IB Comp Sci Study Guide Exam Questions And Answers
4 views 0 purchase
Course
IBWA CPO
Institution
IBWA CPO
Define the term Peripheral - ANS A piece of hardware / a hardware device that is externally connected or attached / remotely connected or attached (to the computer system)
Identify two features of a graphical user interface (GUI) - ANS Menus; Dialogue boxes; Windows; Icons; Point...
IB Comp Sci Study Guide Exam
Questions And Answers
Define the term Peripheral - ANS A piece of hardware / a hardware device that is externally
connected or attached / remotely connected or attached (to the computer system)
Identify two features of a graphical user interface (GUI) - ANS Menus; Dialogue boxes;
Windows; Icons; Pointers; Buttons;
Outline one method of collecting information from stakeholders concerning the requirements for
a new system. - ANS 1. Surveys; (General) questions distributed to many stakeholders as
a written or online document;
2. Interviews; (Specific) questions asked of nominated stakeholders in an individual setting;
3. Direct observations; Observer watches stakeholders performing their current tasks; [2]
Outline why a prototype would be used to demonstrate the proposed system to the client. - ANS
1. To provide feedback on the efficiency or design of the product;
2. To give an idea or feel of the final product;
3. To encourage dialogue between the developers and the client;
4. Clients can identify errors or omissions in the design;
State the hexadecimal equivalent of the following binary number: 11011111 - ANS DF;
Outline the purpose of the memory address register (MAR) in the central processing unit (CPU).
- ANS The MAR holds the memory location of data/instructions; ...that need to be
accessed (read/write) (fetch/store);
State the part of the central processing unit (CPU) that is responsible for carrying out
calculations - ANS Arithmetic and Logic Unit/ALU;
Compilers translate source code into object code. Identify two other operations performed by a
compiler. - ANS Pre-processing;
Lexical analysis;
Parsing;
Semantic analysis;
Syntax analysis;
Linking;
Optimisation;
,Identify two ways that user documentation may be provided. - ANS On a CD/DVD/Blu-ray
disc;
Through embedded help files; Online/website;
Physical/printed media;
*Note to examiners: accept answers relating to methods of supplying or media used to present
user documentation. Do not accept answers related to training.*
Outline one reason why protocols are used in communications between computers. - ANS
To provide a set of rules/procedures;
To enable two or more different electronic devices/computers/entities to understand each other
during data transfer / enable successful communication;
Identify two characteristics of a personal area network (PAN). - ANS Smallest type of
network;
Consists of connected devices in close proximity to the individual using them; Connected via
Bluetooth/wireless; Suitable example: smartphone to car connection;
Explain how data is transmitted by packet switching - ANS A message/the data is broken
into a number of parts;
Which are sent independently; ...over the optimum route for each packet;
The individual parts are reassembled at the destination;
Each packet contains the (IP) address of both the sender and recipient;
A large mail order is concerned about the security of its stored data.
a) Describe two possible caused of data loss
b) Outline two backup strategies that may be used to limit data loss - ANS a)Malicious
activities;
1. An unauthorized user gaining access to data and deleting/altering it;
2. Natural disasters / earthquake / storm / power loss;
Causing the system to crash and destroy data;
3. Malware/viruses/spyware/worms;
Which infiltrate and damage the data;
4. Human error; Accidental deletion/overwriting of files;
b)
1. Copies of backup could be kept off-site/cloud backup;
Unlikely that the other site would be affected by the natural disaster/can be reloaded/reinstalled
if needed;
2. Incremental backup only backs up data that has changed;
Therefore, requiring less storage capacity / can be completed more quickly than a complete
backup;
3. Failover system/mirrored system/disk mirroring;
A duplicate copy to be used in the event the main system fails;
, 2 characteristics of RAM - ANS RAM is volatile / contents erased when power is switched
off; Access speed is fast / faster than hard drive; Data / instructions can be read from and
written to it / /RAM can be overwritten; Size is limited;
Purpose of persistent storage on the computers - ANS To store programs / files / data in a
non-volatile device so it isn't lost; Stores more data as it has a larger capacity;
Identify two types of general application software that would be installed on the training
computers - ANS Word processor; Spreadsheet; Database management system; Email;
Web browser;
*Note: Allow any general purpose application that is appropriate for a 'training room computer
What are the advantages of wireless networking? - ANS May save money; Due to not
having to supply all the training computers;
May be able to increase the size of the training group; Which may generate more income;
Trainees / teachers likely to be more familiar with software on own machine (and how new
training software interacts with OS / user interface); Making training sessions more efficient /
allowing trainer to concentrate on the training rather than using generic applications;
Disadvantages of wireless networking - ANS May cause security issues; Due to multiple
users having network access from their "unsecured" devices;
May interfere with running of training sessions; As some machines may not be compatible;
Methods of security with wireless networking - ANS Encryption; Scrambles the contents of
the network transmissions so that if they are intercepted they can't be understood (without the
decryption key);
User ID (and password); Only allows authorized users to access the network;
Media Access Control (MAC) addresses; Unique identification codes embedded in networkable
equipment so that only authorized equipment may access the network;
Firewall; Checks traffic coming into the network and leaving the network, and can block
suspicious data;
Why would the speed of data transmission of wireless network vary in different places of the
room? - ANS The speed of data transmission (on a wireless network) slows down; The
further the receiver is from the transmitter; Passing through obstructions such as solid walls;
Can slow down transmissions (on a wireless network); The bandwidth available for transmission
on a wireless network is finite; So, transmission speeds can be affected if the number of users
on the network increases;
*Note to examiners: Answers must relate to wireless networks and not be a comparison
between cabled and wireless networks.
5 components of computer system - ANS Hardware, software, human resources, network,
peripherals
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller DocLaura. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.89. You're not tied to anything after your purchase.