What is an algorithm?
A sequence of steps that can be followed to complete a task.
What are the three basic programming constructs?
Sequence, Selection, and Iteration
What number base do computers use to store all data?
Binary (base 2).
What is the purpose of data validation?
To ensure that data entered into a system is reasonable and meets specific criteria (e.g., is in a valid format).
What function is used to show text in the console?
What is the term for breaking a problem down into a number of sub-problems?
Decomposition.
Which data type is used for a value that can only be True or False?
Boolean.
How would you represent the decimal number 5 in 8-bit binary?
00000101
What type of test data is used to check if the program handles unusual but valid inputs correctly?
Boundary (or extreme) data.
Which type of program translates and executes source code one line at a time?
An Interpreter.
Which search algorithm involves checking the middle of a sorted list and discarding half the data in each step?
Binary Search.
What is the term for a loop that runs for a predetermined number of times?
Definite iteration (or a For loop).
What unit is used to measure the size of an image (width x height)?
Pixels (resolution).
What is a logic error?
A mistake in the algorithm or program design that causes the program to produce an incorrect output, even if it runs without crashing.
What does an assembler do?
Translates assembly language (low-level code) into machine code.
Name one advantage of a Merge Sort over a Bubble Sort.
Merge Sort is generally more efficient (faster) for larger lists.
What does concatenation mean when dealing with strings?
Joining two or more strings together to form a single string.
Which method of compression discards some of the original data?
Lossy compression.
Name one common type of cyber security threat that often uses social engineering.
Phishing, or the use of malicious software (malware) through social engineering techniques.
Name two features of an Integrated Development Environment (IDE) that help programmers.
Any two from: code editors, error highlighting, debugging tools, runtime environments, auto-complete.
Name one advantage of a Merge Sort over a Bubble Sort.
The process of removing unnecessary detail from a problem to focus on the essential parts.
Describe the difference between a local variable and a global variable.
A local variable can only be accessed within the subroutine it was declared in, while a global variable can be accessed anywhere in the program.
What is hexadecimal often used for in computing?
Representing binary values in a more human-readable form (e.g., colour codes, memory addresses).
What does an authentication routine typically require a user to provide?
A valid username and password
What is machine code?
The low-level language consisting of binary instructions that a computer's CPU can directly understand and execute.