Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Edexcel GCSE Computer science key questions And UPDATED ANSWERS

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
27-04-2024
Written in
2023/2024

Edexcel GCSE Computer science key questions And UPDATED ANSWERS Process for communication in the client-server network model. 1. The client uses the address of the server to make a connection. 2. The client sends a request to the server. 3. The server obtains the address from the client once the client makes a connection to the server. 4. The server sends the requested data to the client. Benefits of using subprograms when writing software solutions 1. Are written only once. 2. Therefore, can be called from anywhere in the program. 3. Needs to be debugged only once. 4. Makes the main program shorter. More readable. 5. Reduces the need for global variables. 6. Can be used to hide complex coding. 7. Can be reused in other programs. Why should constants be used in programs? 1. Readability Makes it understandable for the readers. Not everyone will know the relevance and understand what the literal values mean. 2. Ability to update If the value of the constant needs updating, it only has to be done once instead changing all of the occurrence of the value. 3. Compiler optimisation Depending on the compiler, use of named constants can lead to optimisation. Either by improving performance or by reducing memory space. Fetch-decode-execute cycle FETCH :Copy PC onto address bus and read from RAM :RAM content comes back on data bus to IR :Increase PC by 1 DECODE :CU examines instructions and fetches required data :CU puts the address of the required data on the address bus - RAM :RAM puts contents of that address on that data bus :Put data in R0 EXECUTE :Copy R0 into ACC Encryption 1. Encryption such as provided by the VPN 2. Ensures that private or sensitive data which is sent over the Internet 3. Cannot be understood by unauthorised users ( such as hackers ). Data is unintelligible to third parties. 4. Reduces the risk of companies losing important data E.g. private customer details or company secrets Could have financial or legal impacts. Steps to improve security of important data Using encryption ___________________ 1. Encryption such as provided by the VPN 2. Ensures that private or sensitive data which is sent over the Internet 3. Cannot be understood by unauthorised users ( such as hackers ). Data is unintelligible to third parties. 4. Reduces the risk of companies losing important data E.g. private customer details or company secrets Could have financial or legal impacts.

Show more Read less
Institution
Course

Content preview

Edexcel GCSE Computer science key questions And
UPDATED ANSWERS

Process for communication in the client-server network model.
1. The client uses the address of the server to make a connection.


2. The client sends a request to the server.


3. The server obtains the address from the client once the client makes a connection to
the server.


4. The server sends the requested data to the client.
Benefits of using subprograms when writing software solutions
1. Are written only once.


2. Therefore, can be called from anywhere in the program.


3. Needs to be debugged only once.


4. Makes the main program shorter.
> More readable.


5. Reduces the need for global variables.


6. Can be used to hide complex coding.


7. Can be reused in other programs.

,Why should constants be used in programs?
1. Readability
> Makes it understandable for the readers.
> Not everyone will know the relevance and
understand what the literal values mean.


2. Ability to update
> If the value of the constant needs updating, it only has
to be done once instead changing all of the occurrence
of the value.


3. Compiler optimisation
> Depending on the compiler, use of named constants can lead to optimisation.
> Either by improving performance or by reducing memory space.
Fetch-decode-execute cycle
FETCH
:Copy PC onto address bus and read from RAM
:RAM content comes back on data bus to IR
:Increase PC by 1


DECODE
:CU examines instructions and fetches required data
:CU puts the address of the required data on the address bus - RAM
:RAM puts contents of that address on that data bus
:Put data in R0


EXECUTE
:Copy R0 into ACC
Encryption
1. Encryption such as provided by the VPN

, 2. Ensures that private or sensitive data which is sent over the Internet


3. Cannot be understood by unauthorised users ( such as hackers ).
> Data is unintelligible to third parties.


4. Reduces the risk of companies losing important data
> E.g. private customer details or company secrets
> Could have financial or legal impacts.
Steps to improve security of important data
Using encryption
___________________


1. Encryption such as provided by the VPN


2. Ensures that private or sensitive data which is sent over the Internet


3. Cannot be understood by unauthorised users ( such as hackers ).
> Data is unintelligible to third parties.


4. Reduces the risk of companies losing important data
> E.g. private customer details or company secrets
> Could have financial or legal impacts.


Creating passwords
_____________________




1. Logon passwords.


2. Passwords should be required to log into the computer and access data.

Written for

Course

Document information

Uploaded on
April 27, 2024
Number of pages
27
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NurseAdvocate chamberlain College of Nursing
Follow You need to be logged in order to follow users or courses
Sold
494
Member since
2 year
Number of followers
77
Documents
12046
Last sold
1 day ago
NURSE ADVOCATE

I have solutions for following subjects: Nursing, Business, Accounting, statistics, chemistry, Biology and all other subjects. Nursing Being my main profession line, I have essential guides that are Almost A+ graded, I am a very friendly person: If you would not agreed with my solutions I am ready for refund

4.6

239 reviews

5
193
4
14
3
15
2
6
1
11

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions