25 – Theory Exam Paper Walkthrough

25 – Theory Exam Paper Walkthrough

This week, we’ll be looking at a set of questions for each of the topics that appear on the theory papers. Where possible, I have indicated the formal topic titles for each of the exam boards. Before our live lesson, please attempt the practice questions below:

Topic 1 – Data Representation / Number Systems

Hexadecimal values can be used to represent denary values. Convert these four hexadecimal values into denary values:

  • 05
  • 20
  • 1A
  • AB

[4 marks]

Topic 2 – Systems Architecture / Internal Hardware

The specification of two CPUs is shown below:

Computer 1Computer 2
Clock Speed: 1 GHzClock Speed: 1.4 GHz
Cache size: 2 MBCache size: 2 MB
Number of Cores: 4Number of Cores: 2

Describe two events that take place during the fetch-execute cycle and how these three features will impact on them.

[4 marks]

Topic 3- Hardware & Software / Memory & Storage

An SD card is a type of solid state storage.

State two advantages of solid state storage compared to magnetic storage.

[2 marks]

Topic 4 – Networks / Networks & The Internet

The owners of a large bakery have a Local Area Network (LAN) with a star topology. They order
their supplies over the Internet. When data is transmitted from the bakery to the supplier, network
protocols are used.

State two layers of the TCP/IP stack and a protocol that is linked to them.

[4 marks]

Topic 5 – Security / Network Security / Cyber Security

Jermain uses the Secure Socket Layer (SSL) protocol for secure transmission when sending data using the internet. Describe the benefits of using HTTPS for secure transmission of data over the internet and how Jermain can identify that this is being used.

[4 marks]

Topic 6 – System Software / Utility Software / Software

Explain why a developer, who is good at both low-level and high-level programming, would normally use high-level languages when writing programs.

[4 marks]

Topic 7 – Ethics / Ethical, Legal, & Environmental Considerations

Social engineering is where someone is tricked or manipulated into providing secure information or access to a secure system. Describe each of the following social engineering techniques and the methods that could be used to prevent them.

  • Phishing
  • Blagging
  • Shouldering

[6 marks]

Topic 8 – Logic / Boolean Logic

Consider the following logic statement:

X = (((A AND B) OR (NOT (B OR C))) NAND C)

Draw a logic circuit to represent the given logic statement without simplification.

[5 marks]