Professional Documents
Culture Documents
1 (a) parallel
serial
(b) parallel
serial
(c) parallel
serial
3 (a)
Working
A B C X
1
0 0 0
] 1 mark
0
0 0 1
0
0 1 0
] 1 mark
0
0 1 1
0
1 0 0
] 1 mark
1
1 0 1
1
1 1 0
] 1 mark
1
1 1 1
[4]
[3]
(c) X is 1 if:
(A is 1 OR B is 1) (1 mark)
AND (1 mark)
(B is 1 OR C is NOT 1) (1 mark)
e.g. (A + B) (B + C) [3]
1 protocol
3 file name
HTML tags/text
firewall
proxy server
[6]
[10]
6 (a) virus
pharming
phishing
[6]
anti-virus
– removes/warns of a potential virus threat which can’t be passed on to
customers
firewall
– (helps) to protect bank computers from virus threats and hacking
encryption
– protects customer data by making any hacked information unreadable
security protocol
– governs the secure transmission of data
Biometric
– to recognise user through the use of, e.g. facial/retina/finger print
Alerts
– users IP/MAC address is registered and user is alerted through, e.g. SMS if
account is accessed through an unregistered address
[2]
7 (a)
this bus carries signals used to
address bus coordinate the computer’s
activities
(b)
the instruction is then copied from the memory location contained in the
MAR (memory address register) and is placed in the MDR (memory data 3
register)
the PC (program counter) contains the address of the next instruction to be (1)
fetched
the entire instruction is then copied from the MDR (memory data register)
4
and placed in the CIR (current instruction register)
the address part of the instruction is placed in the MAR (memory address
6
register)
The incrementation of the program counter can appear at any stage after 2. All other
stages must be in the correct given order. [6]
8 (a) hours: 18
minutes: 53 [2]
(b)
0 0 0 0 0 1 1 1 : 0 0 0 1 1 1 1 0
[2]
– and checks the values against those stored in registers “A” and “B”
(NOTE: the first two statements can be interchanged, i.e. “A” and “B” read first)
– no need to warm up
– higher resolution
x
If 1 GByte = 2
value of X?
then what is the
12
[5]