CS Mock Paper Questions Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Identify one fundamental operation of a computer

A
  • Add
  • Store
  • Compare
  • Retrieve
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Distinguish between fundamental operations and compound opera of a computer

A

Fundamental Operations requires one machine instruction cycle, it does not require the processor to go through many machine instruction cycle to reach a result

Compound operations is complex because it is an operation that involves a number of other operations to reach a result. For Example:- find the largest number in an array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

By making direct reference to the technologies used, explain how a virtual private network (VPN) allows a travelling sales person to connect securely to the company’s network

A

Virtual Private Network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of tunnelling protocol and security procedures.

Tunnelling Protocols;
Allows the data to be hidden when travelling across the internet

Encrypted Protocols (IPSEC);
If hacked it will not be understandable 

The use of Gateways;
Allows the user or salesperson to connect to company’s server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A small hotel buys a software package to manage their bookings.

(a) Describe two types of documentation that should be provided with the software package

A

•Technical Documentation;

  • Describes how to install the software
  • Describes the hardware configuration

•User Documentation

  • Describes various functions of the software
  • Helps user to learn how to use the software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State two methods of delivering user training

A
  • Formal Classes
  • Online Training
  • Self Instruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Calculate how many different colours can be represented using two hexadecimal characters.

A

(Remember four binary digits= 1 hexadecimal digit)

2^8 =256 Colours

256 Colours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A group of programmers are involved in creating the software product. They create many new sub programs that also use existing sub programs within the product.
(a) Outline why sub program is considered as an example of abstraction

A

A sub program is considered as an example of abstraction because a sub program is a named section of the code that performs a specific task in a program. It can be called by name or referred by the identifier when needed;
Without knowing the details of the code and data structure as these are wrapped/hidden within the sub program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evaluate the use of designing and developing different parts of software concurrently.

A

Different stages of programming run simultaneously rather than consecutively;
This decreases product development time/decreases the time to market;
Leading to improved productivity/reduces costs;
However, it requires more resources/more software developers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Outline one way in which users can be informed about the software updates.

A

•A message can be sent to the user (When a software is installed and registered, the user provides an email address/phone number);
With a link to the update.

•Notifications/Alerts are sent to the computer ( a cookie is placed on the user’s computer which communicates with the software developer);
About automatic updates.

•(When the program is run) it queries a URL the program developer has built in to check whether the current version matches the latest version;
If not, notifications are sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Outline two ways in which access to sensitive data can be managed

A

•Sensitive data can be protected by locking it with a password;
Preventing unauthorised access who don’t have this;

•Each user should have appropriate access rights;
Managers, employees and clients/customers are permitted to access different parts of the data;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Outline two ways to improve the security of the company’s network.

A

• Each User should have a User ID and personal password;
Passwords should be regularly changed;

• Two factor authentication for remote users and administrators could be required (this could be a digital certificate, thumbprint scanners);
In addition to the usual user Id and password

•Regularly installing updates and patches;
To ensure the network is protected against new threats such as malware;

•In order to prevent intruders/strangers from accessing the company’s network;
The router is set to accept only specific or whitelisted MAC addresses ;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data corruption can result in data loss.

Explain how corrupted data files can be recovered.

A

•Restore files from a backed-up data file;
Ensuring it is a recent copy to minimise loss;

•A parallel/failover system could be operated;
That could be switched to if the current system or live system is corrupt;

•Data recovery software could be installed and run;
To repair corrupted files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The company is considering implementing a virtual private network (VPN).
Explain one benefit to the company using a VPN.

A

•A VPN improves data security;
By passing the company’s data through a hidden tunnel;
And encrypting the Internet traffic inside encapsulated data packets;

•Remote Access;
VPN is not dependent on any particular network or wifi connection to worm;
The company can have a remote workforce/employees or freelance staff working from different geographic locations/can connect their different office locations;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A new higher level programming language is being developed.
(a) identify two reasons why consistent grammar and syntax should be essential features of a higher level programming language.

A

•Easy to learn/use;
Otherwise time may be wasted in learning the new language;

  • There will be no/less complication errors;
  • There will be no/less logical errors;
  • (reduction of time to create software);
  • Future maintenance or Development is possible by other programmers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identify two features of a user interface that will allow application programmers to interact more easily with the programming language.

A
  • GUI;
  • Toolbars;
  • Menus;
  • Built in command for inputting from touch screen;
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Outline the need for interpreter or compiler

A

Interpreter translates just one statement of the program at a time into machine code. Whereas, Compiler scans the entire program and translates the whole of it into machine code.

17
Q

Describe one advantage to application programmer of having both an interpreter and a compiler available.

A

Interpreter is faster and less time consuming because it immediately warns about syntax errors/execute commands and they could use it instead of the compiler while coding and debugging their programs;
Compiler is required when there is need to produce an executable version of a program;

18
Q

State one method of providing user documentation

A
  • Help Files;

* Online support;

19
Q

Outline the need for predefined sub programs and collections.

A
  • Reusability;
  • Modularity;
  • Reliability / All predefined sub programs are tested and reliable;

•Predefined Sub programs and collections are reusable;
And this reduces the cost/time needed to develop a large provram