0 All Topics Flashcards

1
Q

Describe what happens in the “fetch” part of the fetch-execute cycle? (3)

A
  1. The address of the instruction to be fetched is placed into the MAR. 2. The instruction is fetched from memory. 3. The instruction is transferred to the MDR.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe what happens in the “decode” part of the fetch-execute cycle? (1)

A

The computer decodes the instruction by deciding which instruction should be carried out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe what happens in the “execute” part of the fetch-execute cycle? (1)

A
  1. The decoded instruction is then executed so that the CPU performs continuously
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe what happens at the end of the fetch execute cycle? (2)

A
  1. The process is repeated 2. The program counter is incremented
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What operations does the ALU perform? (1)

A
  1. Arithmetic and logic operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Control Unit (CU) do? (1)

A

Manages the FDE Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a CPU register? (1)

A
  1. The section of high-speed memory within the CPU that stores data to be processed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State two features of the MAR? (2)

A
  1. It is a register 2. It stores a single address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of the MAR? (2)

A
  1. Stores the address of the instruction or data that is going to be fetched 2. Holds the address in memory where data is going to be transferred to
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the function of the MDR? (1)

A
  1. Stores the fetched instruction/ the instruction to be processed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of the Program Counter? (1)

A
  1. Stores the address of the next (or current) instruction to be run
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of the Accumulator? (1)

A
  1. Stores the result of calculations/processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why does cache size affect the performance of the CPU (2)

A

Data is transferred faster (1) Makes the CPU more efficient (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can having a higher processor affect the performance of the CPU (2)

A

Faster/ Higher clock speed (1) More Fetch Execute Cycles (1) More Instructions can be executed per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain why having a quad- core processor will not always run twice as fast as a dual- core processor (3)

A

Software may be designed to run 1 core and not multiple (1) Dual core may have a faster clock speed than a quad core (1) Quad core may have less RAM (1) Quad core may have less cache (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Cache Memory (2)

A

High speed memory inside the processor (1) that stores frequently used insructions (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define what is meant by an ‘embedded system’ (1)

A

A computer system that is built into another device (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Identify 3 devices that contain embedded systems (3)

A

Sat Nav (1) Dishwasher (1) MP3 player (1) Washing machine (1) Manufacturing equipment (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identify 2 characteristics of an embedded system (2)

A

They have limited functions (1) and are often built into larger machines (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is primary memory? (1)

A

Memory directly accessed by the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two types of primary memory? (2)

A

RAM (1) ROM (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of ROM? (3)

A

Stores BIOS (1) Stores boot up instructions (1) Stores data that should not be changed (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Is ROM volatile or non volatile? (1)

A

Non volatile (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of RAM? (2)

A

Stores currently running programs (1) and data (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Is RAM volatile or non volatile? (1)

A

Volatile (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Why do computers need virtual memory? (2)

A

When RAM is full (1) secondary storage is used as temporary RAM (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How does virtual memory work? (4)

A

When RAM is full (1) data from RAM is moved to secondary storage to make space (1) RAM can then be filled with new data (1) When data in virtual memory is needed it is moved back to RAM (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why is secondary storage needed on a computer system? (2)

A

To store files (1) including when the computer is turned off (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the characteristics of Magnetic Disk Storage e.g. HDD? (3)

A

Large capacity (1) relatively cheap (1) sensitive to movement due to moving parts (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the characteristics of Solid State (flash) storage? (3)

A

Lower capacity (1) relatively expensive (1) no moving parts so not sensitive to movement (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the characteristics of Optical Disc storage? (3)

A

Low capacity (1) very cheap per disc (1) moving parts so can’t be moved while running (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

List the 6 characteristics of secondary storage. (6)

A

Cost Capacity Reliability Speed Portability Durability (Computers Can Really Store Petabytes of Data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the three types of secondary storage? (3)

A

Magnetic Disk (1) Optical Disk (1) Solid State (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Why does data need to be stored as binary? (1)

A

Computers can only understand binary (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How do you calculate the size of a sound file? (3)

A

Sample rate (1) x duration in seconds (1) x bit depth (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How do you calculate the size of an image file? (3)

A

Colour depth (1) x image height in pixels (1) x image width in pixels (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How do you calculate the size of a text file? (2)

A

Bits per character (1) x number of characters (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the units of file sizes, smallest to largest? (8)

A

Bit Nibble Byte Kilobyte Megabyte Gigabyte Terabyte Petabyte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How many bits in a byte? (1)

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How many bits in a nibble? (1)

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How do you convert from a unit of file size to a larger unit?

A

Divide by 1000 per step (unless it’s nibbles or bits to byte)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How do you convert from a unit of file size to a smaller unit?

A

Multiply by 1000 per step (unless it’s bytes to nibble / bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is 0101 in denary? (1)

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is 11001111 in denary? (1)

A

207

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is 151 in binary? (2)

A

10010111 (1 mark per nibble)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What are the rules of binary addition? (4)

A

0 + 0 = 0. 0 + 1 = 1. 1 + 1 = 0 carry 1. 1 + 1 + 1 = 1 carry 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is an overflow error? (2)

A

An extra carry bit (1) that cannot fit into the bits provided (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Convert 39 from hexadecimal to denary (1)

A

57

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Convert 203 from denary to hexadecimal (2)

A

CB (one mark per digit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Convert 10010011 from binary to hexadecimal (2)

A

93 (one mark per digit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Convert FA from hexadecimal to binary (2)

A

11111010 (one mark per nibble)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How can you multiply a binary number by 2? (1)

A

Move all of the bits 1 place to the left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How can you divide a binary number by 2? (1)

A

Move all the bits 1 place to the right.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a character set? (1)

A

The characters a computer system understands / displays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How many potential characters can you store with a byte? (1)

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How many potential characters can you store with 7 bits? (1)

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

How many characters can ASCII represent? (1)

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How many characters can Unicode represent? (1)

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

If the binary code for “A” was 65 what would be the code for “D”?

A

68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Describe how a character set would be used to store the string “Hello world!” (2)

A

Each character in a character set has a unique binary value. (1) The binary values of each character are recalled in order. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How are images stored in binary? (3)

A

The image is split up into pixels. (1) Each pixel is given a binary code. (1) Which represents the colour of that pixel. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is metadata? (1)

A

Data about data. Data about an image / sound file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What might metadata store about an image? (2)

A

Height (1) width (1) colour depth (1) resolution (1) author (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is the impact of increasing colour depth on an image file? (2)

A

More colours will be available (1) file size will increase (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the impact of increasing resolution of an image file? (2)

A

More pixels will be used, increasing the detail of the image. (1) The file size will increase (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

How is sound stored in binary? (2)

A

The height of the sound wave is sampled at regular intervals (1) and converted to binary (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is the impact of increasing the bit depth on an audio file? (2)

A

The sound reproduced will be closer to the original (1) but file size will increase (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is the impact of increasing the sample rate of an audio file? (2)

A

The wavelength is sampled more often so the sound reproduced will be closer to the original (1) but file size will increase (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Why is compression useful? (2)

A

It reduces file size (1) so files take less space on secondary storage (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What are the benefits of lossy compression? (4)

A

Lossy means the decompressed file is not identical to the original (1) however the difference is unlikely to be noticed by humans. (1) Lossy will decrease file size (1) so files are easier to store or send. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What are the benefits of lossless compression? (2)

A

Lossless means the decompressed file is identical to the original. (1) The file size will decrease, but not as much as lossy. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What are the two types of network? (2)

A

LAN (Local Area Network) & WAN (Wide Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is a LAN? (2)

A

Computers connected together (1) in a small geographic area (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is a WAN? (2)

A

A network over a large geographic area (1) that uses external hardware or the internet (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What are three factors that would affect the performance of a network? (3)

A

Bandwidth of network (1) number of devices connected (1) distance to WAP if wireless (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is the role of a switch? (2)

A

It connects devices on a network (1) using MAC addresses (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is the role of a router? (2)

A

It connects networks together eg network to internet (1) using IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is the role of a wireless access point (WAP)? (1)

A

It broadcasts a wireless signal allowing devices to communicate with a network (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is the role of the NIC? (2)

A

Stores the device’s MAC address (1) allows the device to connect to networks (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What are the key features of a Peer to Peer (P2P) network? (4)

A

Devices are directly connected to each other (1) devices are independent / equal (1) devices install software / updates individually (1) if any device fails the remainder can continue (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What are the key features of a Client / Server network? (4)

A

Devices are connected via a switch (1) software and updates can be installed from a central machine (1) requires a specialist to set up (1) hard to add new nodes (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Name a wired mode of connection (1)

A

Ethernet(1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Name two wireless connection methods (2)

A

Wi-fi (1) Bluetooth (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is encryption? (3)

A

An algorithm(1) that disguises data (1) so it can only be understood by authorised users (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Give three features of an IP(v4) address (3)

A

4 bytes long (1) normally written in denary (1) configured in software (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Give three features of an IP(v6) address (3)

A

16 bytes long (1) normally written in hex
(1) configured in software (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Give three features of a MAC address (3)

A

6 bytes long(1) normally written in hex (1) configured by hardware (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which addressing mode is used to route data over the internet? (1)

A

IP addressing (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which addressing mode is used to route data within a LAN? (1)

A

MAC addressing (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What are standards? (1)

A

Rules that allow hardware and software made by different providers to interact (1). Eg Ethernet or HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is a network protocol? (1)

A

A set of rules for data transmission (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is TCP / IP used for? (2)

A

IP finds the address of a device (1) TCP transfers data (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What is HTTP used for? (1)

A

Transmitting websites (HTML) (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is HTTPS used for? (1)

A

Transmits websites securely (1) using encryption (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is a layer in a network protocol? (1)

A

A division of network functionality (1) (This means it’s one part of the algorithms that make a network run)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What are the advantages of splitting a network protocol into layers? (4)

A

Layers are self contained (1) which allows different developers to concentrate on one aspect of the network. (1) A layer can be taken out and edited without affecting other layers (1) which means different vendors and systems can work together. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is FTP? (2)

A

File Transfer Protocol (1) transfers files using client / server. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is POP? (3)

A

Post Office Protocol. (1) An email protocol (1) that delivers an e-mail and doesn’t keep a copy on a server. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is IMAP? (3)

A

Instant Message Access Protocol. (1) An email protocol (1) that allows a user to access emails stored on a server. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What is SMTP? (3)

A

Simple Mail Transfer Protocol. (1) An email protocol (1) for sending emails. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What are the internet protocols we’ve learned? (3)

A

HTTP (1) HTTPS (1) FTP (1)

102
Q

Which protocol is used to connect devices on wired networks? (1)

A

Ethernet(1)

103
Q

What are the email protocols we’ve learned? (3)

A

POP3 (1) IMAP (1) SMTP (1)

104
Q

What is a brute force attack? (1)

A

A program attempting all possible combinations (1)

105
Q

What is data interception? (1)

A

Data transmissions being read by unauthorised users or programs (1)

106
Q

What is malware? (1)

A

Software that damages or deletes data (1)

107
Q

What is phishing? (1)

A

Stealing data by tricking users (1)

108
Q

What is SQL injection? (1)

A

Writing code in an input box to access data (1)

109
Q

What are the network threats? (6)

A

Malware (1) Social engineering / Phishing (1) Brute-force attacks (1) Denial of service (DDoS) (1) Data interception (1) SQL injection (1)

110
Q

What is a DDoS attack? (1)

A

Overloading a server with requests so it can’t serve data (1)

111
Q

How do you prevent a brute force attack? (3)

A

Use a strong password (1) limit number of password attempts (1) firewall (1)

112
Q

How do you prevent data interception? (1)

A

Encryption (1)

113
Q

How do you prevent a malware attack? (1)

A

Anti-virus (1)

114
Q

How can you prevent phishing? (2)

A

Network policy (1) firewall (1)

115
Q

What is penetration testing? (1)

A

Looking for security flaws in a network (1)

116
Q

How can you protect against social engineering? (1)

A

Training (1)

117
Q

How can you protect against DDoS? (2)

A

Use a proxy server (1) or a firewall (1)

118
Q

What are the methods of protecting a network? (7)

A

Penetration testing (1) Anti-malware software (1) Firewalls (1) User access levels (1) passwords (1) encryption (1) physical security (1)

119
Q

What is physical security? (2)

A

Methods to prevent access to hardware (1) eg locks on doors (1)

120
Q

What are user access levels? (2)

A

A set of rules (1) that govern what users can do on a network (1)

121
Q

What should a strong password include? (3)

A

At least one uppercase letter (1) lowercase letter (1) and number / symbol (1)

122
Q

What are the roles of the operating system? (5)

A

User Interface (1) File management (1) User management (1) Memory management (1) Peripheral management (1)

123
Q

What does the User Interface do? (2)

A

Displays output (1) to the user and allows them to interface with the hardware (1)

124
Q

What is file management? (2)

A

Allocating space in secondary storage for files (1) allowing users to open and rename / delete / create etc. files (1)

125
Q

What is user management? (3)

A

Creating user accounts and passwords (1) allocating space in memory for users’ data (1) setting rules for what users are allowed to do (1)

126
Q

What is memory management? (2)

A

Transfering data between different areas of memory (1) eg moving data from secondary storage to primary memory (1)

127
Q

What is peripheral management? (1)

A

Allowing the user and operating system to interface with additional hardware (1)

128
Q

What are device drivers? (1)

A

Software that allows an operating system to interface with peripheral devices (1)

129
Q

What is multitasking? (1)

A

An operating system appearing to do several tasks at once (1)

130
Q

What is multiprocessing? (1)

A

An operating system doing several tasks at once using a multi-core processor (1)

131
Q

How is memory management used in multitasking? (2)

A

The instructions for the current task are moved into primary memory when needed (1) then moved out so other tasks can be completed (1)

132
Q

List three features of a user interface (3)

A

A desktop where icons for programs can be arranged (1) windows to show file structures (1) menus to access applications (1)

133
Q

What is utility software? (2)

A

Software that performs a specific task (1) to aid the computer in running (1)

134
Q

What is encryption software? (3)

A

Software that disguises data (1) using an algorithm (1) so only authorised users can understand it (1)

135
Q

What is the purpose of defragmentation software? (3)

A

Files on the hard disk are moved (1) so files are stored together (1) so fewer disk accesses are needed (1)

136
Q

Why might a computer run faster after defragmentation software has run? (3)

A

It takes less time to access a file because the data is stored contiguously (together in order) (1) so the HDD doesn’t need to move as far to read the next piece of data (1) because it will be in the next memory location (1)

137
Q

Give three examples of utility programs (3)

A

Backup (1) Encryption (1) Compression (1) Firewall (1) anti-virus (1)

138
Q

How does compression software reduce file size? (4)

A

It uses an algorithm (1) to remove repeated or unnecessary data (1) It could be lossy or lossless (1) lossy removes data permanently. Lossless means original file will be restored (1)

139
Q

List 3 things you can do with a file management utility (3)

A

Place files in folders (1) rename folders (1) delete files (1) create folders. (1) etc.

140
Q

What are the three laws we need to know for Computer science? (3)

A

The Data Protection Act 2018 (1) Computer Misuse Act 1990 (1) Copyright Designs and Patents act 1988 (1)

141
Q

What are the two types of software licenses? (2)

A

Open source - anyone is able to see the code (1) and proprietary - users must pay to use the software. (1)

142
Q

What are the key features of the Data Protection Act? (3)

A

Data collected must be accurate (1) must not be shared without consent (1) and must not be used unfairly (1)

143
Q

What are the key features of the Computer Misuse Act? (2)

A

It is illegal to possess or use (1) tools to access unauthorised data (1)

144
Q

What are the key features of the Copyright Designs and Patents Act? (2)

A

You own the rights to a creative product when you create it (1) other people or companies must get your permission to use it or face a fine (1)

145
Q

What are the advantages to customers of using open source licensing? (2)

A

It’s usually free to use (1) they can adapt it or add features (1)

146
Q

What are the advantages to businesses of using a proprietary license? (2)

A

They can charge a fee to use it (1) They can restrict what users can do (1)

147
Q

List three ways computers have a negative impact on the environment (3)

A

They use rare materials that must be dug out of the ground (1) they are made using toxic chemicals which must be disposed of (1) when they are thrown away they create e-waste (1)

148
Q

List three ways computers have a positive impact on the environment (3)

A

They contribute to dematerialisation - reducing the amount of things people need (1) they allow research on green energy (1) they allow people to communicate digitally - reducing the need for paper and transport (1)

149
Q

List three ways computers have a positive impact on culture (3)

A

They allow people to connect with other people anywhere in the world (1) They reduce loneliness through allowing easier contact (1) they allow art and cultural artefacts to be shared for free (1)

150
Q

List three ways computers have a negative impact on culture (3)

A

They create the environment for cyberbullying (1) they expose people to online dangers e.g. phishing and malware (1) They encourage users to spend less time together in person which can lead to loneliness (1)

151
Q

What are the four tools offered by IDEs? [4]

A

Translators [1] run time environments [1] editors [1] error diagnostics [1]

152
Q

How does an editor in an IDE help a programmer write code? [4]

A

Autocomplete [1] colour highlighting [1] automatic indentation [1] stepping [1]

153
Q

How does an IDE help a programmer diagnose errors [3]

A

Break points allow the code to stop at specific points [1] stepping allows the programmer to run the program line by line [1] error diagnostics tell the programmer the errors in the code [1]

154
Q

What are the characteristics of high level languages? [3]

A

Close to english [1] work on a range of devices [1] need to be translated [1]

155
Q

What are the characteristics of low level languages? [3]

A

Close to binary [1] may only work on one type of device [1] may not need to be translated [1]

156
Q

Why does code need to be translated? [2]

A

The processor can only understand machine code. [1] code is usually not written in machine code, so needs to be translated. [1]

157
Q

What are the characteristics of a compiler? [3]

A

Converts code to low level in one go [1] Creates an executable file [1] users have no access to source code once compiled [1]

158
Q

What are the characteristics of an interpreter? [3]

A

Converts code to low level line by line [1] Stops running when it finds an error [1] It’s usually quicker to interpret than to compile [1]

159
Q

What is the purpose of testing? [3]

A

Check the program meets the user requirements [1] Check the program works as intended [1] Check the program doesn’t crash when invalid values are entered [1]

160
Q

What are the two times you can test a program? [2]

A

Iterative - during development. Testing while making changes [1] Final - when development is complete. [1]

161
Q

What are the three types of test? [3]

A

Normal - valid data [1] Boundary - the edges of the valid data [1] Erroneous - invalid data [1]

162
Q

What is a syntax error? [1]

A

An error that breaks the rules of the programming language [1]

163
Q

What is a logic error? [2]

A

An error that will not stop the code from running [1] but produces an unexpected outcome [1]

164
Q

How can code be made more maintainable? [4]

A

Comments [1] Indentation [1] Use of subroutines [1] Sensible variable names [1]

165
Q

What is anticipating misuse? [2]

A

Predicting ways that users may break a system [1] and planning ways to prevent it [1]

166
Q

What is authentication? [2]

A

Requiring a username and password [1] to prevent unauthorised access to data [1]

167
Q

What is input validation? [2]

A

Checking that an input meets requirements [1] and is the right data type [1]

168
Q

What is the purpose of a truth table? [2]

A

To predict all possible outputs [1] from a program given all possible inputs [1]

169
Q

What are the three Boolean operators? [3]

A

AND [1] OR [1] NOT [1]

170
Q

What is the rule for an AND gate? [1]

A

Both inputs must be True / 1 [1]

171
Q

What is the rule for an OR gate? [1]

A

One or both inputs must be True / 1 [1]

172
Q

What is the rule for a NOT gate? [1]

A

Input must be False [1] (A NOT gate flips the input)

173
Q

Which gate is this? [1]

A

And [1]

174
Q

Which gate is this? [1]

A

NOT [1]

175
Q

Which gate is this? [1]

A

OR [1]

176
Q

What would be the outcome of this gate if A was 1 and B was 0?

A

1

177
Q

List the three SQL commands we need [3]

A

SELECT [1] FROM [1] WHERE [1]

178
Q

What symbol means ‘All’ in SQL? [1]

A

*

179
Q

What is the command to see all fields from the table ‘users’?

A

SELECT * from users

180
Q

What is the command to select the firstname and secondname fields from customers where the first name is ‘Dave’?

A

SELECT firstname, secondname FROM customers WHERE firstname = ‘Dave’

181
Q

What is the command to select the username from users where age is greater than 13?

A

SELECT username FROM users WHERE age > 13

182
Q

What are the three types of computational thinking? [3]

A

Abstraction [1] Decomposition [1] Algorithmic thinking [1]

183
Q

What is abstraction? [2]

A

Removing unnecessary detail [1] to focus on the important parts of a problem [1]

184
Q

What is decomposition? [2]

A

Breaking a large problem down into smaller problems [1] until the problems are small enough to solve [1]

185
Q

What is algorithmic thinking? [2]

A

Structuring a problem so it can be solved by a computer [1] usually by making it quantitative [1]

186
Q

What are the three programming constructs? [3]

A

Sequence [1] Selection [1] Iteration [1]

187
Q

What is programming in sequence? [2]

A

Instructions in order [1] processed one after the other [1]

188
Q

What is programming using iteration? [2]

A

Repeating sections of code [1] until conditions are met [1]

189
Q

What is programming using selection? [2]

A

Choosing which code to run [1] based on a decision [1]

190
Q

When writing an input in an algorithm what must we remember to do? [1]

A

Assign the input to a variable [1]

191
Q

What is a structure diagram? [3]

A

A diagram that shows the problem you’re solving at the top [1] then breaks the problem down into smaller problems below [1] then breaks those problems down into smaller problems etc [1]

192
Q

Describe the steps a linear search would use to look for an item in a list [4]

A

Look at each item in order [1] starting at the beginning [1] until the item is found and the position of the item is returned [1] or the end of the list is reached and the search returns not found. [1]

193
Q

What is the prerequisite for binary search data? [1]

A

It must be in order [1]

194
Q

Describe the steps a binary search would use to look for an item in a list [5]

A

Find the middle of a list (round down if it would be a decimal) [1]

If it’s the number searched for, return the index of the number [1]

If it is higher than the number, discard the middle number and lower half of list and repeat [1]

If it is lower than the number, discard the middle number and the upper half of list and repeat. [1]

If only one value is left and it’s not the number we’re looking for, the number is not in the list [1]

195
Q

Complete a binary search for the number 7 in this data:

2 4 6 7 8

A

2 4 6 7 8 # Find middle number - 6.
# 6 is lower than 7 so discard 6 and lower half of list.
7 8 # Find middle number - between 7 and 8, so go left
# Middle number is 7. Return index of 7.

196
Q

Describe the steps a merge sort would take to sort a list [4]

A

Split the list in half, then split the sub lists in half [1] until all numbers are in a list of length 1 [1]

Combine the lists in pairs, in order [1] and repeat until all lists have been combined into a sorted list [1]

197
Q

Complete a merge sort on this list: [2, 9, 1, 7, 3, 6]

A

[2, 9, 1] , [7, 3, 6] #Split the list in half.
[2] [9,1] [7] [3,6] #Split again
[2] [9] [1] [7] [3] [6] # Split again. All now on their own.
[2,9], [1,7], [3,6] #Combine in pairs, in order.
[1, 2, 7, 9], [3, 6] #Combine pairs, two at a time.
[1, 2, 3, 6, 7, 9] #Sorted list

198
Q

Describe the steps an insertion sort would take to sort a list [4]

A

Look at the second item of the list. [1] If it’s smaller than the number to its left, move it left until it isn’t [1]. Repeat with each other item in the list in order [1] until all items have been sorted. [1]

199
Q

Complete an insertion sort on this list: [9, 3, 6, 2, 4]

A

9, 3, 6, 2, 4 #Initial list
3, 9, 6, 2, 4 # 3 moved left as it’s smaller than 9.
3, 6, 9, 2, 4 # 6 moved left as it’s smaller than 9, but stops as it’s not smaller than 3.
2, 3, 6, 9, 4 # 2 moved left until it hits the start as it’s smaller than 3, 6 and 9.
2, 3, 4, 6, 9 # 4 moved left as it’s smaller than 9 and 6, but stops as it’s not smaller than 3.

200
Q

Describe the steps a bubble sort would take to sort a list [4]

A

Look at items 1 and 2 in the list. [1]
If they’re not in order, swap them. [1]
Repeat the process, moving along by 1 each time until the end of the list is reached. [1]
If any swaps have been made, go back to the start of the list and repeat. [1]

201
Q

Show the steps a bubble sort would take to sort this list: 4, 5, 2, 3

A

We made some swaps, so repeat the process. We don’t need to look at the last number this time.

4, 5, 2, 3 # Initial list
(4, 5), 2, 3 # 4 and 5 are in order, so don’t swap.
4, (2, 5), 3 # 5 and 2 are not in order, so swap.
4, 2, (3, 5) # 5 and 3 are not in order, so swap.

(2, 4), 3, 5 # 4 and 2 are not in order, so swap.
2, (3, 4), 5 # 4 and 3 are not in order, so swap.

(2, 3), 4, 5 # 2 and 3 are in order, so don’t swap.

List is sorted.

202
Q

Which algorithm is this?

counter = 0
swapped = True
swaps = 0
length = list.length
while swapped == True
while counter < length-1
if list[counter] > list[counter+1] then
temp = list[counter]
list[counter] = list[counter+1]
list[counter+1] = temp
swaps = swaps + 1
endif
counter = counter + 1
endwhile
if swaps == 0 then
swapped = False
else:
swaps = 0
counter = 0
endif
endwhile

A

Bubble sort

203
Q

Which algorithm is this?

find = 11
found = False
length = list.length
lowerBound = 0
upperBound = length

while (lowerBound <= upperBound)
midpoint = int((upperBound + lowerBound))/2
if list[midPoint] == find then
print(‘Found at’ , midpoint)
found = True
endif
if list[midpoint]> find then
upperBound = midpoint-1
else
lowerBound = midpoint+1
endif
endwhile

if found == False then
print(‘Not found’)
endif

A

Binary search

204
Q

What is a variable? [2]

A

A location in memory [1] that stores a value [1]

205
Q

What is a constant? [1]

A

A variable that should not be changed while the program is running [1]

206
Q

What are the 5 data types for variables? [5]

A

Character, Real, Integer, Boolean, String

207
Q

What is the operator for equal to?

A

==

208
Q

What is the operator for not equal to?

A

!=

209
Q

What is the operator for less than or equal to?

A

<=

210
Q

What is the operator for greater than or equal to?

A

> =

211
Q

What does MOD do?

A

Divides and gives the remainder, e.g. 5 MOD 2 = 1

212
Q

What does DIV do?

A

Divides and discards the remainder, e.g. 3 DIV 2 = 2

213
Q

What does the ^ operator do?

A

Exponentiation, e.g. 2 ^ 3 is 8

214
Q

What is 9 MOD 5?

A

4

215
Q

What is 7 DIV 2?

A

3

216
Q

How would you write this statement in Python? If the user’s age is greater than 12, but below 20.

A

if age > 12 and age < 20

217
Q

How would you write this statement in Python? If the user’s name is ‘Dave’ or ‘Sarah’

A

if name == ‘Dave’ or name == ‘Sarah’

218
Q

Assign the value “Dave” to the variable name

A

name = “Dave”

219
Q

Take a user’s name as an input and assign it to the variable name.

A

name = input(“Enter your name”)

220
Q

What is a count controlled loop? [3]

A

A loop that repeats [1] until a count is reached [1] a for loop. [1]

221
Q

What is a condition controlled loop? [3]

A

A loop that repeats [1] while a condition is met [1] a while loop [1]

222
Q

Is this code selection or iteration?

while name != “Dave”:
name = input(“Enter your name”)

A

Iteration

223
Q

What is casting? [1]

A

Converting one data type to another [1]

224
Q

What is the python command to cast to a string? [1]

A

str() [1]

225
Q

What is the python command to cast to an integer? [1]

A

int() [1]

226
Q

What is the Python command to cast an ASCII number to its matching character? [1]

A

chr() [1]

227
Q

What is the Python command to cast a character to it’s matching ASCII number? [1]

A

ord() [1]

228
Q

What is an integer?

A

A whole number e.g. 2

229
Q

What is a character

A

A single letter, number or symbol e.g. A

230
Q

What is a string

A

A sequence of characters, e.g. Hello

231
Q

What is a real number

A

A number with a decimal e.g. 2.2

232
Q

What are real numbers also known as?

A

floats / floating point numbers

233
Q

What is a Boolean

A

True or False

234
Q

What data type would be best suited to store a phone number?

A

String - if you use int you’ll lost the 0 at the start.

235
Q

What data type would be best suited to store the time in a 100m race?

A

Real number - you need the detail from the decimal

236
Q

Name two ways to manipulate strings [2]

A

Concatenation - combining strings [1]
Slicing - taking part of a string [1]

237
Q

What would be the output of this code?

name = “Dave”
print (name[0:2])

A

“Da”

238
Q

What is a record? [2]

A

A set of data [1] spanning multiple fields [1]

239
Q

How do you declare an array in Python?

A

listName = []

240
Q

What is a 2D array? [1]

A

An array that contains other arrays. [1]

241
Q

How would you access the first item of the second array in a 2D Python array called data?

A

data [1][0]

242
Q

How would you access the third item of an array called data in Python?

A

data[2]

243
Q

How would you access the last item of an array called data in Python?

A

data[-1]

244
Q

Write the code to open a file in Python

A

file = open(“filename”)

245
Q

Write the code to read one line of a file in Python

A

file.readline()

246
Q

Write the code to read a whole file in Python

A

file.read()

247
Q

Write the code to close a file in Python

A

file.close()

248
Q

Write the code to declare the function ‘findPrice’ with the parameters price and VAT.

A

def findPrice (price, VAT):

249
Q

Write the Python to create an array called letters containing the letters a, b, c, d

A

letters = [‘a’,’b’,’c’,’d’]

250
Q

Write the Python code to generate a random number between 1 and 100

A

import random # import the random library
number = random.randint(1,100) #Generate a number between 1 - 100

251
Q

State the two types of subroutines [2]

A

Functions - return a value
Procedures - don’t return a value

252
Q

What is the difference between a local and global variables? [2]

A

Local variables are defined within a subroutine. They can only be accessed in that subroutine [1]

Global variables are defined outside of a subroutine. They can be accessed anywhere in the code. [1]