| 1 | a | - Program Counter: Yes
- BIOS: No
- MAR: Yes
- Secondary Storage: No
- Accumulator: Yes
- MDR: Yes
| 4 | Von Neumann architecture |
| b | - More cores allow parallel processing (1)
- Multiple instructions executed simultaneously (1)
- Increases total instructions per second (1)
| 3 | Number of cores |
| c | - Stores frequently used instructions (1)
- Faster access than RAM (1)
- Reduces CPU wait time (1)
| 3 | Cache size |
| 2 | a | - Volatile (1)
- Non-Volatile (1)
- Fast (1)
| 3 | The difference between RAM and ROM |
| b | - HDD/SSD used as RAM overflow (1)
- Inactive data moved to disk (1)
- Data swapped back when needed (1)
- Allows more programs to run (1)
| 4 | Virtual memory |
| c | - No moving parts / Robust if dropped (1)
- Lighter / Smaller (1)
- Lower power consumption (1)
| 3 | Solid state |
| 3 | a | - NIC (1)
- Switch (1)
- Transmission Media (1)
| 3 | The hardware needed to connect stand-alone computers into a Local Area Network |
| b | - Central Switch (1)
- 4 Workstations (1)
- Direct links to switch (1)
- No peripheral links (1)
| 4 | Star and Mesh |
| c | - Connects different networks (1)
- Reads IP addresses (1)
- Routes packets along efficient paths (1)
| 3 | Routers |
| 4 | a | - Embedded is for specific task (1)
- General is for multiple tasks (1)
- Embedded has limited UI (1)
- Camera module is embedded as it only manages photos (1)
| 4 | Examples of embedded systems |
| b | - Peripheral: Manages drivers/buffers (3)
- Defragmentation: Reorganises disk fragments to speed up access (3)
| 6 | Peripheral management |
| 5 | a | - MAC is physical/hardcoded (1)
- IP is logical/dynamic (1)
- MAC used within LAN (1)
- IP used for internet routing (1)
| 4 | IP addressing and MAC |
| b | - Splits data into packets (1)
- Reassembles at destination (1)
- Handles error checking (1)
| 3 | TCP/IP |
| c | - (i) SMTP (1)
- (ii) HTTPS (1)
- (iii) IMAP (1)
| 3 | Common protocols including |
| 6 | a | - SQL code entered into web form (1)
- Executed by back-end database (1)
- Bypasses authentication (1)
| 3 | SQL injection |
| b | - Fraudulent email sent (1)
- Manipulates user to click link/provide info (1)
- Theft of credentials (1)
| 3 | Social engineering |
| c | - 4000 * 250 = 1,000,000 KB (1)
- /1000 = 1,000 MB (1)
- /1000 = 1 GB (1)
- Correct final answer with units (1)
| 4 | Data capacity and calculation |
| 7 | a | - Data Protection Act 2018 (1)
- General Data Protection Regulation (GDPR) (1)
| 2 | Data Protection Act |
| b | - Level 3: Comprehensive discussion of all 3 areas (7-8 marks)
| 8 | Ethical issues / Environmental issues / Legal issues |
| 8 | a | - Manages central resources (1)
- Handles authentication (1)
- Responds to client requests (1)
| 3 | roles of computers in a client-server |
| b | - Encryption scrambles data (2)
- Firewall monitors/blocks traffic (2)
| 4 | Common prevention methods |
| c | - Off-site security (1)
- Automatic syncing (1)
- Scalability (1)
| 3 | Cloud storage |