paper 1 computer science ocr v2
Across
- 5. The process the CPU follows to retrieve, interpret, and carry out instructions from memory.
- 6. A cyberattack that overwhelms a system or network with excessive traffic to make it unusable.
- 7. Small fast memory close to the CPU that stores frequently accessed data, speeding up performance.
- 9. Non-volatile memory that stores essential data like the boot process; it cannot be modified easily.
- 10. Computer systems built into devices like washing machines and cars, performing dedicated functions.
- 11. Online storage that allows users to save and access files over the internet, such as Google Drive and OneDrive.
- 14. Security systems that monitor and control incoming and outgoing network traffic to prevent unauthorized access.
- 16. (Central Processing Unit) – The brain of the computer, executing instructions and performing calculations.
- 17. threat Risks to digital systems, including malware, phishing, hacking, and social engineering attacks.
- 18. A number system that uses only 0s and 1s to represent data in computers. It is the foundation of all computing, where each binary digit (bit) represents a power of 2.
- 19. The arrangement of computers and devices within a network, including star, mesh, and bus topologies.
- 20. A number system that uses base 16, including digits 0-9 and letters A-F. It is often used in computing for memory addresses and color codes, as it is more compact than binary.
- 21. Software that manages hardware and software resources, such as Windows, macOS, and Linux.
Down
- 1. A type of storage device that has no moving parts, making it faster and more reliable than traditional hard drives.
- 2. Storage technology used in hard drives, where data is stored on spinning magnetic disks.
- 3. The rate at which a CPU processes instructions, measured in GHz (gigahertz); higher speeds mean faster processing.
- 4. A CPU with multiple cores, allowing for better multitasking and improved performance.
- 8. A computer design model where data and programs are stored in the same memory and processed sequentially.
- 12. A security measure that converts data into unreadable code to protect it from unauthorized access.
- 13. Programs that help maintain and optimize system performance, like antivirus software and disk cleanup tools.
- 15. Long-term storage devices like hard drives, SSDs, and USB flash drives used to store data permanently.
- 22. Temporary storage used for running programs; data is lost when power is turned off.