paper 1 computer science ocr v2

12345678910111213141516171819202122
Across
  1. 5. The process the CPU follows to retrieve, interpret, and carry out instructions from memory.
  2. 6. A cyberattack that overwhelms a system or network with excessive traffic to make it unusable.
  3. 7. Small fast memory close to the CPU that stores frequently accessed data, speeding up performance.
  4. 9. Non-volatile memory that stores essential data like the boot process; it cannot be modified easily.
  5. 10. Computer systems built into devices like washing machines and cars, performing dedicated functions.
  6. 11. Online storage that allows users to save and access files over the internet, such as Google Drive and OneDrive.
  7. 14. Security systems that monitor and control incoming and outgoing network traffic to prevent unauthorized access.
  8. 16. (Central Processing Unit) – The brain of the computer, executing instructions and performing calculations.
  9. 17. threat Risks to digital systems, including malware, phishing, hacking, and social engineering attacks.
  10. 18. A number system that uses only 0s and 1s to represent data in computers. It is the foundation of all computing, where each binary digit (bit) represents a power of 2.
  11. 19. The arrangement of computers and devices within a network, including star, mesh, and bus topologies.
  12. 20. A number system that uses base 16, including digits 0-9 and letters A-F. It is often used in computing for memory addresses and color codes, as it is more compact than binary.
  13. 21. Software that manages hardware and software resources, such as Windows, macOS, and Linux.
Down
  1. 1. A type of storage device that has no moving parts, making it faster and more reliable than traditional hard drives.
  2. 2. Storage technology used in hard drives, where data is stored on spinning magnetic disks.
  3. 3. The rate at which a CPU processes instructions, measured in GHz (gigahertz); higher speeds mean faster processing.
  4. 4. A CPU with multiple cores, allowing for better multitasking and improved performance.
  5. 8. A computer design model where data and programs are stored in the same memory and processed sequentially.
  6. 12. A security measure that converts data into unreadable code to protect it from unauthorized access.
  7. 13. Programs that help maintain and optimize system performance, like antivirus software and disk cleanup tools.
  8. 15. Long-term storage devices like hard drives, SSDs, and USB flash drives used to store data permanently.
  9. 22. Temporary storage used for running programs; data is lost when power is turned off.