What is an embedded system?
A system built within a larger system, that only performs one task.
What is the largest value that can be used in a single Hex digit?
F
Give an example of a feature that could give away a phishing email.
Poor spelling/grammar, hyperlinks, generic welcome message, wrong logos, formatting of the email, user email etc.
State the 2 searching algorithms.
Linear and Binary.
Give an example of a piece of data that a Boolean variable would hold.
TRUE or FALSE.
What is the purpose of the CPU?
Perform the Fetch, Decode, Execute cycle.
What is 1100 1110 in hex?
CE
State 3 types of malware.
Virus, Trojan horse, Worm, Spyware, Ransomware etc.
What is an algorithm?
A set of step by step instructions to complete a task.
What is the difference between a constant and a variable?
A variable can change when a program is running, a constant cannot.
What 3 factors can affect a CPU's performance?
Clock speed, Core count, Cache size.
An image contains 12 colours and has a resolution of 100 pixels. What is the file size?
400 bits.
What is the difference between a DoS and DDoS attack?
A DoS is from a single source whereas a DDoS is an attack that comes from multiple origins.
When is a merge sort faster than a bubble sort?
When using large lists.
What is the problem with this variable naming convention? 1stPlayer, 2ndPlayer, 3rdPlayer
Variables can't start with numbers.
What is the purpose of the Program Counter?
Holds the address of the next instruction to be executed from memory.
What are the 6 characteristics of a secondary storage device?
Durability, capacity, portability, reliability, cost, speed.
What are the 3 main key words that are used to create an SQL injection statement?
SELECT, FROM, WHERE
A list contains 4 items. What is the maximum number of comparisons that would be needed when using a bubble sort on this list?
6 - 3 on the first pass, 2 on the second and 1 on the final pass.
What is a logic error?
When a program does not produce the intended outcome when running.
Explain the concept that Von Neumann created.
Stored Program Concept. Program and its data are stored in the same place.
How many bits does ASCII, Extended ASCII and Unicode use to store their characters?
7, 8, 16 respectively.
Describe how an anti-virus works.
A file is downloaded and scanned. It is checked against a list of known viruses (usually stored in the cloud) and if the virus is found it is quarantined.
What are the 3 principles of Computational Thinking?
Abstraction, Decomposition and Algorithmic Thinking.
What are the 3 programming constrcuts?
Sequence, Selection and Iteration.