System Architecture
Memory & Storage
Network Security
Algorithms
Programming
100

What is an embedded system?

A system built within a larger system, that only performs one task.

100

What is the largest value that can be used in a single Hex digit?

F

100

Give an example of a feature that could give away a phishing email.

Poor spelling/grammar, hyperlinks, generic welcome message, wrong logos, formatting of the email, user email etc.

100

State the 2 searching algorithms.

Linear and Binary.

100

Give an example of a piece of data that a Boolean variable would hold.

TRUE or FALSE.

200

What is the purpose of the CPU?

Perform the Fetch, Decode, Execute cycle.

200

What is 1100 1110 in hex?

CE

200

State 3 types of malware.

Virus, Trojan horse, Worm, Spyware, Ransomware etc.

200

What is an algorithm?

A set of step by step instructions to complete a task.

200

What is the difference between a constant and a variable?

A variable can change when a program is running, a constant cannot.

300

What 3 factors can affect a CPU's performance?

Clock speed, Core count, Cache size.

300

An image contains 12 colours and has a resolution of 100 pixels. What is the file size?

400 bits.

300

What is the difference between a DoS and DDoS attack?

A DoS is from a single source whereas a DDoS is an attack that comes from multiple origins.

300

When is a merge sort faster than a bubble sort?

When using large lists.

300

What is the problem with this variable naming convention? 1stPlayer, 2ndPlayer, 3rdPlayer

Variables can't start with numbers.

400

What is the purpose of the Program Counter?

Holds the address of the next instruction to be executed from memory.

400

What are the 6 characteristics of a secondary storage device?

Durability, capacity, portability, reliability, cost, speed.

400

What are the 3 main key words that are used to create an SQL injection statement?

SELECT, FROM, WHERE

400

A list contains 4 items. What is the maximum number of comparisons that would be needed when using a bubble sort on this list?

6 - 3 on the first pass, 2 on the second and 1 on the final pass.

400

What is a logic error?

When a program does not produce the intended outcome when running.

500

Explain the concept that Von Neumann created.

Stored Program Concept. Program and its data are stored in the same place.

500

How many bits does ASCII, Extended ASCII and Unicode use to store their characters?

7, 8, 16 respectively.

500

Describe how an anti-virus works.

A file is downloaded and scanned. It is checked against a list of known viruses (usually stored in the cloud) and if the virus is found it is quarantined. 

500

What are the 3 principles of Computational Thinking?

Abstraction, Decomposition and Algorithmic Thinking.

500

What are the 3 programming constrcuts?

Sequence, Selection and Iteration.

M
e
n
u