0% found this document useful (0 votes)
202 views4 pages

Diagram

The document outlines a series of tasks requiring the creation and annotation of diagrams related to various computer science concepts. Topics include virtual memory, digital currency transactions, web page retrieval, the fetch-decode-execute cycle, DDoS attacks, data transmission, and cyber security threats. Each task emphasizes the importance of visual representation in understanding complex processes.

Uploaded by

Eagle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
202 views4 pages

Diagram

The document outlines a series of tasks requiring the creation and annotation of diagrams related to various computer science concepts. Topics include virtual memory, digital currency transactions, web page retrieval, the fetch-decode-execute cycle, DDoS attacks, data transmission, and cyber security threats. Each task emphasizes the importance of visual representation in understanding complex processes.

Uploaded by

Eagle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Diagram

[Example answers are given. There can be many possible answers]


1.​ Draw a diagram to represent how virtual memory is created and used.

2.​ Draw and annotate a diagram to show how a payment transaction is made using digital currency and
blockchain.

3.​ Draw and annotate a diagram to show how the web page is located and retrieved to be displayed on the
student’s tablet computer.

4.​ Complete and annotate the diagram to show how the data is decoded once it has been fetched into the
MDR.

________________________________________________________________________________________
O Level​ ​ ​ ​ ​ ​ ​ ​ ​ https://fahimferdous.com
5.​ The computer processes instructions using the fetch–decode–execute (FDE) cycle. Draw and annotate a
diagram to show the process of the fetch stage of the FDE cycle.

6.​ A company has a website that is suffering a distributed denial of service (DDoS) attack. Draw and annotate a
diagram to show the process of the DDoS.

7.​ A company has a network that includes a web server. Data is transmitted across the network using serial
half-duplex data transmission. Draw and annotate a diagram to show how the data is transmitted using
serial half-duplex data transmission.

________________________________________________________________________________________
O Level​ ​ ​ ​ ​ ​ ​ ​ ​ https://fahimferdous.com
8.​ A student enters a uniform resource locator (URL) into their web browser. Draw and annotate a diagram to
show the process from the user entering the URL to the web browser displaying the web page.

9.​ Draw and annotate a diagram to represent the process of pharming.

10.​ A distributed denial of service attack (DDoS) is a cyber security threat. Draw and annotate a diagram to
represent the process of a DDoS.

________________________________________________________________________________________
O Level​ ​ ​ ​ ​ ​ ​ ​ ​ https://fahimferdous.com
11.​ Draw and annotate a diagram to demonstrate how a firewall works.

12.​ Draw and annotate a diagram that demonstrates the cyber security threat of data interception.

13.​ Draw and annotate a diagram to represent the role of a router.

________________________________________________________________________________________
O Level​ ​ ​ ​ ​ ​ ​ ​ ​ https://fahimferdous.com

You might also like