statement Blu-ray () CD () DVD () A type of optical storage Has the largest storage capacity Can be dual layer Read using a red laser Has the smallest storage capacity Stores data in a spiral track
Question 8:
b) Tammy connects the computer to her home network. The computer has a MAC address and an IP address. A paragraph is given about MAC addresses and IP addresses. Complete the paragraph using the list of terms given. Not all terms need to be used. compiled computer control dynamic identify packet principal protocol similar unique A MAC address is a media access .............................................................. address. A network device has a ............................................................... MAC address that can help ....................................................... the device in the network. An IP address is an Internet ................................................ address. An IP address can be static or ................................................... . [5] (c) Tammy uses a browser when accessing the Internet. Describe the role of the browser.
Question 9:
Paige has a computer that has a central processing unit (CPU) based on the Von Neumann model for a computer system. (a) Identify the component within the CPU that controls the flow of data. ............................................................................................................................................. [1] (b) Identify the component within the CPU where calculations are carried out. ............................................................................................................................................. [1] (c) Identify the component within the CPU that stores the address of the next instruction to be processed. ............................................................................................................................................. [1] (d) Identify the register within the CPU that holds an instruction that has been fetched from memory. ............................................................................................................................................. [1] (e) Identify the register within the CPU that holds data that has been fetched from memory
Question 10:
(a) Four denary to 8-bit binary conversions are given. Tick (3) to show if each denary to 8-bit binary conversion is Correct or Incorrect. Denary Binary Conversion Correct (3) Incorrect (3) 145 10010001 179 10110101 11 00010011 100 01100010 [4] (b) Convert the 12-bit binary number into hexadecimal. 1 1 0 0 0 1 0 0 0 0 0 0 ............................................................................................................................................. [3] 4 Eugene has a web server that stores his online shopping website. Customers access the website using a browser. (a) Describe how the webpages are requested and displayed on the customer's computer.
(b) State three online security threats to Eugene's web server.
Question 11:
Arjun uses a scanner to create digital versions of some printed documents. The scanner is attached to his computer using a USB connection. (a) Tick (3) to show if the USB connection uses Parallel or Serial data transmission. Describe your chosen method of data transmission. Parallel Serial Description
Question 12:
Elsa writes a paragraph in an examination about encryption. There are several terms missing from the paragraph. Complete the paragraph using the list of given terms. Not all terms may need to be used. Some terms may be used more than once. algorithm alphanumeric cookie cypher key padlock plain word processed The data is encrypted using a ....................................................................... . This is an ....................................................................... that is used to scramble the data. The data before encryption is known as ....................................................................... text. When the data has been encrypted it is known as ....................................................................... text. To read the encrypted data it needs to be decrypted using a .......
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started