Computational Thinking
Data Rep
Hardware/Software
Networks
100

Can you list all the binary multiples of data storage in order starting with the smallest (a bit…)

bit, nibble, byte, kibibyte, mebibyte, gibibyte, tebibyte

100

What is machine code?

Binary instructions, which can be directly processed by the CPU.

100

This utility will scramble data so that if it is intercepted, it would be unreadable

Encryption Software

100

Computer networks use protocols. What is the meaning of the word “protocol”?

A set of rules defining common methods of data communication.

200

True or False: A 'Bubble Sort' algorithm will step through the data set one more time before stopping, after the data set had been ordered on the previous stepthrough.

True

200

Convert the binary number 01011100, into decimal.

64 + 16 + 8 + 4 = 92

200

What is a compiler?

A translator which converts source code into machine code, in one go, producing an executable file, that the CPU can run without the translator needing to be present.

200

What is a major disadvantage of the Bus network topology?

Data travels both ways along the network cable and as such the network is susceptible to data collisions which can slow the network down.

300

This type of division will output the remainder of the division calculation.

% Modulus Division (MOD)

300

Convert the denary number 45, into hexadecimal

2D

300

What is meant by the term ‘embedded system’?

An embedded system is a computer which has all of its components arranged together on a single circuit board. They usually run specific tasks (are not general purpose).

300

Routers send packets that contain data around the internet. State the 3 other items found in a packet.

Destination Address

Source Address

Check sum

Sequence Number

Protocol

400

 The computational method which is concerned with the removal of unnecessary detail is called... 

Abstraction

400

What is the difference between Lossy and Lossless compression?

Lossy compression permanently removes data from a file in order to reduce its size. 

Lossless compression temporarily removes data from a file in order to reduce its size.

400

Name three factors that affect CPU performance?

Cache Size 

Clock Speed 

Number of CPU Cores

400

What is the role of DNS (Domain Name System)?

Converts ‘human friendly’ URLs (web addresses) into ‘network friendly’ IP addresses.

500

Biometrics is the name given for when a device measures a person’s physical characteristics to verify their identity. Fingerprinting is one. Name 3 others…

Facial recognition (commonly used on phones) 

Retinal scans (more commonly used in high security environments) 

Voice recognition (now used in online banking)

500

What is -12710 as a signed two’s complement binary number?

1000 0001

500

What is virtual memory and why is it needed?

Virtual memory is when secondary storage is used as RAM when the RAM is full. 

It enables multiple programs to continue to run without the computer system freezing, the system will run much slower as a result as secondary storage has slower read/write speeds.

500

Name the 4 layers of the TCP/IP model:

Application layer 

Transport layer 

Internet layer 

Link layer

M
e
n
u