Chapter 14
Memory Units, Cyber Security & AI Defense
Bit / Byte / KB / MB / GB / TB conversion, encryption basics, AI-driven security.
Full Chapter Notes
Source · FPSC Trap Decoder · CSS MPT Smart Notes (2026 Edition)
MPT Weightage: 3–5 Marks · Difficulty: Medium · Confirmed Past Papers: 2023 · 2024 · 2025
Trend Alert. Memory unit conversions (binary 1024 multiplier), cyber threat definitions (phishing, ransomware, trojan), and the Zero Trust security model are the core targets. The 1024 vs 1000 trap appeared in every paper since 2022. Nibble (4 bits) is a favourite FPSC 'near-miss' question. The Transformer architecture for AI/LLMs is a 2025–2026 emerging target.
1. High-Yield Fact Snapshot
| FPSC-Tested Fact | Correct Answer | Year Tested |
|---|---|---|
| 1 Nibble = | 4 bits (half a byte) | Consistent trap |
| 1 Byte = | 8 bits | Foundation fact |
| Binary multiplier (KB, MB, etc.) | 1024 — NOT 1000 | Every paper |
| 1024 MB = | 1 Gigabyte (GB) | Repeated |
| HTTPS 'S' stands for | Secure | 2025 |
| Memory speed order (fastest first) | Registers → Cache → RAM → HDD | Elite trap |
| Phishing primary exploit | Human psychology — deception | 2022 high-yield |
| Trojan Horse — key feature | Disguised as legitimate software — does NOT self-replicate | Common trap |
| Zero Trust Architecture | Never Trust, Always Verify — every access verified | 2025 trend |
| Transformer architecture — associated with | Generative AI and Large Language Models | 2025–26 prediction |
2. Binary Storage Hierarchy
Computers use the binary (base-2) system. All memory multipliers are based on powers of 2, making 1024 (2¹⁰) the standard — NOT 1000. This distinction appears in every MPT paper.
| Unit | Value | Equivalent | Power of 2 | FPSC Note |
|---|---|---|---|---|
| Bit | 0 or 1 | Smallest digital unit | — | Binary digit. 'b' (lowercase) in data speed (Mbps). |
| Nibble | 4 Bits | Half a Byte | — | Trap: 'Building block between bit and byte' = Nibble. Used in hexadecimal. |
| Byte | 8 Bits | 2 Nibbles | 2⁰ (base) | Standard unit for one character (e.g., 'A'). 'B' (uppercase) in file size (MB). |
| Kilobyte (KB) | 1,024 Bytes | — | 2¹⁰ | Trap: NOT 1,000 bytes. Binary = 1024. |
| Megabyte (MB) | 1,024 KB | 1,048,576 Bytes | 2²⁰ | High-quality photo ~3–5 MB. MP3 song ~3–4 MB. |
| Gigabyte (GB) | 1,024 MB | ~1 billion Bytes | 2³⁰ | RAM and modern phone storage measured in GB. |
| Terabyte (TB) | 1,024 GB | ~1 trillion Bytes | 2⁴⁰ | External hard drives and server storage. |
| Petabyte (PB) | 1,024 TB | ~1 quadrillion Bytes | 2⁵⁰ | Data centres and cloud storage at scale. |
1024 vs 1000 Trap. The metric prefix 'kilo' = 1,000 in everyday usage (1 kilometre = 1,000 metres). However, computers use the binary system (base-2). 2¹⁰ = 1,024 — NOT 1,000. So 1 Kilobyte = 1,024 Bytes. 1 Megabyte = 1,024 Kilobytes. FPSC will offer '1,000 Bytes = 1 KB' as an option — this is WRONG. Always choose 1,024.
Bit vs Byte Symbol Trap. Bit is abbreviated with lowercase 'b'. Byte is abbreviated with uppercase 'B'. This matters in data measurements: 100 Mbps = 100 Megabits per second (internet speed). 500 GB = 500 GigaBytes of storage. FPSC occasionally tests this symbol distinction in data speed questions.
3. Memory Hierarchy — Speed vs Capacity
| Memory Type | Speed | Capacity | Volatile? |
|---|---|---|---|
| CPU Registers | Fastest | Tiny (bytes) | Yes — volatile |
| L1/L2 Cache | Very Fast | Small (KB–MB) | Yes — volatile |
| RAM | Fast | Medium (GB) | Yes — volatile (2025) |
| SSD (Solid State Drive) | Moderate-Fast | Large (GB–TB) | No — non-volatile |
| HDD (Hard Disk Drive) | Slowest | Large (GB–TB) | No — non-volatile |
| ROM | Fixed | Small (MB) | No — non-volatile (2025) |
Cache is FASTER than RAM. RAM is FASTER than Hard Drive. The speed order (fastest to slowest): CPU Registers → L1 Cache → L2 Cache → RAM → SSD → HDD. The FPSC elite trap asks whether Cache is faster or slower than RAM — Cache is FASTER.
4. Cyber Threat Classification — Complete Reference
| Threat | Category | Definition | FPSC Key Distinction |
|---|---|---|---|
| Phishing | Social Engineering | Deceptive emails/fake websites trick users into revealing passwords and personal data. | Most common cyber attack. Exploits human psychology — not technical code. (2022) |
| Spear Phishing | Targeted Social Engineering | Highly targeted version of phishing — impersonates a specific trusted person. | Unlike generic phishing, targets a specific individual (e.g., your manager). |
| Malware | Umbrella Term | Malicious Software — any software designed to harm or gain unauthorized access. | Covers virus, worm, trojan, ransomware, spyware. Not one specific threat. |
| Virus | Malware Type | Self-replicating code that attaches to HOST files — spreads when host is executed. | Requires a host file. User must click/open something. DISTINGUISHES from worm. |
| Worm | Malware Type | Standalone malware that spreads AUTOMATICALLY across networks — no host file needed. | Does NOT need user action. Exploits network vulnerabilities to self-propagate. |
| Trojan Horse | Malware Type | Malware DISGUISED as legitimate software — does NOT self-replicate. | Appears safe. User installs it believing it is real software. Named after Greek myth. |
| Ransomware | Malware Type | Encrypts victim's files. Demands payment (ransom) to restore access. | WannaCry (2017) = most famous example. Double threat: encryption + extortion. |
Virus vs Worm vs Trojan — Three-Way Distinction. Virus = needs a HOST FILE + USER ACTION to spread (you must click something). Worm = STANDALONE, spreads AUTOMATICALLY through network vulnerabilities — no user action needed. Trojan = DISGUISED as legitimate software — does NOT self-replicate at all. FPSC uses 'self-replicating' as a distractor for Trojan — it is wrong. Trojan does not self-replicate.
5. Cyber Defense — Complete Reference
| Defense | Type | FPSC Strategic Fact |
|---|---|---|
| Firewall | Network Traffic Controller | Monitors and controls incoming/outgoing network traffic. Network gatekeeper. NOT virus removal. |
| Antivirus | Malware Remover | Detects and removes malware already INSIDE the system. Different tool from firewall. |
| Encryption | Data Protection | Converts plaintext to unreadable ciphertext using a key. HTTPS uses SSL/TLS encryption. |
| Zero Trust Architecture | Security Model | 'Never Trust, Always Verify.' Every access request authenticated regardless of origin. (2025 trend) |
| Multi-Factor Authentication | Identity Verification | Requires 2+ verification factors (password + SMS code + biometric) before granting access. Two-step verification. |
| End-to-End Encryption (E2EE) | Message Security | Only sender and receiver can read messages — platform provider cannot access content. Used by WhatsApp and Signal. |
6. Battle Card — 5-Minute Revision
| Fact | Answer |
|---|---|
| 1 Nibble = | 4 bits (half a byte) |
| 1 Byte = | 8 bits (2 Nibbles) |
| Binary multiplier | 1024 (NOT 1000) — all memory units use 1024 |
| 1024 MB = | 1 Gigabyte (GB) |
| 1024 GB = | 1 Terabyte (TB) |
| Memory speed (fastest first) | Registers → Cache → RAM → SSD → HDD |
| Cache vs RAM speed | Cache is FASTER than RAM |
| Volatile memory | RAM and Cache (lose data on power loss) |
| Non-volatile memory | ROM, HDD, SSD, Flash Drive (retain data) |
| Phishing | Deceptive emails/sites — steals credentials via human psychology |
| Virus | Self-replicating + needs HOST FILE + user action |
| Worm | Standalone — spreads AUTOMATICALLY, no host needed |
| Trojan | DISGUISED as legitimate software — does NOT self-replicate |
| Ransomware | Encrypts files + demands payment. WannaCry (2017). |
| Zero Trust | Never Trust, Always Verify — every access request verified |
| Firewall vs Antivirus | Firewall = network gatekeeper. Antivirus = malware remover. |
| Transformer architecture | Powers Generative AI / Large Language Models (ChatGPT, Gemini) |
| HTTPS 'S' = | Secure (SSL/TLS encryption) |
7. Practice MCQs (FPSC Level)
Part A — Basic Recall (Q1–Q4)
Direct recall on confirmed past-paper facts.
One 'Nibble' in computer memory terminology is equal to:
Show explanation
A Nibble = 4 bits = half a Byte. The hierarchy: 1 Nibble = 4 bits. 1 Byte = 8 bits = 2 Nibbles.
Trap: FPSC tests the Nibble as the 'intermediate unit' between bit and byte — the near-miss trap because students assume the answer is 'Bit' (the smallest unit) without considering the intermediate.
1024 Megabytes (MB) is equal to:
Show explanation
1024 MB = 1 Gigabyte (GB). The binary multiplier chain: 1024 B = 1 KB → 1024 KB = 1 MB → 1024 MB = 1 GB → 1024 GB = 1 TB.
Trap: Using 1000 instead of 1024 would be mathematically incorrect for binary systems.
The 'S' in HTTPS stands for:
Show explanation
HTTPS = HyperText Transfer Protocol Secure. The 'S' stands for Secure. HTTPS uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption to protect all data transmitted between the browser and web server.
MPT 2025
A Trojan Horse in cybersecurity refers to:
Show explanation
A Trojan Horse is malware disguised as legitimate software. Unlike viruses (which self-replicate by attaching to files) and worms (which self-propagate across networks), Trojans do NOT self-replicate. The user installs the Trojan believing it is genuine software.
Trap: Trojan does NOT self-replicate — key distinction.
Part B — Trap-Based (Q5–Q8)
FPSC traps drawn from confirmed past-paper distractor patterns.
In binary storage calculations, using 1024 instead of 1000 is primarily due to:
Show explanation
Digital computers operate in binary (base-2). 2¹⁰ = 1,024 — not 1,000. The metric prefix 'kilo' = 1,000 in everyday usage, but in computing the binary equivalent is 1,024 (kibi).
Trap: FPSC tests this distinction to separate technically precise candidates.
Which of the following memory components will MOST likely lose stored data when power fails?
Show explanation
RAM and Cache are volatile — both require constant electrical power to retain data. When power fails, all RAM and Cache contents are immediately lost.
Trap: ROM is non-volatile (stores BIOS permanently). HDD, SSD, and Flash Drives are non-volatile storage.
Phishing attacks primarily exploit:
Show explanation
Phishing is a social engineering attack — it exploits human psychology (fear, curiosity, urgency) rather than technical vulnerabilities. A phishing email mimics a trusted institution and tricks the victim into revealing credentials on a fake website.
Trap: Phishing = social engineering — human not technical.
Which cloud service model provides maximum control over the operating system and virtual machines?
Show explanation
IaaS (Infrastructure as a Service) gives the user maximum control — they manage the operating system, applications, and data themselves. The provider only manages physical hardware.
Trap: SaaS gives the user the least control — the provider manages everything.
Part C — Elite Simulation (Q9–Q12)
Multi-statement and cause-and-effect logic at full FPSC difficulty.
Consider the memory hierarchy from fastest to slowest: (1) CPU Registers. (2) L1 Cache. (3) RAM. (4) HDD. Which sequence is correct?
Show explanation
Memory speed hierarchy from fastest to slowest: (1) CPU Registers → (2) L1/L2 Cache → (3) RAM → (4) HDD. Registers are built into the CPU. Cache is on-chip. RAM is separate chips. HDD is the slowest — mechanical or electronic storage.
Which combination is correctly matched? (1) Phishing — Social engineering attack. (2) Zero Trust — Continuous identity verification. (3) Trojan — Self-replicating malware.
Show explanation
(1) Phishing = social engineering attack: TRUE. (2) Zero Trust = continuous identity verification: TRUE. (3) Trojan = self-replicating malware: FALSE. Trojan is disguised as legitimate software — it does NOT self-replicate.
Trap: Self-replication is the property of viruses and worms — not Trojans.
A Zero Trust security model assumes that:
Show explanation
Zero Trust Architecture is based on the principle 'Never Trust, Always Verify.' It rejects the traditional assumption that everything inside the network perimeter is safe. Every access request — from any user, device, or location — must be authenticated and authorised, even from internal sources.
MPT 2025 trend
A ransomware attack differs from a Trojan primarily because ransomware:
Show explanation
Ransomware specifically encrypts the victim's data and demands payment (ransom) to restore access. WannaCry (2017) is the most famous example.
Trap: Trojan = disguises itself as legitimate software. Worms = self-replicate across networks. These are three distinct threat profiles.
8. Answer Key & Explanations
Memory, Cyber Security & AI Defense — Q1–Q12
| Q | Correct | Type | Primary Trap | Why Others Fail |
|---|
Unit V — Chemistry: Applied & Everyday
Matter · Atomic Structure · Acids & Minerals · Industrial Chemistry