CSS Prepare

Chapter 14

Memory Units, Cyber Security & AI Defense

Bit / Byte / KB / MB / GB / TB conversion, encryption basics, AI-driven security.

Full Chapter Notes

Source · FPSC Trap Decoder · CSS MPT Smart Notes (2026 Edition)

MPT Weightage: 3–5 Marks  ·  Difficulty: Medium  ·  Confirmed Past Papers: 2023 · 2024 · 2025

Trend Alert. Memory unit conversions (binary 1024 multiplier), cyber threat definitions (phishing, ransomware, trojan), and the Zero Trust security model are the core targets. The 1024 vs 1000 trap appeared in every paper since 2022. Nibble (4 bits) is a favourite FPSC 'near-miss' question. The Transformer architecture for AI/LLMs is a 2025–2026 emerging target.

1. High-Yield Fact Snapshot

FPSC-Tested FactCorrect AnswerYear Tested
1 Nibble =4 bits (half a byte)Consistent trap
1 Byte =8 bitsFoundation fact
Binary multiplier (KB, MB, etc.)1024 — NOT 1000Every paper
1024 MB =1 Gigabyte (GB)Repeated
HTTPS 'S' stands forSecure2025
Memory speed order (fastest first)Registers → Cache → RAM → HDDElite trap
Phishing primary exploitHuman psychology — deception2022 high-yield
Trojan Horse — key featureDisguised as legitimate software — does NOT self-replicateCommon trap
Zero Trust ArchitectureNever Trust, Always Verify — every access verified2025 trend
Transformer architecture — associated withGenerative AI and Large Language Models2025–26 prediction

2. Binary Storage Hierarchy

Computers use the binary (base-2) system. All memory multipliers are based on powers of 2, making 1024 (2¹⁰) the standard — NOT 1000. This distinction appears in every MPT paper.

UnitValueEquivalentPower of 2FPSC Note
Bit0 or 1Smallest digital unitBinary digit. 'b' (lowercase) in data speed (Mbps).
Nibble4 BitsHalf a ByteTrap: 'Building block between bit and byte' = Nibble. Used in hexadecimal.
Byte8 Bits2 Nibbles2⁰ (base)Standard unit for one character (e.g., 'A'). 'B' (uppercase) in file size (MB).
Kilobyte (KB)1,024 Bytes2¹⁰Trap: NOT 1,000 bytes. Binary = 1024.
Megabyte (MB)1,024 KB1,048,576 Bytes2²⁰High-quality photo ~3–5 MB. MP3 song ~3–4 MB.
Gigabyte (GB)1,024 MB~1 billion Bytes2³⁰RAM and modern phone storage measured in GB.
Terabyte (TB)1,024 GB~1 trillion Bytes2⁴⁰External hard drives and server storage.
Petabyte (PB)1,024 TB~1 quadrillion Bytes2⁵⁰Data centres and cloud storage at scale.

1024 vs 1000 Trap. The metric prefix 'kilo' = 1,000 in everyday usage (1 kilometre = 1,000 metres). However, computers use the binary system (base-2). 2¹⁰ = 1,024 — NOT 1,000. So 1 Kilobyte = 1,024 Bytes. 1 Megabyte = 1,024 Kilobytes. FPSC will offer '1,000 Bytes = 1 KB' as an option — this is WRONG. Always choose 1,024.

Bit vs Byte Symbol Trap. Bit is abbreviated with lowercase 'b'. Byte is abbreviated with uppercase 'B'. This matters in data measurements: 100 Mbps = 100 Megabits per second (internet speed). 500 GB = 500 GigaBytes of storage. FPSC occasionally tests this symbol distinction in data speed questions.

3. Memory Hierarchy — Speed vs Capacity

Memory TypeSpeedCapacityVolatile?
CPU RegistersFastestTiny (bytes)Yes — volatile
L1/L2 CacheVery FastSmall (KB–MB)Yes — volatile
RAMFastMedium (GB)Yes — volatile (2025)
SSD (Solid State Drive)Moderate-FastLarge (GB–TB)No — non-volatile
HDD (Hard Disk Drive)SlowestLarge (GB–TB)No — non-volatile
ROMFixedSmall (MB)No — non-volatile (2025)
Memory Speed Rule

Cache is FASTER than RAM. RAM is FASTER than Hard Drive. The speed order (fastest to slowest): CPU Registers → L1 Cache → L2 Cache → RAM → SSD → HDD. The FPSC elite trap asks whether Cache is faster or slower than RAM — Cache is FASTER.

4. Cyber Threat Classification — Complete Reference

ThreatCategoryDefinitionFPSC Key Distinction
PhishingSocial EngineeringDeceptive emails/fake websites trick users into revealing passwords and personal data.Most common cyber attack. Exploits human psychology — not technical code. (2022)
Spear PhishingTargeted Social EngineeringHighly targeted version of phishing — impersonates a specific trusted person.Unlike generic phishing, targets a specific individual (e.g., your manager).
MalwareUmbrella TermMalicious Software — any software designed to harm or gain unauthorized access.Covers virus, worm, trojan, ransomware, spyware. Not one specific threat.
VirusMalware TypeSelf-replicating code that attaches to HOST files — spreads when host is executed.Requires a host file. User must click/open something. DISTINGUISHES from worm.
WormMalware TypeStandalone malware that spreads AUTOMATICALLY across networks — no host file needed.Does NOT need user action. Exploits network vulnerabilities to self-propagate.
Trojan HorseMalware TypeMalware DISGUISED as legitimate software — does NOT self-replicate.Appears safe. User installs it believing it is real software. Named after Greek myth.
RansomwareMalware TypeEncrypts victim's files. Demands payment (ransom) to restore access.WannaCry (2017) = most famous example. Double threat: encryption + extortion.

Virus vs Worm vs Trojan — Three-Way Distinction. Virus = needs a HOST FILE + USER ACTION to spread (you must click something). Worm = STANDALONE, spreads AUTOMATICALLY through network vulnerabilities — no user action needed. Trojan = DISGUISED as legitimate software — does NOT self-replicate at all. FPSC uses 'self-replicating' as a distractor for Trojan — it is wrong. Trojan does not self-replicate.

5. Cyber Defense — Complete Reference

DefenseTypeFPSC Strategic Fact
FirewallNetwork Traffic ControllerMonitors and controls incoming/outgoing network traffic. Network gatekeeper. NOT virus removal.
AntivirusMalware RemoverDetects and removes malware already INSIDE the system. Different tool from firewall.
EncryptionData ProtectionConverts plaintext to unreadable ciphertext using a key. HTTPS uses SSL/TLS encryption.
Zero Trust ArchitectureSecurity Model'Never Trust, Always Verify.' Every access request authenticated regardless of origin. (2025 trend)
Multi-Factor AuthenticationIdentity VerificationRequires 2+ verification factors (password + SMS code + biometric) before granting access. Two-step verification.
End-to-End Encryption (E2EE)Message SecurityOnly sender and receiver can read messages — platform provider cannot access content. Used by WhatsApp and Signal.

6. Battle Card — 5-Minute Revision

FactAnswer
1 Nibble =4 bits (half a byte)
1 Byte =8 bits (2 Nibbles)
Binary multiplier1024 (NOT 1000) — all memory units use 1024
1024 MB =1 Gigabyte (GB)
1024 GB =1 Terabyte (TB)
Memory speed (fastest first)Registers → Cache → RAM → SSD → HDD
Cache vs RAM speedCache is FASTER than RAM
Volatile memoryRAM and Cache (lose data on power loss)
Non-volatile memoryROM, HDD, SSD, Flash Drive (retain data)
PhishingDeceptive emails/sites — steals credentials via human psychology
VirusSelf-replicating + needs HOST FILE + user action
WormStandalone — spreads AUTOMATICALLY, no host needed
TrojanDISGUISED as legitimate software — does NOT self-replicate
RansomwareEncrypts files + demands payment. WannaCry (2017).
Zero TrustNever Trust, Always Verify — every access request verified
Firewall vs AntivirusFirewall = network gatekeeper. Antivirus = malware remover.
Transformer architecturePowers Generative AI / Large Language Models (ChatGPT, Gemini)
HTTPS 'S' =Secure (SSL/TLS encryption)

7. Practice MCQs (FPSC Level)

Part A — Basic Recall (Q1–Q4)

Direct recall on confirmed past-paper facts.

One 'Nibble' in computer memory terminology is equal to:

    Show explanation

    A Nibble = 4 bits = half a Byte. The hierarchy: 1 Nibble = 4 bits. 1 Byte = 8 bits = 2 Nibbles.

    Trap: FPSC tests the Nibble as the 'intermediate unit' between bit and byte — the near-miss trap because students assume the answer is 'Bit' (the smallest unit) without considering the intermediate.

    1024 Megabytes (MB) is equal to:

      Show explanation

      1024 MB = 1 Gigabyte (GB). The binary multiplier chain: 1024 B = 1 KB → 1024 KB = 1 MB → 1024 MB = 1 GB → 1024 GB = 1 TB.

      Trap: Using 1000 instead of 1024 would be mathematically incorrect for binary systems.

      The 'S' in HTTPS stands for:

        Show explanation

        HTTPS = HyperText Transfer Protocol Secure. The 'S' stands for Secure. HTTPS uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption to protect all data transmitted between the browser and web server.

        MPT 2025

        A Trojan Horse in cybersecurity refers to:

          Show explanation

          A Trojan Horse is malware disguised as legitimate software. Unlike viruses (which self-replicate by attaching to files) and worms (which self-propagate across networks), Trojans do NOT self-replicate. The user installs the Trojan believing it is genuine software.

          Trap: Trojan does NOT self-replicate — key distinction.

          Part B — Trap-Based (Q5–Q8)

          FPSC traps drawn from confirmed past-paper distractor patterns.

          In binary storage calculations, using 1024 instead of 1000 is primarily due to:

            Show explanation

            Digital computers operate in binary (base-2). 2¹⁰ = 1,024 — not 1,000. The metric prefix 'kilo' = 1,000 in everyday usage, but in computing the binary equivalent is 1,024 (kibi).

            Trap: FPSC tests this distinction to separate technically precise candidates.

            Which of the following memory components will MOST likely lose stored data when power fails?

              Show explanation

              RAM and Cache are volatile — both require constant electrical power to retain data. When power fails, all RAM and Cache contents are immediately lost.

              Trap: ROM is non-volatile (stores BIOS permanently). HDD, SSD, and Flash Drives are non-volatile storage.

              Phishing attacks primarily exploit:

                Show explanation

                Phishing is a social engineering attack — it exploits human psychology (fear, curiosity, urgency) rather than technical vulnerabilities. A phishing email mimics a trusted institution and tricks the victim into revealing credentials on a fake website.

                Trap: Phishing = social engineering — human not technical.

                Which cloud service model provides maximum control over the operating system and virtual machines?

                  Show explanation

                  IaaS (Infrastructure as a Service) gives the user maximum control — they manage the operating system, applications, and data themselves. The provider only manages physical hardware.

                  Trap: SaaS gives the user the least control — the provider manages everything.

                  Part C — Elite Simulation (Q9–Q12)

                  Multi-statement and cause-and-effect logic at full FPSC difficulty.

                  Consider the memory hierarchy from fastest to slowest: (1) CPU Registers. (2) L1 Cache. (3) RAM. (4) HDD. Which sequence is correct?

                    Show explanation

                    Memory speed hierarchy from fastest to slowest: (1) CPU Registers → (2) L1/L2 Cache → (3) RAM → (4) HDD. Registers are built into the CPU. Cache is on-chip. RAM is separate chips. HDD is the slowest — mechanical or electronic storage.

                    Which combination is correctly matched? (1) Phishing — Social engineering attack. (2) Zero Trust — Continuous identity verification. (3) Trojan — Self-replicating malware.

                      Show explanation

                      (1) Phishing = social engineering attack: TRUE. (2) Zero Trust = continuous identity verification: TRUE. (3) Trojan = self-replicating malware: FALSE. Trojan is disguised as legitimate software — it does NOT self-replicate.

                      Trap: Self-replication is the property of viruses and worms — not Trojans.

                      A Zero Trust security model assumes that:

                        Show explanation

                        Zero Trust Architecture is based on the principle 'Never Trust, Always Verify.' It rejects the traditional assumption that everything inside the network perimeter is safe. Every access request — from any user, device, or location — must be authenticated and authorised, even from internal sources.

                        MPT 2025 trend

                        A ransomware attack differs from a Trojan primarily because ransomware:

                          Show explanation

                          Ransomware specifically encrypts the victim's data and demands payment (ransom) to restore access. WannaCry (2017) is the most famous example.

                          Trap: Trojan = disguises itself as legitimate software. Worms = self-replicate across networks. These are three distinct threat profiles.

                          8. Answer Key & Explanations

                          Memory, Cyber Security & AI Defense — Q1–Q12

                          QCorrectTypePrimary TrapWhy Others Fail

                          Unit V — Chemistry: Applied & Everyday

                          Matter · Atomic Structure · Acids & Minerals · Industrial Chemistry