Time allowed: 1 hour 30 minutes
A computer system uses a Von Neumann architecture CPU.
(a) Tick (✓) one box in each row to identify whether the register is part of the CPU architecture.
| Feature / Item | Yes | No |
|---|---|---|
| Program Counter | ||
| BIOS | ||
| MAR | ||
| Secondary Storage | ||
| Accumulator | ||
| MDR |
(b) Explain how increasing the number of cores can improve the performance of a CPU.
(c) Describe the role of Cache memory in the CPU.
A tablet computer uses both RAM and ROM.
(a) Complete the following sentences about memory using the word bank provided. Word Bank: Volatile, Non-Volatile, Temporary, Permanent, Fast, Slow RAM is __________ memory, meaning it loses its contents when power is turned off. ROM is __________ memory, and is used to store the startup instructions. RAM is much __________ than secondary storage.
(b) Explain the process of swapping data in and out of Virtual Memory when RAM is full.
(c) Justify the choice of Solid State Storage (SSD) over Magnetic storage for a portable tablet.
The tablet connects to a Local Area Network (LAN).
(a) Identify three pieces of hardware required to connect a stand-alone computer to a LAN.
(b) Draw a diagram representing a Star topology with a switch and four workstations.
(c) Explain the role of a Router in a network.
The tablet uses embedded systems and utility software.
(a) Compare an Embedded System and a General-Purpose system using the tablet's camera module as an example.
(b) Describe the function of Peripheral Management and Defragmentation.
The MedConnect system uses various protocols.
(a) Explain the difference between a MAC address and an IP address.
(b) Describe the role of the Transmission Control Protocol (TCP).
(c) Identify the correct protocol (SMTP, IMAP, or HTTPS) for these tasks: (i) Sending an email (ii) Accessing a secure database web portal (iii) Syncing emails across devices
Security threats and data handling.
(a) Explain how an SQL Injection attack is carried out.
(b) Describe how Social Engineering (Phishing) could target medical staff.
(c) Calculate how many Gigabytes (GB) are in 250 photos, each 4,000 Kilobytes (KB) in size. Show your working.
(a) Identify the legislation that protects patient privacy in this scenario.
(b) * Discuss the Ethical, Legal, and Privacy issues associated with storing medical data on portable devices.
Network models and protection.
(a) Explain the role of a Server in a Client-Server network.
(b) Describe how Encryption and Firewalls protect the MedConnect network.
(c) Justify the use of Cloud Storage for medical backups.