GCSE Computer Science Fundamentals Unit Flashcards

Year 9 Summer 2/Year 10 Autumn 1

1
Q

What are the numbers in the binary number line?

A

128 64 32 16 8 4 2 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When converted to denary, what is the binary number 1001?

A

8 + 1 = 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When converted to binary, what is the denary number 29?

A

29 - 16 = 13
13 - 8 = 5
5 - 4 = 1
11101

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the rules with binary addition?

A

0+0 = 0
1+0 = 1
0+1 = 1
1+1 = 0 carry 1
1+1+1 = 1 carry 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe how an insertion sort is carried out.

A

An insertion sort is where the numbers are inserted into the correct position. It is the quickest kind of sorting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe how a merge sort is carried out.

A

A merge sort is where we divide and conquer - octo (8) - quads (4) - pairs (2) then sort pairs (2) - quads (4) - octo (8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe how bubble sort is carried out.

A

In the bubble sort, you sort the pairs:
1st pass - start at 1st item
2nd pass - start at 2nd item
3rd pass - start at 1st item
4th pass - start at 2nd item etc….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how a linear search is carried out.

A

A linear search is where each item in the list is checked until the correct item is found. This can be a slow process if the list is long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe how a binary search is carried out.

A

A binary search is where the list is divided in 2 - is the item you are looking for in the top half or bottom half - get rid of the half of the list it is not in, and repeat the process until you find the item you are looking for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the main security threats from social engineering?

A

Blagging where we give confidential information to people we ‘trust’ and phishing, where through an email attachment, for example, we are taken to a fake website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the main security threats from hacking?

A

A denial of service attack, where the web server is flooded with requests and thus the website crashes, and a brute force attack is when by trial and error the hacker gains unauthorized access through hacking passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the main security threats from malware?

A

Virus (attaches), worms (replicates), Trojan (disguises), ransomware (locks), spyware (spies), keylogger (monitors).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the main security threats when using ad hoc temporary networks?

A

Shouldering (aka shoulder surfing) as a result of poor user awareness and data interception (man-in-the-middle) attack as a result of weak security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is computational thinking?

A

Breaking a big problem into smaller more manageable problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the main steps in computational thinking?

A

Abstraction - Decomposition - Pattern Recognition - Algorithmic Thinking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the main stages in the programming cycle?

A

Plan - Design - Implement (develop) - Test - Evaluate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What happens in a binary shift to the left?

A

Binary shift to the left multiplies, e.g. multiplies by 2 each shift.

18
Q

What happens in a binary shift to the right?

A

Binary shift to the right divides, e.g. divides by 2 each shift.

19
Q

What are the main data types?

A

String, integer, float, real, character, Boolean.

20
Q

How many bits are in a byte?

A

8

21
Q

What are the units of measurement?

A

Bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte, petabyte.

22
Q

How can I remember the order of the units of measurement?

A

Use a mnemonic, e.g. Be Nice, Be Kind, Make Good on That Promise.

23
Q

What is a low level language?

A

A computer programming language consisting of binary or hexadecimal instructions which a computer can respond to directly, e.g. machine code.

24
Q

What is a high level language?

A

A high-level language needs a compiler or an interpreter for their translation into the machine code.

25
Q

How is a high level language understood by a computer?

A

A translator (compiler or interpreter) translates the source code into machine code (including an assembler for directly translating the instructions of the machine language).

26
Q

How do you calculate the size of a sound file?

A

Sample rate x duration (s) x bit depth.

27
Q

How do you calculate the size of an image file?

A

Colour depth x image height (px) x image width (x).

28
Q

How do you calculate the size of a text file?

A

Bits per character x number of characters.

29
Q

What is the term used to describe the AND gate conditions?

A

Conjunction - both conditions need to be met.

30
Q

What is the term used to describe the OR gate conditions?

A

Disjunction - one condition needs to be met.

31
Q

What is the term used to describe the NOT gate conditions?

A

Negation - the opposite of the condition.

32
Q

What is an Integrated Development Environment (IDE)?

A

An IDE is software used to enter and edit source code. It will also compile programs into machine code and have debugging features.

33
Q

What are the features of an IDE?

A

The source code editor enables programmers to write and edit their code, including features such as syntax completion, keywords and prettyprint (colour, indentation etc).

34
Q

What is the purpose of the run-time environment?

A

This enables a program to be run. Checks for run-time errors and other testing, such as logic tests, can be carried out.

35
Q

What does ‘legal’ mean?

A

Legal links to laws set by the government. Businesses have a duty to follow this legislation in order to protect the citizens of the country to which the law relates.

36
Q

What are the key laws linked to computing?

A

The Computer Misuse Act, the Data Protection Act and the Copyright, Designs and Patent Act.

37
Q

What are the consequences of not following the law?

A

Fines, business closure, legal fees, imprisonment.

38
Q

What is the purpose of success criteria?

A

Success criteria are the aims and objectives of a program, on which the program is developed and success measured against.

39
Q

What is iterative testing?

A

Iterative testing is testing during the implementation/development phase as the program.

40
Q

What is terminal testing?

A

Terminal testing is at the end, testing the program against success criteria once the implementation stage has been completed.