This term describes a rule that defines how data is transmitted across a network.
What is protocol
What is instantiation in object-oriented programming?
What is creating an object from a class.
Name the CPU component that performs arithmetic operations.
What is ALU
Define “sensor” in a control system.
A device that detects changes in physical conditions.
Define OSINT in the context of penetration testing.
What is collecting publicly available information about a target.
Name one reason why data compression is used when sending files over a network.
What is To reduce file size and speed up transmission
Define encapsulation using one sentence.
What is bundling data and methods together while restricting direct access.
State what the program counter stores.
What is an address of the next instruction.
Give an example of a control system that uses open-loop control.
Microwave timer, toaster, irrigation timer.
Identify one ethical concern when conducting tests in a hospital environment.
What is risk of disrupting patient care.
Identify two features of a packet used in packet switching.
What are Header (addressing), payload (data), checksum, sequence number.
A list requires linear search. Give one situation where this is acceptable and one where it is inefficient.
What is a small list (acc), large list with frequent searches (ineff).
Describe the fetch–decode–execute cycle in three steps.
What is Fetch instruction → Decode instruction → Execute instruction.
Explain the role of feedback in a washing machine.
Sensor checks water level/rotation → processor adjusts operation.
Explain why MTPH’s IoT devices increase its attack surface.
What is more connected devices = more exploitable entry points.
Explain what a VPN provides to a remote user.
What is Encrypted connection + remote access to a private network.
Explain how inheritance reduces code duplication.
What is common attributes/methods are written once in a superclass and reused by subclasses.
Cache memory improves performance. Explain why.
What is it stores frequently accessed data close to the CPU for faster access.
Describe the relationship between sensor → processor → output transducer using ANY example.
Thermostat: sensor reads temperature → processor decides → heater turns on/off
Describe how SQL injection could compromise the EHR database.
What is manipulated input can expose or modify patient records.
Compare one advantage and one disadvantage of using WPA2 for wireless security.
What is strong encryption (adv) and vulnerable if password is weak (disadv).
A recursive algorithm fails to reach the base case. Describe what will happen and why.
What is infinite recursion leading to a stack overflow.
Compare virtual memory and RAM in terms of purpose and performance impact.
What is VM extends memory using disk; RAM stores active data. VM is slower.
Evaluate whether a hospital should use a centralized or distributed control system for emergency lighting. Provide one argument for each side.
Centralized: easier to coordinate. Distributed: more fault tolerant.
Construct a short threat model: identify an adversary, their goal, and one likely attack vector.
What is (Adversary) a cybercriminal. (Goal) to steal EHR data. Vector: SQL injection/phishing.