2210_w22_qp_12
A paper of Computer Science, 2210
Questions:
7
Year:
2022
Paper:
1
Variant:
2

Login to start this paper & get access to powerful tools

1
A bus station has a ticket machine. A customer can use the ticket machine to select and pay for their ticket. One input device built into the ticket machine is a touch screen. Identify two other input devices that could be built into the ticket machine. Input device 1 Input device 2 The ticket machine has a help icon that a user can touch to contact customer support. The ticket machine has an output device that allows the user to hear the customer support person. Identify an output device that would be used for this purpose. The touch screen for the ticket machine uses resistive technology. Describe how resistive touch screen technology operates to recognise a user’s touch. Give two benefits of using resistive touch screen technology for the ticket machine. Benefit 1 Benefit 2 Give two drawbacks of using resistive touch screen technology for the ticket machine. Drawback 1 Drawback 2 Identify one other touch screen technology that could have been used. The computer in the ticket machine uses the stored program concept. Describe the stored program concept. The computer in the ticket machine has an operating system. One function of the operating system is to provide an interface for the user. State three other functions of the operating system. Function 1 Function 2 Function 3 The computer uses 12-bit binary registers to store data whilst it is being processed. Customers are given a denary ticket number. Give the 12-bit binary value that is stored in the register for each denary ticket number. Working space Show the denary ticket number that would be given to the customer for each 12-bit binary value. Working space Binary values can also be represented as hexadecimal values. Show the hexadecimal value that represents each of the two 12-bit binary values. Working space
2
3
5
6
Jian has a website that uses the Secure Socket Layer (SSL) protocol to make sure that data is kept secure during transmission. Give two ways that a user could check that a website uses the SSL protocol. State the name of the updated version of the SSL protocol. Jian’s system for his website has a proxy server. Explain why Jian uses a proxy server as part of the system for his website. Jian sells products using his website. He wants to create a secure login system for user accounts. He is worried that a user’s login details may be gathered by malware when they are logging into their account. State the type of malware that could be used to gather a user’s login details. Give three methods that could be used to help prevent a user’s login details being gathered by malware, when they are logging into their account. Describe how each method can help prevent this happening. Method 1 Method 2 Method 3 The paragraph describes how the web pages are obtained and displayed for the user. Complete the paragraph using the list of terms. Not all terms in the list need to be used. • browser • Hypertext Markup Language (HTML) • Internet Protocol (IP) address • Internet Service Provider (ISP) • Media Access Control (MAC) address • presentation • protocols • structure • Uniform Resource Locator (URL) • web pages • web server The browser sends the to the Domain Name Server (DNS) that looks up the corresponding . This is returned to the browser, which then sends a request to the where the are stored. The website is written in that is rendered by the .
7