You are on page 1of 11

DEP03 Preparation – WC 9th

January 2023
You should attempt each topic without looking at any notes.
You can then use a different colour to fill in the gaps
based on the revision slides. You should then look at the
exam questions that you completed for these topics.

1.5.1 Legislation (Key Facts)


This is what the exam board expect you to know on this topic. Rate your understanding
for each point before you start. Update this table after you have completed the task.

1.5.1 Legislation Red Amber Green

(a) The Data Protection Act 1998.

(b) The Computer Misuse Act 1990.

(c) The Copyright Design and Patents Act 1988.

(d) The Regulation of Investigatory Powers Act 2000.

What is the purpose of the Data Protection Act 1998


Regulates how personal data is stored and processed.

Examples of how the Data Protection Act can be broken


Not telling people you are storing their personal data
Using that information
Failing to have security strong enough to protect personal data

8 Principles of the Data Protection Act


1- Fair and lawful – need to ask for permission to store the data
2- Relevant and not excessive – only collect the data they need and no more
3- Accurate and up to date – data kept up to date, the data has to be correct and if
requested then it should be changed
4- Only kept as long as needed – companies should only keep data for a reasonable amount
of time
5- Only used for the stated purpose and not passed to 3 rd parties – companies must state
why they need the data
6- Be kept securely – must be kept securely from hackers and employees who don’t have the
right to see it
7- Users are given access to their data
8- Data must not be passed on to countries where data protection laws are weaker

Revision – DEP03 Prep Page 1 of 11


What is the purpose of the Computer Misuse Act 1990?
To prevent anyone from gaining unauthorised access to any data on a computer

Example of how the Computer Misuse Act can be broken


Spreading or creating a virus
Attempting to log into someone’s account without authorisation
Unauthorised damage, deletion or modification to any data

Why is it difficult to prosecute under this act?


People travel the internet anonymously a lot of the time so it is hart to track them
down

What are the main sections of the CMA? 1,2,3a, 3b


1) Unauthorised access to computer material
2) Unauthorised access with the intent to facilitate or commit a crime
3a) Unauthorised modification of computer material
3b) Making, supplying or obtaining anything which can be used in CMA offences

What is the purpose of The Copyright Design and Patents Act 1988?
Regulates IPs to protect creators of books, music, video and software from having
their work illegally copied

Hard to enforce as laws differ from country to country

In what ways can the CDPA be broken?


Posting copyrighted content on the internet
Streaming or distributing access to streaming copyrighted material
Make a copy of a CD you bought and give it to a friend or sell it

What is the purpose of the Regulation of Investigatory Powers Act 2000?

Examples of how RIPA can be used

Revision – DEP03 Prep Page 2 of 11


1.4.2 Data Structures (Key Facts)
1.4.2 Data Structures Red Amber Green

(a) Arrays (of up to 3 dimensions), records, lists, tuples.

(b) The following structures to store data: linked-list,


graph (directed and undirected), stack, queue, tree, binary
search tree, hash table.
(c) How to create, traverse, add data to and remove data
from the data structures mentioned above.

What are the key characteristics of an array?

What are the required indexes for each array, and what do they represent in each
one?
1D Array 2D Array 3D Array
Arrayname[n] Arrayname[x,y] Arrayname[x,y,z]

Give the key characteristics of a list

Give the key characteristics of a tuple

Revision – DEP03 Prep Page 3 of 11


Give the key characteristics of a record

Give the key characteristics of a linked list

The data items Mouse, Cat, Apple, Horse and Fox are stored in a list in that order.
The list is sorted alphabetically. Represent this as a linked list using a diagram,
and also complete the array representation.

Mouse Cat Apple

Horse Fox

INDEX DATA POINTER


0 Mouse
1 Cat
2 Apple
3 Horse
4 Fox
Start = Next free =5

What is the full name of this data structure? | What other variations exist?

Revision – DEP03 Prep Page 4 of 11


What are the key feature of a graph?

Show the contents of the stack after each line of the following lines of code are
run
01 push(9)
02 pop()
03 push(11)
04 push(2)

What are the key characteristics of a stack (How many pointers)

Steps of push algorithm Steps of pop algorithm

What are the key characteristics of a queue (How many pointers?

Revision – DEP03 Prep Page 5 of 11


Steps of enqueue algorithm Steps of dequeue algorithm

Show the contents of the queue after each line of the following lines of code are
run
01 enqueue(“9+1”)
02 dequeue()
03 enqueue(“11-1”)
04 dequeue()

What are the key features of a Tree / Multi-branch Tree?

Adding Data to a BST: Add the following countries: England, Scotland, Wales,
Australia

What are the key features of a Binary Search Tree (BST)

Features of a Hash Table

Revision – DEP03 Prep Page 6 of 11


1.2.1 Systems Software (Key Facts)
1.2.1 Systems Software Red Amber Green

(a) The need for, function and purpose of operating systems.

(b) Memory Management (paging, segmentation and virtual


memory).
(c) Interrupts, the role of interrupts and Interrupt Service
Routines (ISR), role within the Fetch-Decode-Execute Cycle.
(d) Scheduling: round robin, first come first served, multi-
level feedback queues, shortest job first and shortest
remaining time.
(e) Distributed, embedded, multi-tasking, multi-user and
Real Time operating systems.
(f) BIOS.

(g) Device drivers.

(h) Virtual machines

Roles of an OS

Paging Segmentation

Virtual memory

Steps in an Interrupt

Revision – DEP03 Prep Page 7 of 11


Scheduling

Round robin scheduling First come first served scheduling

Multi-level feedback queues scheduling Shortest job first scheduling

Shortest remaining time scheduling

BIOS

Device drivers

Virtual Machines

Revision – DEP03 Prep Page 8 of 11


Distributed OS Multi-User OS

Real-Time OS Embedded OS

Multi-Tasking OS

REVISION QUIZZES – LINK ON ONENOTE

1.2.1 Quiz 1.5.1 Quiz 1.4.2 Quiz

Essays Tips

MAKE A PLAN!
A01  Key facts about the topic of the questions

Revision – DEP03 Prep Page 9 of 11


 Link your key facts to the context of the question

 Does the question give you any prompts?


A02
 Do you need any advantages / disadvantages paragraphs

 Do you need any agree / disagree paragraphs

 Conclusions
A03  Did the question ask for an overall answer?

 Sum up key points and conclude the answer to the question

Revision – DEP03 Prep Page 10 of 11


FURTHER NOTES – DEP1 / DEP2 Reflection

What were your key mistakes from your DEP1 and DEP2 revision?

What topics from DEP1 or DEP2 do you need to revisit?

Revision – DEP03 Prep Page 11 of 11

You might also like