Fundamentals of Algorithms
Programming Concepts
Data Representation
Robust programming and testing
Programming languages and IDEs
100

 What is an algorithm?

A sequence of steps that can be followed to complete a task.

100

 What are the three basic programming constructs?

Sequence, Selection, and Iteration

100

What number base do computers use to store all data?

Binary (base 2).

100

What is the purpose of data validation?

To ensure that data entered into a system is reasonable and meets specific criteria (e.g., is in a valid format).

100

What function is used to show text in the console?

Print
200

What is the term for breaking a problem down into a number of sub-problems?

 Decomposition.

200

Which data type is used for a value that can only be True or False?

Boolean.

200

How would you represent the decimal number 5 in 8-bit binary?

00000101

200

What type of test data is used to check if the program handles unusual but valid inputs correctly?

 Boundary (or extreme) data.

200

Which type of program translates and executes source code one line at a time?

An Interpreter.

300

Which search algorithm involves checking the middle of a sorted list and discarding half the data in each step?

Binary Search.

300

What is the term for a loop that runs for a predetermined number of times?

Definite iteration (or a For loop).

300

What unit is used to measure the size of an image (width x height)?

Pixels (resolution).

300

What is a logic error?

A mistake in the algorithm or program design that causes the program to produce an incorrect output, even if it runs without crashing.

300

What does an assembler do?

Translates assembly language (low-level code) into machine code.

400

Name one advantage of a Merge Sort over a Bubble Sort.

Merge Sort is generally more efficient (faster) for larger lists.

400

What does concatenation mean when dealing with strings?

Joining two or more strings together to form a single string.

400

Which method of compression discards some of the original data?

Lossy compression.

400

Name one common type of cyber security threat that often uses social engineering.

Phishing, or the use of malicious software (malware) through social engineering techniques.

400

Name two features of an Integrated Development Environment (IDE) that help programmers.

Any two from: code editors, error highlighting, debugging tools, runtime environments, auto-complete.

500

Name one advantage of a Merge Sort over a Bubble Sort.

The process of removing unnecessary detail from a problem to focus on the essential parts.

500

Describe the difference between a local variable and a global variable.

A local variable can only be accessed within the subroutine it was declared in, while a global variable can be accessed anywhere in the program.

500

What is hexadecimal often used for in computing?

Representing binary values in a more human-readable form (e.g., colour codes, memory addresses).

500

What does an authentication routine typically require a user to provide?

A valid username and password

500

What is machine code?

The low-level language consisting of binary instructions that a computer's CPU can directly understand and execute.

M
e
n
u